Artykuły w czasopismach na temat „Digital forgery”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Digital forgery”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Pełny tekst źródłaLiang, Yu, Yadong Yu, Yina Wang, Dunjun Li, and Zejiong Zhou. "Counterfeiting in Depth Synthesis based on Digital Watermarking." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 100–106. http://dx.doi.org/10.54097/fcis.v5i3.13998.
Pełny tekst źródłaNirosha, Kandukuri. "Digital Image Forgery Detection Using Convolutional Neural Network." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 456–65. https://doi.org/10.22214/ijraset.2025.67285.
Pełny tekst źródłaHussien, Nadheer Younus, Rasha O. Mahmoud, and Hala Helmi Zayed. "Deep Learning on Digital Image Splicing Detection Using CFA Artifacts." International Journal of Sociotechnology and Knowledge Development 12, no. 2 (2020): 31–44. http://dx.doi.org/10.4018/ijskd.2020040102.
Pełny tekst źródłaLovepreet, Kaur*1 &. Sandeep Singh Dhaliwal2. "COPY MOVE FORGERY DETECTION IN DIGITAL IMAGES USING IMPROVED SIFT (I-SIFT) APPROACH." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 9, no. 3 (2020): 6–12. https://doi.org/10.5281/zenodo.3700407.
Pełny tekst źródłaVaishali Sharma. "Ensuring Visual Integrity: Deep Learning-Based Solutions for Authentic Image Forgery Detection." Journal of Electrical Systems 20, no. 11s (2024): 3491–508. https://doi.org/10.52783/jes.8129.
Pełny tekst źródłaMr. M. Sasikanth, Ms M. Sri Siva Sravani Devi, Ms K. Bindu Madhavi, Mr V. Vigneswara Rao, and Mr. J. Prudhvi. "Digital Image Forgery Detection using Hierarchical Learning." Journal of Nonlinear Analysis and Optimization 16, no. 01 (2025): 1186–94. https://doi.org/10.36893/jnao.2025.v16i01.0139.
Pełny tekst źródłaSU, YUTING, JING ZHANG, YU HAN, JING CHEN, and QINGZHONG LIU. "EXPOSING DIGITAL VIDEO LOGO-REMOVAL FORGERY BY INCONSISTENCY OF BLUR." International Journal of Pattern Recognition and Artificial Intelligence 24, no. 07 (2010): 1027–46. http://dx.doi.org/10.1142/s0218001410008317.
Pełny tekst źródłaGupta, Anil. "A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. http://dx.doi.org/10.11591/eei.v7i3.754.
Pełny tekst źródłaGupta, Anil. "A New Copy Move Forgery Detection Technique Using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (2018): 345–49. https://doi.org/10.11591/eei.v7i3.754.
Pełny tekst źródłaPandey, Shivam, Aditya ., Seema Jain, and Usha Dhankar. "IMAGE FORGERY DETECTION." International Journal of Engineering Applied Sciences and Technology 8, no. 2 (2023): 160–63. http://dx.doi.org/10.33564/ijeast.2023.v08i02.022.
Pełny tekst źródłaProf. D. D. Pukale, Prof. V. D. Kulkarni, Julekha Bagwan, Pranali Jagadale, Sanjivani More, and Renuka Sarmokdam. "Image Forgery Detection Using Deep Learning." International Research Journal on Advanced Engineering and Management (IRJAEM) 6, no. 07 (2024): 2248–58. http://dx.doi.org/10.47392/irjaem.2024.0327.
Pełny tekst źródłaGaharwar, Gaurav, V. V. Nath, and Raina Gaharwar. "Neuro-Fuzzy Based First Responder for Image Forgery Identification." Oriental journal of computer science and technology 9, no. 1 (2016): 12–16. http://dx.doi.org/10.13005/ojcst/901.03.
Pełny tekst źródłaParashar, Amrita, Dr Arvind Kumar Upadhyay, and Dr Kamlesh Gupta. "A Novel Machine Learning Approach for Forgery Detection and Verification in Digital Image." ECS Transactions 107, no. 1 (2022): 11791–98. http://dx.doi.org/10.1149/10701.11791ecst.
Pełny tekst źródłaHosny, Khalid M., Akram M. Mortda, Nabil A. Lashin, and Mostafa M. Fouda. "A New Method to Detect Splicing Image Forgery Using Convolutional Neural Network." Applied Sciences 13, no. 3 (2023): 1272. http://dx.doi.org/10.3390/app13031272.
Pełny tekst źródłaGornale, Shivanand S., Gayatri Patil, and Rajkumar Benne. "Document Image Forgery Detection Using RGB Color Channel." Transactions on Machine Learning and Artificial Intelligence 10, no. 5 (2022): 1–14. http://dx.doi.org/10.14738/tmlai.105.13126.
