Journal articles on the topic 'Image tamperings'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Image tamperings.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gaffar, Achmad Fanany Onnilita, Supriadi Supriadi, Arief Bramanto Wicaksono Saputra, Rheo Malani, and Agusma Wajiansyah. "A Splicing Technique for Image Tampering using Morphological Operations." Signal and Image Processing Letters 1, no. 2 (July 19, 2019): 36–45. http://dx.doi.org/10.31763/simple.v1i2.4.
Full textSinghania, Shruti, Arju N.A, and Raina Singh. "Image Tampering Detection Using Convolutional Neural Network." International Journal of Synthetic Emotions 10, no. 1 (January 2019): 54–63. http://dx.doi.org/10.4018/ijse.2019010103.
Full textAgarwal, Ritu, and Mallika Pant. "Image tampering detection using genetic algorithm." MATEC Web of Conferences 277 (2019): 02026. http://dx.doi.org/10.1051/matecconf/201927702026.
Full textLi, Su Ying. "Round Descriptor Based on SIFT Operator Copy and Paste Forensics." Advanced Materials Research 912-914 (April 2014): 1379–82. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1379.
Full textZhan, Cai, Lu Leng, Chin-Chen Chang, and Ji-Hwei Horng. "Reversible Image Fragile Watermarking with Dual Tampering Detection." Electronics 13, no. 10 (May 11, 2024): 1884. http://dx.doi.org/10.3390/electronics13101884.
Full textChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm." Advanced Materials Research 1044-1045 (October 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Full textLee, Chin-Feng, Chin-Ting Yeh, Jau-Ji Shen, and Taeshik Shon. "Image Authentication and Restoration Using Block-Wise Variational Automatic Encoding and Generative Adversarial Networks." Electronics 12, no. 16 (August 10, 2023): 3402. http://dx.doi.org/10.3390/electronics12163402.
Full textZeng, Pingping, Lianhui Tong, Yaru Liang, Nanrun Zhou, and Jianhua Wu. "Multitask Image Splicing Tampering Detection Based on Attention Mechanism." Mathematics 10, no. 20 (October 17, 2022): 3852. http://dx.doi.org/10.3390/math10203852.
Full textMire, Archana V., Sanjay B. Dhok, Narendra J. Mistry, and Prakash D. Porey. "Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting." International Journal of Digital Crime and Forensics 7, no. 4 (October 2015): 33–54. http://dx.doi.org/10.4018/ijdcf.2015100103.
Full textThabit, Rasha, Jaffer Ali, and Doaa Subhi. "Tampering Reveal Technique for Iris Images." International Journal of Computer Networks and Communications Security 8, no. 6 (June 30, 2020): 46–51. http://dx.doi.org/10.47277/ijcncs/8(6)1.
Full textJena, Riyanka, Priyanka Singh, and Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization." Journal of Imaging 9, no. 9 (August 27, 2023): 172. http://dx.doi.org/10.3390/jimaging9090172.
Full textDoegar, Amit, Srinidhi Hiriyannaiah, G. M. Siddesh, K. G. Srinivasa, and Maitreyee Dutta. "Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics." BioMed Research International 2021 (April 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5546572.
Full textAbbadi, Nidhal, and Alyaa Mohsin. "Blind Digital Images Tampering Detection Based on Singular Value Decomposition." International Journal of Intelligent Engineering and Systems 13, no. 6 (December 31, 2020): 338–48. http://dx.doi.org/10.22266/ijies2020.1231.30.
Full textVijayaraghavan, P., M. Joe Nelson, R. Prasanna, and M. K. Raghavendran. "Surveillance Footage Video Tampering Detection." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (December 1, 2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.
Full textHu, Yuan-Yuan, Hao Luo, and Xia-Mu Niu. "Image hashing framework for tampering localization in distorted images." IEICE Electronics Express 7, no. 22 (2010): 1679–85. http://dx.doi.org/10.1587/elex.7.1679.
Full textSathish, A., R. Aasha, P. Abinayasri, and B. Kaviya. "Cyber vaccinator for image tamper resilient and recovery using invertible neural network." i-manager's Journal on Digital Forensics & Cyber Security 2, no. 1 (2024): 27. http://dx.doi.org/10.26634/jdf.2.1.21059.
