Gotowa bibliografia na temat „Digital tampering”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Digital tampering”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Digital tampering"
Shen, Jingyi, Yun Yao, and Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants." International Journal for Innovation Education and Research 9, no. 11 (2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.
Pełny tekst źródłaChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Pełny tekst źródłaFreiling, Felix, and Leonhard Hösch. "Controlled experiments in digital evidence tampering." Digital Investigation 24 (March 2018): S83—S92. http://dx.doi.org/10.1016/j.diin.2018.01.011.
Pełny tekst źródłaAminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.
Pełny tekst źródłaTang, Bin, Mengyao Sun, Haowen Zheng, Haiyun Han, and Yu Jin. "Analysis of Digital Media Image Tampering and Forgery Control." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 1073–77. http://dx.doi.org/10.62051/f9e87g27.
Pełny tekst źródłaWei, Wang, and Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection." Highlights in Science, Engineering and Technology 44 (April 13, 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.
Pełny tekst źródłaMualfah, Desti, Yoze Rizki, and Meiriladiwis Gea. "Analisis Digital Forensik Keaslian Video Rekaman CCTV Menggunakan Metode Localization Tampering." Jurnal CoSciTech (Computer Science and Information Technology) 3, no. 1 (2022): 43–51. http://dx.doi.org/10.37859/coscitech.v3i1.3697.
Pełny tekst źródłaMainoo, Bernard. "Digital Multimedia Tampering Detection for Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 81–90. http://dx.doi.org/10.22624/aims/crp-bk3-p14.
Pełny tekst źródłaSchneider, Janine, Linus Düsel, Benedikt Lorch, Julia Drafz, and Felix Freiling. "Prudent design principles for digital tampering experiments." Forensic Science International: Digital Investigation 40 (April 2022): 301334. http://dx.doi.org/10.1016/j.fsidi.2022.301334.
Pełny tekst źródłaParashar, Nishtha, and Nirupama Tiwari. "A Survey Of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 10 (2015): 91–96. http://dx.doi.org/10.14257/ijsip.2015.8.10.10.
Pełny tekst źródłaRozprawy doktorskie na temat "Digital tampering"
Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.
Pełny tekst źródłaAbecidan, Rony. "Stratégies d'apprentissage robustes pour la détection de manipulation d'images." Electronic Thesis or Diss., Centrale Lille Institut, 2024. http://www.theses.fr/2024CLIL0025.
Pełny tekst źródłaHsiao, Dun-Yu. "Digital Image Tampering Synthesis and Identification." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2207200517502800.
Pełny tekst źródłaHsiao, Dun-Yu, and 蕭敦育. "Digital Image Tampering Synthesis and Identification." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/11083859577614039919.
Pełny tekst źródłaWang, Yin-Liang, and 王尹良. "Study of probability-based tampering authentication scheme for digital images." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/55w4hc.
Pełny tekst źródłaLiu, Li-Jen, and 劉立仁. "The Detection of Visual Secret ShadowCheating and Digital Image Tampering." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/27727060986799355416.
Pełny tekst źródłaChiu, Shian-Ren, and 邱顯仁. "Study of Hierarchical Tampering Detection and Recovery Schemes for Digital Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/80485277939778786629.
Pełny tekst źródłaHung, Hsiao-Ying, and 洪筱盈. "A Wavelet Transform Based Digital Watermarking for Image Authentication and Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/18594281413291160363.
Pełny tekst źródłaWu, Hsien-Chu, and 吳憲珠. "Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/79884372922665844243.
Pełny tekst źródłaChiu, Yen-Chung, and 邱彥中. "A Study on Digital Watermarking and Authentication of Images for Copyright Protection And Tampering Detection." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/89084112095535503685.
Pełny tekst źródłaKsiążki na temat "Digital tampering"
Części książek na temat "Digital tampering"
Tanasi, Alessandro. "Photo Manipulation: Software to Unmask Tampering." In Digital Investigative Journalism. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97283-1_17.
Pełny tekst źródłaCao, Hong, and Alex C. Kot. "Detection of Tampering Inconsistencies on Mobile Photos." In Digital Watermarking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18405-5_9.
Pełny tekst źródłaWang, Wei, Jing Dong, and Tieniu Tan. "A Survey of Passive Image Tampering Detection." In Digital Watermarking. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03688-0_27.