Pełny tekst źródłaSiddiqi, Muhammad Hameed, Khurshed Asghar, Umar Draz, et al. "Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns." Security and Communication Networks 2021 (September 30, 2021): 1–10. http://dx.doi.org/10.1155/2021/4270776.
Pełny tekst źródłaNagarathna C R, Jayasri A, Chandana S, and Amrutha A. "Identification of Image Forgeries using Machine Learning - A Review." Journal of Innovative Image Processing 5, no. 3 (2023): 323–36. http://dx.doi.org/10.36548/jiip.2023.3.007.
Pełny tekst źródłaNaincy and Ashok Kumar Bathla. "Comparative Study and Survey on Copy Move Image Forgery Detection Approaches." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 6 (2015): 33–38. http://dx.doi.org/10.53555/nncse.v2i6.445.
Pełny tekst źródłaNaincy and Ashok Kumar Bathla. "Comparative Study and Survey on Copy Move Image Forgery Detection Approaches." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 9 (2015): 01–06. http://dx.doi.org/10.53555/nncse.v2i9.441.
Pełny tekst źródłaHuda Abdulaali Abdulbaqi. "Advanced Software Techniques for Detecting Digital Image Manipulation." Journal of Information Systems Engineering and Management 10, no. 36s (2025): 326–38. https://doi.org/10.52783/jisem.v10i36s.6423.
Pełny tekst źródłaQazi, Tanzeela, Mushtaq Ali, Khizar Hayat, and Baptiste Magnier. "Seamless Copy–Move Replication in Digital Images." Journal of Imaging 8, no. 3 (2022): 69. http://dx.doi.org/10.3390/jimaging8030069.
Pełny tekst źródłaBae, Yong-Yeol, Dae-Jea Cho, and Ki-Hyun Jung. "Visual Complexity in Korean Documents: Toward Language-Specific Datasets for Deep Learning-Based Forgery Detection." Applied Sciences 15, no. 8 (2025): 4319. https://doi.org/10.3390/app15084319.
Pełny tekst źródłaMallick, Devjani, Mantasha Shaikh, Anuja Gulhane, and Tabassum Maktum. "Copy Move and Splicing Image Forgery Detection using CNN." ITM Web of Conferences 44 (2022): 03052. http://dx.doi.org/10.1051/itmconf/20224403052.
Pełny tekst źródłaShawkat Ibrahim, Zainab, and Taha Mohammed Hasan. "Copy-Move Image Forgery Detection Using Deep Learning Approaches: An Abbreviated Survey." Bilad Alrafidain Journal for Engineering Science and Technology 4, no. 1 (2025): 137–54. https://doi.org/10.56990/bajest/2025.040112.
Pełny tekst źródłaDr. Vikram S. Patil, Ms. Muskan Sayyad, Mr. Sangram Shinde, Mr. Salman Pathan, and Mr. Shreyash Nikam. "Image Forgery Detection." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 07 (2025): 2425–32. https://doi.org/10.47392/irjaem.2025.0383.
Pełny tekst źródłaKinjal, Ravi Sheth, and Suryakantbhai Vora Vishal. "A comparative study on image forgery-facial retouching." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 851~859. https://doi.org/10.11591/eei.v12i2.4481.
Pełny tekst źródłaVaishnavi, D., D. Mahalakshmi, and Venkata Siva Rao Alapati. "Visual Feature Based Image Forgery Detection." International Journal of Engineering & Technology 7, no. 4.6 (2018): 86. http://dx.doi.org/10.14419/ijet.v7i4.6.20436.
Pełny tekst źródłaSaha, Monica. "Forensic Technique for Forgery Detection and Localization in Digital Image." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2721–27. https://doi.org/10.22214/ijraset.2025.68495.
Pełny tekst źródłaJegaveerapandian, Liba Manopriya, Arockia Jansi Rani, Prakash Periyaswamy, and Sakthivel Velusamy. "A survey on passive digital video forgery detection techniques." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6324. http://dx.doi.org/10.11591/ijece.v13i6.pp6324-6334.
Pełny tekst źródłaLiba, Manopriya Jegaveerapandian, Jansi Rani Arockia, Periyaswamy Prakash, and Velusamy Sakthivel. "A survey on passive digital video forgery detection techniques." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (2023): 6324–34. https://doi.org/10.11591/ijece.v13i6.pp6324-6334.
Pełny tekst źródłaPrasad, G., G. Rakesh Reddy, M. Abhishek Guptha, B. Harinath, and N. Kamal Reddy. "Detection of Digital Image Forgery Using Deep-Learning." International Journal of Research Publication and Reviews 5, no. 5 (2024): 10032–37. http://dx.doi.org/10.55248/gengpi.5.0524.1376.
