Articoli di riviste sul tema "Image tamperings"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Image tamperings".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Gaffar, Achmad Fanany Onnilita, Supriadi Supriadi, Arief Bramanto Wicaksono Saputra, Rheo Malani e Agusma Wajiansyah. "A Splicing Technique for Image Tampering using Morphological Operations". Signal and Image Processing Letters 1, n. 2 (19 luglio 2019): 36–45. http://dx.doi.org/10.31763/simple.v1i2.4.
Testo completoSinghania, Shruti, Arju N.A e Raina Singh. "Image Tampering Detection Using Convolutional Neural Network". International Journal of Synthetic Emotions 10, n. 1 (gennaio 2019): 54–63. http://dx.doi.org/10.4018/ijse.2019010103.
Testo completoAgarwal, Ritu, e Mallika Pant. "Image tampering detection using genetic algorithm". MATEC Web of Conferences 277 (2019): 02026. http://dx.doi.org/10.1051/matecconf/201927702026.
Testo completoLi, Su Ying. "Round Descriptor Based on SIFT Operator Copy and Paste Forensics". Advanced Materials Research 912-914 (aprile 2014): 1379–82. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1379.
Testo completoZhan, Cai, Lu Leng, Chin-Chen Chang e Ji-Hwei Horng. "Reversible Image Fragile Watermarking with Dual Tampering Detection". Electronics 13, n. 10 (11 maggio 2024): 1884. http://dx.doi.org/10.3390/electronics13101884.
Testo completoChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm". Advanced Materials Research 1044-1045 (ottobre 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Testo completoLee, Chin-Feng, Chin-Ting Yeh, Jau-Ji Shen e Taeshik Shon. "Image Authentication and Restoration Using Block-Wise Variational Automatic Encoding and Generative Adversarial Networks". Electronics 12, n. 16 (10 agosto 2023): 3402. http://dx.doi.org/10.3390/electronics12163402.
Testo completoZeng, Pingping, Lianhui Tong, Yaru Liang, Nanrun Zhou e Jianhua Wu. "Multitask Image Splicing Tampering Detection Based on Attention Mechanism". Mathematics 10, n. 20 (17 ottobre 2022): 3852. http://dx.doi.org/10.3390/math10203852.
Testo completoMire, Archana V., Sanjay B. Dhok, Narendra J. Mistry e Prakash D. Porey. "Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting". International Journal of Digital Crime and Forensics 7, n. 4 (ottobre 2015): 33–54. http://dx.doi.org/10.4018/ijdcf.2015100103.
Testo completoThabit, Rasha, Jaffer Ali e Doaa Subhi. "Tampering Reveal Technique for Iris Images". International Journal of Computer Networks and Communications Security 8, n. 6 (30 giugno 2020): 46–51. http://dx.doi.org/10.47277/ijcncs/8(6)1.
Testo completoJena, Riyanka, Priyanka Singh e Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization". Journal of Imaging 9, n. 9 (27 agosto 2023): 172. http://dx.doi.org/10.3390/jimaging9090172.
Testo completoDoegar, Amit, Srinidhi Hiriyannaiah, G. M. Siddesh, K. G. Srinivasa e Maitreyee Dutta. "Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics". BioMed Research International 2021 (10 aprile 2021): 1–12. http://dx.doi.org/10.1155/2021/5546572.
Testo completoAbbadi, Nidhal, e Alyaa Mohsin. "Blind Digital Images Tampering Detection Based on Singular Value Decomposition". International Journal of Intelligent Engineering and Systems 13, n. 6 (31 dicembre 2020): 338–48. http://dx.doi.org/10.22266/ijies2020.1231.30.
Testo completoVijayaraghavan, P., M. Joe Nelson, R. Prasanna e M. K. Raghavendran. "Surveillance Footage Video Tampering Detection". Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, n. 01 (1 dicembre 2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.