Full textHuang, Chen-Hsiu, and Ja-Ling Wu. "A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression." Big Data and Cognitive Computing 9, no. 1 (January 15, 2025): 14. https://doi.org/10.3390/bdcc9010014.
Full textS, Manjunatha, and Malini M. Patil. "Efficient resampling features and convolution neural network model for image forgery detection." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (January 1, 2022): 183. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp183-190.
Full textS, Shashikala, and Ravikumar G K. "Technology Innovation: Detection of Counterfeit Region in an Image." ECS Transactions 107, no. 1 (April 24, 2022): 4517–25. http://dx.doi.org/10.1149/10701.4517ecst.
Full textKe, Yongzhen, and Yiping Cui. "Multiple Fusion Strategies in Localization of Local Deformation Tampering." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 103–14. http://dx.doi.org/10.4018/ijdcf.2021030107.
Full textWei, Wang, and Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection." Highlights in Science, Engineering and Technology 44 (April 13, 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.
Full textShikalgar, Sajeeda, Rakesh K. Yadav, and Parikshit N. Mahalle. "Lightweight MobileNet Model for Image Tempering Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (May 17, 2023): 55–69. http://dx.doi.org/10.17762/ijritcc.v11i5.6524.
Full textKhachane, Siddharth, and Deepmalya Mondal. "Image Tampering Detection using Error Level Analysis and Concatenated Neural Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (July 31, 2023): 2011–18. http://dx.doi.org/10.22214/ijraset.2023.55067.
Full textZhang, Dengyong, Shanshan Wang, Jin Wang, Arun Kumar Sangaiah, Feng Li, and Victor S. Sheng. "Detection of Tampering by Image Resizing Using Local Tchebichef Moments." Applied Sciences 9, no. 15 (July 26, 2019): 3007. http://dx.doi.org/10.3390/app9153007.
Full textMire, Archana Vasant, Sanjay B. Dhok, Naresh J. Mistry, and Prakash D. Porey. "Tampering Localization in Double Compressed Images by Investigating Noise Quantization." International Journal of Digital Crime and Forensics 8, no. 3 (July 2016): 46–62. http://dx.doi.org/10.4018/ijdcf.2016070104.
Full textJiang, Qingyi. "Image authentication and tamper localization based on coupling between adjacent pixels." Applied and Computational Engineering 74, no. 1 (July 11, 2024): 27–39. http://dx.doi.org/10.54254/2755-2721/74/20240428.
Full textMuniappan, Ramaraj, Dhendapani Sabareeswaran, Chembath Jothish, Joe Arun Raja, Srividhya Selvaraj, Thangarasu Nainan, Bhaarathi Ilango, and Dhinakaran Sumbramanian. "Optimizing feature extraction for tampering image detection using deep learning approaches." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (September 1, 2024): 1853. http://dx.doi.org/10.11591/ijeecs.v35.i3.pp1853-1864.
Full textBashir, Iram, Fawad Ahmed, Jawad Ahmad, Wadii Boulila, and Nouf Alharbi. "A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids." Entropy 21, no. 11 (November 19, 2019): 1132. http://dx.doi.org/10.3390/e21111132.
Full textSiddiqui, Maha. "Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 1267–75. http://dx.doi.org/10.22214/ijraset.2024.59034.
Full textSingh, Uday Vikram, Suyash Rastogi, and Asim Ahmed. "Document Tampering Detection: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 475–78. http://dx.doi.org/10.22214/ijraset.2024.57867.
Full textNaidu, Nalluri Brahma, Thokala Kavyasree, Tadikonda Ravi Teja, Pulimela Sushma Sarayu, and Sivangula Sai. "Image Forgery Detection using ResNet50." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 2222–29. http://dx.doi.org/10.22214/ijraset.2024.59317.
Full textK Hebbar, Nagaveni, and Ashwini S Kunte. "TRANSFER LEARNING APPROACH FOR SPLICING AND COPY-MOVE IMAGE TAMPERING DETECTION." ICTACT Journal on Image and Video Processing 11, no. 4 (May 1, 2021): 2447–52. http://dx.doi.org/10.21917/ijivp.2021.0348.
Full textWei, Xiaoyan, Yirong Wu, Fangmin Dong, Jun Zhang, and Shuifa Sun. "Developing an Image Manipulation Detection Algorithm Based on Edge Detection and Faster R-CNN." Symmetry 11, no. 10 (October 1, 2019): 1223. http://dx.doi.org/10.3390/sym11101223.
