Artykuły w czasopismach na temat „Digital tampering”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Digital tampering”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Shen, Jingyi, Yun Yao, and Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants." International Journal for Innovation Education and Research 9, no. 11 (2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.
Pełny tekst źródłaChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Pełny tekst źródłaFreiling, Felix, and Leonhard Hösch. "Controlled experiments in digital evidence tampering." Digital Investigation 24 (March 2018): S83—S92. http://dx.doi.org/10.1016/j.diin.2018.01.011.
Pełny tekst źródłaAminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.
Pełny tekst źródłaTang, Bin, Mengyao Sun, Haowen Zheng, Haiyun Han, and Yu Jin. "Analysis of Digital Media Image Tampering and Forgery Control." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 1073–77. http://dx.doi.org/10.62051/f9e87g27.
Pełny tekst źródłaWei, Wang, and Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection." Highlights in Science, Engineering and Technology 44 (April 13, 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.
Pełny tekst źródłaMualfah, Desti, Yoze Rizki, and Meiriladiwis Gea. "Analisis Digital Forensik Keaslian Video Rekaman CCTV Menggunakan Metode Localization Tampering." Jurnal CoSciTech (Computer Science and Information Technology) 3, no. 1 (2022): 43–51. http://dx.doi.org/10.37859/coscitech.v3i1.3697.
Pełny tekst źródłaMainoo, Bernard. "Digital Multimedia Tampering Detection for Forensics Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 81–90. http://dx.doi.org/10.22624/aims/crp-bk3-p14.
Pełny tekst źródłaSchneider, Janine, Linus Düsel, Benedikt Lorch, Julia Drafz, and Felix Freiling. "Prudent design principles for digital tampering experiments." Forensic Science International: Digital Investigation 40 (April 2022): 301334. http://dx.doi.org/10.1016/j.fsidi.2022.301334.
Pełny tekst źródłaParashar, Nishtha, and Nirupama Tiwari. "A Survey Of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 10 (2015): 91–96. http://dx.doi.org/10.14257/ijsip.2015.8.10.10.
Pełny tekst źródłaParashar, Nishtha, Nirupama Tiwari, and Deepika Dubey. "A Survey of Digital Image Tampering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 9, no. 2 (2016): 415–20. http://dx.doi.org/10.14257/ijsip.2016.9.2.35.
Pełny tekst źródłaJoseph*, Silpa, and S. Palani kumar. "Detection and Localization of Image and Video Tampering." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (2020): 1951–56. http://dx.doi.org/10.35940/ijitee.c1158.029420.
Pełny tekst źródłaJain, Ayushi. "Tampering Detection and Content Authentication Using Encrypted Perceptual Hash for Image Database." Mathematical Statistician and Engineering Applications 70, no. 2 (2021): 1695–705. http://dx.doi.org/10.17762/msea.v70i2.2460.
Pełny tekst źródłaLi, Su Ying. "Round Descriptor Based on SIFT Operator Copy and Paste Forensics." Advanced Materials Research 912-914 (April 2014): 1379–82. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1379.
Pełny tekst źródłaShkilev, Roman, Alevtina Kormiltseva, Marina Achaeva, Aiziryak Tarasova, and Marguba Matquliyeva. "Fortifying Textual Integrity: Evolutionary Optimization-powered Watermarking for Tampering Attack Detection in Digital Documents." Fusion: Practice and Applications 14, no. 2 (2024): 97–108. http://dx.doi.org/10.54216/fpa.140208.
Pełny tekst źródłaSarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Pełny tekst źródłaCrescentia.A, Anto, and Sujatha G. "An Overview of Digital Video Tampering Detection Using Passive Methods and D-Hash Algorithm." International Journal of Engineering & Technology 7, no. 4.6 (2018): 373. http://dx.doi.org/10.14419/ijet.v7i4.6.28444.
Pełny tekst źródłaAgarwal, Ritu, and Mallika Pant. "Image tampering detection using genetic algorithm." MATEC Web of Conferences 277 (2019): 02026. http://dx.doi.org/10.1051/matecconf/201927702026.
Pełny tekst źródłaFallahpour, Mehdi, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao. "Tampering Detection in Compressed Digital Video Using Watermarking." IEEE Transactions on Instrumentation and Measurement 63, no. 5 (2014): 1057–72. http://dx.doi.org/10.1109/tim.2014.2299371.