Testo completoHu, Yuan-Yuan, Hao Luo e Xia-Mu Niu. "Image hashing framework for tampering localization in distorted images". IEICE Electronics Express 7, n. 22 (2010): 1679–85. http://dx.doi.org/10.1587/elex.7.1679.
Testo completoSathish, A., R. Aasha, P. Abinayasri e B. Kaviya. "Cyber vaccinator for image tamper resilient and recovery using invertible neural network". i-manager's Journal on Digital Forensics & Cyber Security 2, n. 1 (2024): 27. http://dx.doi.org/10.26634/jdf.2.1.21059.
Testo completoHuang, Chen-Hsiu, e Ja-Ling Wu. "A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression". Big Data and Cognitive Computing 9, n. 1 (15 gennaio 2025): 14. https://doi.org/10.3390/bdcc9010014.
Testo completoS, Manjunatha, e Malini M. Patil. "Efficient resampling features and convolution neural network model for image forgery detection". Indonesian Journal of Electrical Engineering and Computer Science 25, n. 1 (1 gennaio 2022): 183. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp183-190.
Testo completoS, Shashikala, e Ravikumar G K. "Technology Innovation: Detection of Counterfeit Region in an Image". ECS Transactions 107, n. 1 (24 aprile 2022): 4517–25. http://dx.doi.org/10.1149/10701.4517ecst.
Testo completoKe, Yongzhen, e Yiping Cui. "Multiple Fusion Strategies in Localization of Local Deformation Tampering". International Journal of Digital Crime and Forensics 13, n. 2 (marzo 2021): 103–14. http://dx.doi.org/10.4018/ijdcf.2021030107.
Testo completoWei, Wang, e Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection". Highlights in Science, Engineering and Technology 44 (13 aprile 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.
Testo completoShikalgar, Sajeeda, Rakesh K. Yadav e Parikshit N. Mahalle. "Lightweight MobileNet Model for Image Tempering Detection". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 5 (17 maggio 2023): 55–69. http://dx.doi.org/10.17762/ijritcc.v11i5.6524.
Testo completoKhachane, Siddharth, e Deepmalya Mondal. "Image Tampering Detection using Error Level Analysis and Concatenated Neural Networks". International Journal for Research in Applied Science and Engineering Technology 11, n. 7 (31 luglio 2023): 2011–18. http://dx.doi.org/10.22214/ijraset.2023.55067.
Testo completoZhang, Dengyong, Shanshan Wang, Jin Wang, Arun Kumar Sangaiah, Feng Li e Victor S. Sheng. "Detection of Tampering by Image Resizing Using Local Tchebichef Moments". Applied Sciences 9, n. 15 (26 luglio 2019): 3007. http://dx.doi.org/10.3390/app9153007.
Testo completoMire, Archana Vasant, Sanjay B. Dhok, Naresh J. Mistry e Prakash D. Porey. "Tampering Localization in Double Compressed Images by Investigating Noise Quantization". International Journal of Digital Crime and Forensics 8, n. 3 (luglio 2016): 46–62. http://dx.doi.org/10.4018/ijdcf.2016070104.
Testo completoJiang, Qingyi. "Image authentication and tamper localization based on coupling between adjacent pixels". Applied and Computational Engineering 74, n. 1 (11 luglio 2024): 27–39. http://dx.doi.org/10.54254/2755-2721/74/20240428.
Testo completoMuniappan, Ramaraj, Dhendapani Sabareeswaran, Chembath Jothish, Joe Arun Raja, Srividhya Selvaraj, Thangarasu Nainan, Bhaarathi Ilango e Dhinakaran Sumbramanian. "Optimizing feature extraction for tampering image detection using deep learning approaches". Indonesian Journal of Electrical Engineering and Computer Science 35, n. 3 (1 settembre 2024): 1853. http://dx.doi.org/10.11591/ijeecs.v35.i3.pp1853-1864.