Full textAbdali, Natiq M., and Zahir M. Hussain. "Reference-free differential histogram-correlative detection of steganography: performance analysis." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (January 1, 2022): 329. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp329-338.
Full textLi, Yewen, Wei Song, Xiaobing Zhao, Juan Wang, and Lizhi Zhao. "A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System." Mathematics 7, no. 10 (October 12, 2019): 955. http://dx.doi.org/10.3390/math7100955.
Full textZhang, Jianyi, Xuanxi Huang, Yaqi Liu, Yuyang Han, and Zixiao Xiang. "GAN-based medical image small region forgery detection via a two-stage cascade framework." PLOS ONE 19, no. 1 (January 2, 2024): e0290303. http://dx.doi.org/10.1371/journal.pone.0290303.
Full textShen, Jingyi, Yun Yao, and Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants." International Journal for Innovation Education and Research 9, no. 11 (November 1, 2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.
Full textXu, Zijie, and Erfu Wang. "An Algorithm for Detecting and Restoring Tampered Images Using Chaotic Watermark Embedding." Electronics 13, no. 18 (September 11, 2024): 3604. http://dx.doi.org/10.3390/electronics13183604.
Full textAminu, Ali Ahmad, and Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)." Signal & Image Processing : An International Journal 12, no. 2 (April 30, 2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.
Full textLi, Xuejing, Qiancheng Chen, Runfu Chu, and Wei Wang. "Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability." PLOS ONE 19, no. 2 (February 2, 2024): e0297632. http://dx.doi.org/10.1371/journal.pone.0297632.
Full textPandey, Prof Divya, Prof Zeba Vishwakarma, Prof Mallika Dwivedi, Jatin Pasi, and Shambhavi Pandey. "Advanced Detection of Document Tampering Using Structural Similarity Index and Image Analysis Techniques." International Journal of Multidisciplinary Research in Science, Engineering and Technology 6, no. 04 (November 25, 2023): 945–50. http://dx.doi.org/10.15680/ijmrset.2023.0604035.
Full textRao, Jyoti, Sarika Jankar, and Ashwini Jarali. "Image Tampering Detection and Repairing." International Journal of Computer Applications 85, no. 17 (January 16, 2014): 11–15. http://dx.doi.org/10.5120/14932-3468.
Full textLago, Federica, Quoc-Tin Phan, and Giulia Boato. "Visual and Textual Analysis for Image Trustworthiness Assessment within Online News." Security and Communication Networks 2019 (April 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/9236910.
Full textAbu-Faraj, Mua’ad M., and Ziad A. Alqadi. "Image Encryption using Variable Length Blocks and Variable Length PK." International Journal of Computer Science and Mobile Computing 11, no. 3 (March 30, 2022): 138–51. http://dx.doi.org/10.47760/ijcsmc.2022.v11i03.016.
Full textOyama, Tatsuya, Manami Hagizaki, Shunsuke Okura, and Takeshi Fujino. "Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE." Sensors 24, no. 22 (November 5, 2024): 7121. http://dx.doi.org/10.3390/s24227121.
Full textShivanandappa, Manjunatha, and Malini M. Patil. "Extraction of image resampling using correlation aware convolution neural networks for image tampering detection." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (June 1, 2022): 3033. http://dx.doi.org/10.11591/ijece.v12i3.pp3033-3043.
Full textShabat, Hafedh Ali, Khamael Raqim Raheem, and Wafaa Mohammed Ridha Shakir. "Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density." Journal of Image and Graphics 12, no. 1 (2024): 10–15. http://dx.doi.org/10.18178/joig.12.1.10-15.
Full textNathalie Diane, Wandji Nanda, Sun Xingming, and Fah Kue Moise. "A Survey of Partition-Based Techniques for Copy-Move Forgery Detection." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/975456.
Full textNiu, Dongmei, Hongxia Wang, Minquan Cheng, and Canghong Shi. "Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2516324.
Full textT. Blessington, Dr Praveen, and Prof Ravindra Mule. "Image Forgery Detection Based on Parallel Convolutional Neural Networks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (January 30, 2024): 1–10. http://dx.doi.org/10.55041/ijsrem28428.
Full text