Gotowa bibliografia na temat „Digital tampering”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Digital tampering”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Digital tampering"

1

Shen, Jingyi, Yun Yao, and Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants." International Journal for Innovation Education and Research 9, no. 11 (2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.

Pełny tekst źródła
Streszczenie:
Copy-paste tampering is a common type of digital image tampering, which refers to copying a part of the image area in the same image, and then pasting it into another area of the image to generate a forged image, so as to carry out malicious operations such as fraud and framing. This kind of malicious forgery leads to the security problem of digital image. The research of digital image copy paste forensics has important theoretical significance and practical value. For digital image copy-paste tampering, this paper is based on moment invariant image copy paste tampering detection algorithm, an
Style APA, Harvard, Vancouver, ISO itp.
2

Chang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.

Pełny tekst źródła
Streszczenie:
Means of digital image tampering diverse, new technical approach increasingly renovation, therefore, the detection of forged digital tampering issues are complex, and must not universal, once and for all solutions. In this paper, digital image tampering common practices through research, proposed a re-deposit operations for double JPEG image processing software compression testing technology method using image compression and decompression process lossy compression of images tamper with forensic, this method can play an effective role in the detection.
Style APA, Harvard, Vancouver, ISO itp.
3

Freiling, Felix, and Leonhard Hösch. "Controlled experiments in digital evidence tampering." Digital Investigation 24 (March 2018): S83—S92. http://dx.doi.org/10.1016/j.diin.2018.01.011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Aminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.

Pełny tekst źródła
Streszczenie:
Digital image tampering detection has been an active area of research in recent times due to the ease with which digital image can be modified to convey false or misleading information. To address this problem, several studies have proposed forensics algorithms for digital image tampering detection. While these approaches have shown remarkable improvement, most of them only focused on detecting a specific type of image tampering. The limitation of these approaches is that new forensic method must be designed for each new manipulation approach that is developed. Consequently, there is a need to
Style APA, Harvard, Vancouver, ISO itp.
5

Tang, Bin, Mengyao Sun, Haowen Zheng, Haiyun Han, and Yu Jin. "Analysis of Digital Media Image Tampering and Forgery Control." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 1073–77. http://dx.doi.org/10.62051/f9e87g27.

Pełny tekst źródła
Streszczenie:
In recent years, the continuous innovation of computer vision processing technology has greatly improved the quality of people's production and life, while the accompanying tampering risk has also gradually increased. There are frequent incidents of people with ulterior motives using computer image processing technology to tamper with digital media and falsifying and cheating others. This paper mainly analyzes the technology and method of digital media image tampering and forgery, the social harm caused by the resulting tampering risk, and puts forward the corresponding management countermeasu
Style APA, Harvard, Vancouver, ISO itp.
6

Wei, Wang, and Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection." Highlights in Science, Engineering and Technology 44 (April 13, 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.

Pełny tekst źródła
Streszczenie:
In order to solve the problem of image tampering detection in the blind forensics of digital images, this study first researches and summarizes the means and methods of image tampering and forgery, and provides suggestions for methods of tampering detection using open source tools for the methods that may be used for falsification. These methods have been publicly tested by open source companies for a long time, which proves their feasibility. The methods and conclusions suggested by the research can be used in the "falsification" application of pictures in many fields, and have certain academ
Style APA, Harvard, Vancouver, ISO itp.
7

Mualfah, Desti, Yoze Rizki, and Meiriladiwis Gea. "Analisis Digital Forensik Keaslian Video Rekaman CCTV Menggunakan Metode Localization Tampering." Jurnal CoSciTech (Computer Science and Information Technology) 3, no. 1 (2022): 43–51. http://dx.doi.org/10.37859/coscitech.v3i1.3697.