Pełny tekst źródłaYamini, C. Tejaswani, M., M. Yamini, Y. Deepthi, and G. M. ANAND REDDY. "Enhancing Digital image forgery detection using transfer learning." International Journal of Research Publication and Reviews 6, no. 5 (2025): 11600–11602. https://doi.org/10.55248/gengpi.6.0525.18107.
Pełny tekst źródłaDeepika Dubey, Richa Rohatgi, and Seema R. Pathak. "Unveiling Digital Document Manipulation: A Case Study in Forensic Examination." Indian Journal of Forensic Medicine & Toxicology 18, no. 2 (2024): 46–52. http://dx.doi.org/10.37506/w909cd74.
Pełny tekst źródłaShah, Tawheed Jan, and M. Tariq Banday. "Passive Copy-Move Image Forgery Detection Techniques: A Study." solidstatetechnology 64, no. 2 (2021): 3293–304. https://doi.org/10.5281/zenodo.4802888.
Pełny tekst źródłaAbd, El-Latif Eman I., and Nour Eldeen Khalifa. "COVID-19 digital x-rays forgery classification model using deep learning." IAES International Journal of Artificial Intelligence (IJ-AI) 12, no. 4 (2023): 1821–27. https://doi.org/10.11591/ijai.v12.i4.pp1821-1827.
Pełny tekst źródłaLi, Li, Jianfeng Lu, Shanqing Zhang, Linda Mohaisen, and Mahmoud Emam. "Frame Duplication Forgery Detection in Surveillance Video Sequences Using Textural Features." Electronics 12, no. 22 (2023): 4597. http://dx.doi.org/10.3390/electronics12224597.
Pełny tekst źródłaMei, Fang, Tianchang Gao, and Yingda Lyu. "CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection." Security and Communication Networks 2021 (May 4, 2021): 1–13. http://dx.doi.org/10.1155/2021/6688393.
Pełny tekst źródłaS., Uma*1 &. Dr. P. D. Sathya2. "A DETAILED REVIEW OF COPY-MOVE FORGERY DETECTION IN DIGITAL IMAGE." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 38–49. https://doi.org/10.5281/zenodo.2537823.
Pełny tekst źródłaAbbadi, Nidhal, and Alyaa Mohsin. "Blind Digital Images Tampering Detection Based on Singular Value Decomposition." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 338–48. http://dx.doi.org/10.22266/ijies2020.1231.30.
Pełny tekst źródłaAdamski, T., and W. Nowakowski. "Security of Nyberg-Rueppel digital signatures without message recovery." Bulletin of the Polish Academy of Sciences Technical Sciences 62, no. 4 (2014): 817–25. http://dx.doi.org/10.2478/bpasts-2014-0090.
Pełny tekst źródłaAsif Tisekar, Abbas. "“Image Forgery Detection Using Transfer Learning”." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem46928.
Pełny tekst źródłaBhavani, A. Durga, S. Durga Shankar, Ch Aditya, and D. Vijaya Vani. "A Deep Learning-Based Approach for Image Forgery Detection and Classification Using YOLO and CNN." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43511.
Pełny tekst źródłaDjamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 3 (2025): 65–70. https://doi.org/10.37547/tajpslc/volume07issue03-11.
Pełny tekst źródłaDjamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 4 (2025): 23–28. https://doi.org/10.37547/tajpslc/volume07issue04-05.
Pełny tekst źródłaLiu, Bo, and Chi Man Pun. "HSV Based Image Forgery Detection for Copy-Move Attack." Applied Mechanics and Materials 556-562 (May 2014): 2825–28. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2825.
Pełny tekst źródłaMishra, Parul, Nishchol Mishra, Sanjeev Sharma, and Ravindra Patel. "Region Duplication Forgery Detection Technique Based on SURF and HAC." Scientific World Journal 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/267691.
Pełny tekst źródłaS, MURALI, ANAMI BS, and CHITTAPUR GB. "DIGITAL PHOTO IMAGE- FORGERY DETECTION TECHNIQUES." International Journal of Machine Intelligence 4, no. 1 (2012): 405. http://dx.doi.org/10.9735/0975-2927.4.1.405-405.
Pełny tekst źródłaV., Kalpana,, Jayalakshmi, M., and Kishore, V.V. "Medical Image Forgery Detection By A Novel Segmentation Method With KPCA." CARDIOMETRY, no. 24 (November 30, 2022): 1079–85. http://dx.doi.org/10.18137/cardiometry.2022.24.10791085.
Pełny tekst źródłaAbd El-Latif, Eman I., and Nour Eldeen Khalifa. "COVID-19 digital x-rays forgery classification model using deep learning." IAES International Journal of Artificial Intelligence (IJ-AI) 12, no. 4 (2023): 1821. http://dx.doi.org/10.11591/ijai.v12.i4.pp1821-1827.
Pełny tekst źródła