Pełny tekst źródłaXu, Guanshuo, Jingyu Ye, and Yun-Qing Shi. "New Developments in Image Tampering Detection." In Digital-Forensics and Watermarking. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_1.
Pełny tekst źródłaAsaad, Aras, and Sabah Jassim. "Topological Data Analysis for Image Tampering Detection." In Digital Forensics and Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64185-0_11.
Pełny tekst źródłaChen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "Countering Universal Image Tampering Detection with Histogram Restoration." In Digital Forensics and Watermaking. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40099-5_23.
Pełny tekst źródłaSingleton, Mitchell B., and Qingzhong Liu. "Detecting Digital Photo Tampering with Deep Learning." In Machine Learning and Intelligent Communications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00557-3_47.
Pełny tekst źródłaSutthiwan, Patchara, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, and Wei Su. "Markovian Rake Transform for Digital Image Tampering Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24556-5_1.
Pełny tekst źródłaChen, Luyi, Shilin Wang, Shenghong Li, and Jianhua Li. "New Feature Presentation of Transition Probability Matrix for Image Tampering Detection." In Digital Forensics and Watermarking. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32205-1_30.
Pełny tekst źródłaChakraborty, Sunen, Paramita Dey, and Kingshuk Chatterjee. "Digital Image Tampering Detection Using Deep Learning: A Survey." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2710-4_17.
Pełny tekst źródłaStreszczenia konferencji na temat "Digital tampering"
Mo, Xiaolong, Huabiao Li, and Ruiwei Meng. "Research on the Application of Anti-tampering Technology in Digital Cultural Communication." In 2024 International Conference on Culture-Oriented Science & Technology (CoST). IEEE, 2024. http://dx.doi.org/10.1109/cost64302.2024.00029.
Pełny tekst źródłaZakey, Asmath, Dinura Bawantha, Dinuth Shehara, Nethmi Hasara, Kavinga Yapa Abeywardena, and Harinda Fernando. "A Dual-Branch CNN and Metadata Analysis Approach for Robust Image Tampering Detection." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012015.
Pełny tekst źródłaZhu, Nan, Kun Wang, and Xu Zhang. "Document image tampering detection and localization based on dual-path network with progressive supervision." In Seventeenth International Conference on Digital Image Processing (ICDIP 2025), edited by Xudong Jiang, Jindong Tian, Ting-Chung Poon, and Zhaohui Wang. SPIE, 2025. https://doi.org/10.1117/12.3073213.
Pełny tekst źródłaChaugule, Swapnil S., and Dalila B. Megherbi. "An Image Security System for Digital Private Image Exchange Using Redundant Watermarks for Authentication, Information Hiding, Tampering Detection, and Data Self-Recovery with Partial Carrier Capacity Utilization." In NAECON 2024 - IEEE National Aerospace and Electronics Conference. IEEE, 2024. http://dx.doi.org/10.1109/naecon61878.2024.10670631.
Pełny tekst źródłaAli, Zain, Areej Ahmed, and Hafsa Bibi. "Innovative Approaches to Liquefaction Mitigation in Seismic Zones: A Comprehensive Overview." In 14th International Civil Engineering Conference. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-78q4kr.
Pełny tekst źródłaMall, Vinod, Kedar Bhatt, Suman K. Mitra, and Anil K. Roy. "Exposing structural tampering in digital images." In 2012 IEEE International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2012. http://dx.doi.org/10.1109/ispcc.2012.6224369.
Pełny tekst źródłaTeerakanok, Songpon, and Tetsutaro Uehara. "Digital Media Tampering Detection Techniques: An Overview." In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2017. http://dx.doi.org/10.1109/compsac.2017.109.
Pełny tekst źródłaARGHIRESCU, Sebastian-Alexandru. "Security of Digital Files: Audio Tampering Detection." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.06.
Pełny tekst źródłaFan, Jiayuan, Tao Chen, and Jiuwen Cao. "Image tampering detection using noise histogram features." In 2015 IEEE International Conference on Digital Signal Processing (DSP). IEEE, 2015. http://dx.doi.org/10.1109/icdsp.2015.7252037.
Pełny tekst źródłaWang, Yulin, and Jian Zhao. "Asymmetric locating position of information hiding against tampering." In Second International Conference on Digital Image Processing. SPIE, 2010. http://dx.doi.org/10.1117/12.856010.
Pełny tekst źródła