Pełny tekst źródła
Streszczenie:
Video is one the valid evidence if the handling process is in accordance with digital forensic procedures. Closed circuit television is a video sourse that is often used as authentic evidence in court. The authenticity of the video is something that is often doubted by certain parties. For this reason, this discusses how to detect the authenticity of video as digital evidence by comparing the original video files and tampering video files resulting from attack frame addition and attack frame delection. The media info tool is used to analyze the metadata and the localization tampering method is
Style APA, Harvard, Vancouver, ISO itp.
8

Mainoo, Bernard. "Digital Multimedia Tampering Detection for Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 81–90. http://dx.doi.org/10.22624/aims/crp-bk3-p14.

Pełny tekst źródła
Streszczenie:
In the virtual multimedia era, digital forensics is turning into a rising location of studies way to the huge quantity of picture and video documents generated. Ensuring the integrity of such media is of top-notch significance in lots of situations. This mission has end up extra complex, particularly with the development of symmetrical and asymmetrical community systems which make their authenticity tough. Consequently, it's far definitely vital to find out all feasible modes of manipulation through the improvement of latest forensics detector tools. For example, the symmetry and asymmetry inc
Style APA, Harvard, Vancouver, ISO itp.
9

Schneider, Janine, Linus Düsel, Benedikt Lorch, Julia Drafz, and Felix Freiling. "Prudent design principles for digital tampering experiments." Forensic Science International: Digital Investigation 40 (April 2022): 301334. http://dx.doi.org/10.1016/j.fsidi.2022.301334.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Parashar, Nishtha, and Nirupama Tiwari. "A Survey Of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 10 (2015): 91–96. http://dx.doi.org/10.14257/ijsip.2015.8.10.10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Digital tampering"

1

Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contrib
Style APA, Harvard, Vancouver, ISO itp.
2

Abecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.

Pełny tekst źródła
Streszczenie:
Aujourd'hui, la manipulation d'images à des fins non éthiques est courante, notamment sur les réseaux sociaux et dans la publicité. Les utilisateurs malveillants peuvent par exemple créer des images synthétiques convaincantes pour tromper le public ou dissimuler des messages dans des images numériques, posant des risques pour la sécurité nationale. Les chercheurs en analyse forensique d'image travaillent donc avec les forces de l'ordre pour détecter ces manipulations. Les méthodes d'analyse forensique les plus avancées utilisent notamment des réseaux neuronaux convolutifs pour les détecter. Ce
Style APA, Harvard, Vancouver, ISO itp.
3

Hsiao, Dun-Yu. "Digital Image Tampering Synthesis and Identification." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2207200517502800.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Hsiao, Dun-Yu, and 蕭敦育. "Digital Image Tampering Synthesis and Identification." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/11083859577614039919.

Pełny tekst źródła
Streszczenie:
碩士<br>國立臺灣大學<br>電信工程學研究所<br>93<br>Have you ever edited some unsatisfied digital photographs of yours? If the answer is yes, then you have made some digital tampering. With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most of the time, digital tampering is not perceptible by human; however, some traces of digital tampering may be left in the media during the process. Based on this idea, several detection methods are proposed in this thesis to against various common digital
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Yin-Liang, and 王尹良. "Study of probability-based tampering authentication scheme for digital images." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/55w4hc.

Pełny tekst źródła
Streszczenie:
碩士<br>銘傳大學<br>資訊管理學系碩士班<br>97<br>In recent years, digital watermarking technology has been widely used for digital images of property rights protection and integrity authentication. Image integrity authentication is usually done by a fragile watermarking scheme, which means to embed an image of feature values as an authentication message. When authenticating image integrity, the embedded authentication message in the image is extracted for comparison with the image feature values to identify whether the image has been tampered with, and if so, locate the affected area. However, such authentica
Style APA, Harvard, Vancouver, ISO itp.
6

Liu, Li-Jen, and 劉立仁. "The Detection of Visual Secret ShadowCheating and Digital Image Tampering." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/27727060986799355416.