Pełny tekst źródłaHsu, Ching-Sheng, and Shu-Fen Tu. "Probability-based tampering detection scheme for digital images." Optics Communications 283, no. 9 (2010): 1737–43. http://dx.doi.org/10.1016/j.optcom.2009.12.073.
Pełny tekst źródłaChen, Xiangning, Weitao Yuan, Shengbei Wang, Chao Wang, and Lin Wang. "Speech Watermarking for Tampering Detection Based on Modifications to LSFs." Mathematical Problems in Engineering 2019 (December 17, 2019): 1–10. http://dx.doi.org/10.1155/2019/7285624.
Pełny tekst źródłaZeng, Pingping, Lianhui Tong, Yaru Liang, Nanrun Zhou, and Jianhua Wu. "Multitask Image Splicing Tampering Detection Based on Attention Mechanism." Mathematics 10, no. 20 (2022): 3852. http://dx.doi.org/10.3390/math10203852.
Pełny tekst źródłaLu, Wenhuan, Zonglei Chen, Ling Li, et al. "Watermarking Based on Compressive Sensing for Digital Speech Detection and Recovery †." Sensors 18, no. 7 (2018): 2390. http://dx.doi.org/10.3390/s18072390.
Pełny tekst źródłaGuan, Zekai. "A Review of Feature Matching Based Image Tampering Detection Methods." Applied and Computational Engineering 135, no. 1 (2025): 49–56. https://doi.org/10.54254/2755-2721/2025.21080.
Pełny tekst źródłaK. K, Sindhu. "Digital Forensic Investigation on File System And Database Tampering." IOSR Journal of Engineering 02, no. 02 (2012): 2142–221. http://dx.doi.org/10.9790/3021-0202214221.
Pełny tekst źródłaAnderson, C. "Easy-to-alter digital images raise fears of tampering." Science 263, no. 5145 (1994): 317–18. http://dx.doi.org/10.1126/science.8278802.
Pełny tekst źródłaSitara, K., and B. M. Mehtre. "Digital video tampering detection: An overview of passive techniques." Digital Investigation 18 (September 2016): 8–22. http://dx.doi.org/10.1016/j.diin.2016.06.003.
Pełny tekst źródłaVijayaraghavan, P., M. Joe Nelson, R. Prasanna, and M. K. Raghavendran. "Surveillance Footage Video Tampering Detection." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.
Pełny tekst źródłaAlfian, Alfiansyah Imanda Putra, Rusydi Umar, and Abdul Fadlil. "Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 2 (2021): 400–406. http://dx.doi.org/10.29207/resti.v5i2.3015.
Pełny tekst źródłaLi, Yewen, Wei Song, Xiaobing Zhao, Juan Wang, and Lizhi Zhao. "A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System." Mathematics 7, no. 10 (2019): 955. http://dx.doi.org/10.3390/math7100955.
Pełny tekst źródłaHe, Yong Hui. "Image Tampering with Evidence Algorithm Based on Copy and Paste." Advanced Materials Research 1044-1045 (October 2014): 1178–81. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1178.
Pełny tekst źródłaWang, Xinyi, Shaozhang Niu, and Jiwei Zhang. "Digital Image Forensics Based on CFA Interpolation Feature and Gaussian Mixture Model." International Journal of Digital Crime and Forensics 11, no. 2 (2019): 1–12. http://dx.doi.org/10.4018/ijdcf.2019040101.
Pełny tekst źródłaKhachane, Siddharth, and Deepmalya Mondal. "Image Tampering Detection using Error Level Analysis and Concatenated Neural Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 2011–18. http://dx.doi.org/10.22214/ijraset.2023.55067.
Pełny tekst źródłaM, N. Vinitha Reddy, Thirumalesh K, Devraju P, Waseem Baig M, and Mohammed Ali S. "Bridging Restoration and Forensics: A Novel Framework for Image Tampering Detection." International Journal of Computational Learning & Intelligence 4, no. 3 (2025): 513–21. https://doi.org/10.5281/zenodo.15210515.
Pełny tekst źródłaKingra, Staffy, Naveen Aggarwal, and Raahat Devender Singh. "Video Inter-frame Forgery Detection Approach for Surveillance and Mobile Recorded Videos." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 831. http://dx.doi.org/10.11591/ijece.v7i2.pp831-841.