Pełny tekst źródła
Streszczenie:
碩士<br>國立中正大學<br>資訊工程所<br>96<br>The communications through computer network are popular recently; therefore, the security problems of various image applications are getting much more important while transferring or passing images through the Internet. This thesis provided two methods for solving cheating problem in Visual Cryptography and detecting the tampering in digital images. Visual Cryptography (VC) has drawn much attention for providing the service of secret communication. Basically, VC is the process of encoding a secret into several meaningless shares and later decoding the secret by
Style APA, Harvard, Vancouver, ISO itp.
7

Chiu, Shian-Ren, and 邱顯仁. "Study of Hierarchical Tampering Detection and Recovery Schemes for Digital Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/80485277939778786629.

Pełny tekst źródła
Streszczenie:
碩士<br>銘傳大學<br>資訊管理學系碩士班<br>98<br>In recent years, digital watermarking technology has been widely used for protection and integrity authentication of digital images property rights. Image integrity authentication is usually accomplished with a fragile watermarking scheme, which means to embed an image of feature values as an authentication message. When image integrity needs to be authenticated, the embedded authentication message in the image is extracted for comparison with the image feature values to identify whether the image has been tampered with and to locate the affected area. However,
Style APA, Harvard, Vancouver, ISO itp.
8

Hung, Hsiao-Ying, and 洪筱盈. "A Wavelet Transform Based Digital Watermarking for Image Authentication and Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/18594281413291160363.

Pełny tekst źródła
Streszczenie:
碩士<br>國立交通大學<br>資訊管理研究所<br>92<br>The rapid expansion of the Internet and the recent advance of digital technologies have sharply increased the availability of digital media. In consequence, watermarking is developed as a suitable candidate for the ownership identification of digital data as it allows the invisible insertion of information with the imperceptible modification. This thesis is to investigate a wavelet based semi-fragile watermarking technique for image authentication and tampering detection. Image protection is achieved by the insertion of a secret wavelet tree based binary imag
Style APA, Harvard, Vancouver, ISO itp.
9

Wu, Hsien-Chu, and 吳憲珠. "Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/79884372922665844243.

Pełny tekst źródła
Streszczenie:
博士<br>國立中正大學<br>資訊工程研究所<br>90<br>The goal of this dissertation is to develop improved image protection techniques to protect the intellectual property rights and to solve the above problems such as tamper proofing and recovery. First of all, this dissertation presents six digital copyrights protection schemes. The first proposed copyrights protection scheme takes advantage of visual cryptography to construct a master share from a digital image and come with an ownership share for each copyright. After stacking these two shares, the ownership information can be recovered directly by
Style APA, Harvard, Vancouver, ISO itp.
10

Chiu, Yen-Chung, and 邱彥中. "A Study on Digital Watermarking and Authentication of Images for Copyright Protection And Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/89084112095535503685.

Pełny tekst źródła
Streszczenie:
碩士<br>國立交通大學<br>資訊科學系所<br>92<br>Due to the advance of digital techniques, digital images may be copied or tampered with illegally. Therefore, it is important to develop methods to protect the copyright of digital images and verify their integrity. In this study, digital watermarking techniques for such purposes are proposed. In addition, the watermark must have an ability of robustness because users may apply various operations on a watermarked image. For color images, four methods are proposed to handle different attacks. First, a method based on creating peaks circularly and symmetrically in
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Digital tampering"

1

Forensic Analysis of Digital Image Tampering. Storming Media, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Digital tampering"

1

Tanasi, Alessandro. "Photo Manipulation: Software to Unmask Tampering." In Digital Investigative Journalism. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97283-1_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cao, Hong, and Alex C. Kot. "Detection of Tampering Inconsistencies on Mobile Photos." In Digital Watermarking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18405-5_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wang, Wei, Jing Dong, and Tieniu Tan. "A Survey of Passive Image Tampering Detection." In Digital Watermarking. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03688-0_27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Xu, Guanshuo, Jingyu Ye, and Yun-Qing Shi. "New Developments in Image Tampering Detection." In Digital-Forensics and Watermarking. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Asaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "Countering Universal Image Tampering Detection with Histogram Restoration." In Digital Forensics and Watermaking. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40099-5_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Singleton, Mitchell B., and Qingzhong Liu. "Detecting Digital Photo Tampering with Deep Learning." In Machine Learning and Intelligent Communications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00557-3_47.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sutthiwan, Patchara, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, and Wei Su. "Markovian Rake Transform for Digital Image Tampering Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24556-5_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Chen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "New Feature Presentation of Transition Probability Matrix for Image Tampering Detection." In Digital Forensics and Watermarking. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32205-1_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Chakraborty, Sunen, Paramita Dey, and Kingshuk Chatterjee. "Digital Image Tampering Detection Using Deep Learning: A Survey." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2710-4_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Digital tampering"

1

Mo, Xiaolong, Huabiao Li, and Ruiwei Meng. "Research on the Application of Anti-tampering Technology in Digital Cultural Communication." In 2024 International Conference on Culture-Oriented Science & Technology (CoST). IEEE, 2024. http://dx.doi.org/10.1109/cost64302.2024.00029.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zakey, Asmath, Dinura Bawantha, Dinuth Shehara, Nethmi Hasara, Kavinga Yapa Abeywardena, and Harinda Fernando. "A Dual-Branch CNN and Metadata Analysis Approach for Robust Image Tampering Detection." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012015.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zhu, Nan, Kun Wang, and Xu Zhang. "Document image tampering detection and localization based on dual-path network with progressive supervision." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073213.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Chaugule, Swapnil S., and Dalila B. Megherbi. "An Image Security System for Digital Private Image Exchange Using Redundant Watermarks for Authentication, Information Hiding, Tampering Detection, and Data Self-Recovery with Partial Carrier Capacity Utilization." In NAECON 2024 - IEEE National Aerospace and Electronics Conference. IEEE, 2024. http://dx.doi.org/10.1109/naecon61878.2024.10670631.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ali, Zain, Areej Ahmed, and Hafsa Bibi. "Innovative Approaches to Liquefaction Mitigation in Seismic Zones: A Comprehensive Overview." In 14th International Civil Engineering Conference. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-78q4kr.

Pełny tekst źródła
Streszczenie:
Another vulnerability that arises due to soil conditions is the liquefaction of soil in seismic zones which is a major risk as this form of soil behaves like liquid when it experiences an earthquake leading to effects such as infrastructure and posing dangerous risks to the lives of people. The conventional mitigation measures including tampering of soil and provision of drainage system present certain disadvantages in as much as cost, eco-friendly nature, and efficiency are concerned. Newer development strategies for liquefaction mitigation are targeted at advanced techniques of ground improv
Style APA, Harvard, Vancouver, ISO itp.
6

Mall, Vinod, Kedar Bhatt, Suman K. Mitra, and Anil K. Roy. "Exposing structural tampering in digital images." In 2012 IEEE International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2012. http://dx.doi.org/10.1109/ispcc.2012.6224369.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Teerakanok, Songpon, and Tetsutaro Uehara. "Digital Media Tampering Detection Techniques: An Overview." In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.109.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

ARGHIRESCU, Sebastian-Alexandru. "Security of Digital Files: Audio Tampering Detection." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.06.

Pełny tekst źródła
Streszczenie:
In an age where most of the data we interact with daily is stored digitally, methods of checking its authenticity become more and more essential. This is especially true for sound, as the increasing public availability of AI models makes tampering with audio files easier than ever. In this paper, we will be investigating the current landscape of audio forensics as well as our new hardware-based solution for double encoding detection.
Style APA, Harvard, Vancouver, ISO itp.
9

Fan, Jiayuan, Tao Chen, and Jiuwen Cao. "Image tampering detection using noise histogram features." In 2015 IEEE International Conference on Digital Signal Processing (DSP). IEEE, 2015. http://dx.doi.org/10.1109/icdsp.2015.7252037.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Wang, Yulin, and Jian Zhao. "Asymmetric locating position of information hiding against tampering." In Second International Conference on Digital Image Processing. SPIE, 2010. http://dx.doi.org/10.1117/12.856010.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!