Pełny tekst źródłaStaffy, Kingra, Aggarwal Naveen, and Devender Singh Raahat. "Mobile Recorded Videos." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (2017): 831–41. https://doi.org/10.11591/ijece.v7i2.pp831-841.
Pełny tekst źródłaSadiku, Matthew N. O., Adebowale E. Shadare, and Sarhan M. Musa. "Digital Chain of Custody." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 117. http://dx.doi.org/10.23956/ijarcsse.v7i7.109.
Pełny tekst źródłaManikantan, K. "Analyse And Overview on Digital Image Tampering Detection Using Matlab." International Journal of Computer Sciences and Engineering 6, no. 8 (2018): 902–6. http://dx.doi.org/10.26438/ijcse/v6i8.902906.
Pełny tekst źródłaBourouis, Sami, Roobaea Alroobaea, Abdullah M. Alharbi, Murad Andejany, and Saeed Rubaiee. "Recent Advances in Digital Multimedia Tampering Detection for Forensics Analysis." Symmetry 12, no. 11 (2020): 1811. http://dx.doi.org/10.3390/sym12111811.
Pełny tekst źródłaYang, Chen-Kuei, and Chang-Sheng Huang. "A Novel Watermarking Technique for Tampering Detection in Digital Images." ELCVIA Electronic Letters on Computer Vision and Image Analysis 3, no. 1 (2003): 1. http://dx.doi.org/10.5565/rev/elcvia.65.
Pełny tekst źródłaWei, Hui, Gao-bo Yang, and Ming Xia. "A Digital Video Tampering Forensics Scheme Based on Forensics Hash." Journal of Electronics & Information Technology 35, no. 12 (2014): 2934–41. http://dx.doi.org/10.3724/sp.j.1146.2013.00296.
Pełny tekst źródłaAbbadi, Nidhal, and Alyaa Mohsin. "Blind Digital Images Tampering Detection Based on Singular Value Decomposition." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 338–48. http://dx.doi.org/10.22266/ijies2020.1231.30.
Pełny tekst źródłaSaha, Monica. "Forensic Technique for Forgery Detection and Localization in Digital Image." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2721–27. https://doi.org/10.22214/ijraset.2025.68495.
Pełny tekst źródłaNour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab. "Anti- Forensics: The Tampering of Media." International Journal on Recent and Innovation Trends in Computing and Communication 8, no. 10 (2020): 06–30. http://dx.doi.org/10.17762/ijritcc.v8i10.5447.
Pełny tekst źródłaS, Manjunatha, and Malini M. Patil. "Efficient resampling features and convolution neural network model for image forgery detection." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (2022): 183. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp183-190.
Pełny tekst źródłaS, Manjunatha, and Malini M. Patil. "Efficient resampling features and convolution neural network model for image forgery detection." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (2022): 183–90. https://doi.org/10.11591/ijeecs.v25.i1.pp183-190.
Pełny tekst źródłaAkhtar, Naheed, Mubbashar Saddique, Khurshid Asghar, Usama Ijaz Bajwa, Muhammad Hussain, and Zulfiqar Habib. "Digital Video Tampering Detection and Localization: Review, Representations, Challenges and Algorithm." Mathematics 10, no. 2 (2022): 168. http://dx.doi.org/10.3390/math10020168.
Pełny tekst źródłaOnn, Ng Ching, Siti Nur Avivah, Mohammad Minhazul Alam, and Abubakar Ahmad. "Secure and Effective Image Integrity and Copyright Protection Using Two-Layer Authentication with Integer Wavelet Transform." IJACI : International Journal of Advanced Computing and Informatics 1, no. 1 (2025): 13–27. https://doi.org/10.71129/ijaci.v1.i1.pp13-27.
Pełny tekst źródłaGorle, Ramesh, and Anitha Guttavelli. "Enhanced Image Tampering Detection using Error Level Analysis and CNN." Engineering, Technology & Applied Science Research 15, no. 1 (2025): 19683–89. https://doi.org/10.48084/etasr.9593.
Pełny tekst źródłaLi, Xuejing, Qiancheng Chen, Runfu Chu, and Wei Wang. "Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability." PLOS ONE 19, no. 2 (2024): e0297632. http://dx.doi.org/10.1371/journal.pone.0297632.
Pełny tekst źródła