Testo completoBashir, Iram, Fawad Ahmed, Jawad Ahmad, Wadii Boulila e Nouf Alharbi. "A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids". Entropy 21, n. 11 (19 novembre 2019): 1132. http://dx.doi.org/10.3390/e21111132.
Testo completoSiddiqui, Maha. "Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks". International Journal for Research in Applied Science and Engineering Technology 12, n. 3 (31 marzo 2024): 1267–75. http://dx.doi.org/10.22214/ijraset.2024.59034.
Testo completoSingh, Uday Vikram, Suyash Rastogi e Asim Ahmed. "Document Tampering Detection: A Comprehensive Review". International Journal for Research in Applied Science and Engineering Technology 12, n. 1 (31 gennaio 2024): 475–78. http://dx.doi.org/10.22214/ijraset.2024.57867.
Testo completoNaidu, Nalluri Brahma, Thokala Kavyasree, Tadikonda Ravi Teja, Pulimela Sushma Sarayu e Sivangula Sai. "Image Forgery Detection using ResNet50". International Journal for Research in Applied Science and Engineering Technology 12, n. 3 (31 marzo 2024): 2222–29. http://dx.doi.org/10.22214/ijraset.2024.59317.
Testo completoK Hebbar, Nagaveni, e Ashwini S Kunte. "TRANSFER LEARNING APPROACH FOR SPLICING AND COPY-MOVE IMAGE TAMPERING DETECTION". ICTACT Journal on Image and Video Processing 11, n. 4 (1 maggio 2021): 2447–52. http://dx.doi.org/10.21917/ijivp.2021.0348.
Testo completoWei, Xiaoyan, Yirong Wu, Fangmin Dong, Jun Zhang e Shuifa Sun. "Developing an Image Manipulation Detection Algorithm Based on Edge Detection and Faster R-CNN". Symmetry 11, n. 10 (1 ottobre 2019): 1223. http://dx.doi.org/10.3390/sym11101223.
Testo completoAbdali, Natiq M., e Zahir M. Hussain. "Reference-free differential histogram-correlative detection of steganography: performance analysis". Indonesian Journal of Electrical Engineering and Computer Science 25, n. 1 (1 gennaio 2022): 329. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp329-338.
Testo completoLi, Yewen, Wei Song, Xiaobing Zhao, Juan Wang e Lizhi Zhao. "A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System". Mathematics 7, n. 10 (12 ottobre 2019): 955. http://dx.doi.org/10.3390/math7100955.
Testo completoZhang, Jianyi, Xuanxi Huang, Yaqi Liu, Yuyang Han e Zixiao Xiang. "GAN-based medical image small region forgery detection via a two-stage cascade framework". PLOS ONE 19, n. 1 (2 gennaio 2024): e0290303. http://dx.doi.org/10.1371/journal.pone.0290303.
Testo completoShen, Jingyi, Yun Yao e Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants". International Journal for Innovation Education and Research 9, n. 11 (1 novembre 2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.
Testo completoXu, Zijie, e Erfu Wang. "An Algorithm for Detecting and Restoring Tampered Images Using Chaotic Watermark Embedding". Electronics 13, n. 18 (11 settembre 2024): 3604. http://dx.doi.org/10.3390/electronics13183604.
Testo completoAminu, Ali Ahmad, e Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)". Signal & Image Processing : An International Journal 12, n. 2 (30 aprile 2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.
Testo completoLi, Xuejing, Qiancheng Chen, Runfu Chu e Wei Wang. "Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability". PLOS ONE 19, n. 2 (2 febbraio 2024): e0297632. http://dx.doi.org/10.1371/journal.pone.0297632.
Testo completoPandey, Prof Divya, Prof Zeba Vishwakarma, Prof Mallika Dwivedi, Jatin Pasi e Shambhavi Pandey. "Advanced Detection of Document Tampering Using Structural Similarity Index and Image Analysis Techniques". International Journal of Multidisciplinary Research in Science, Engineering and Technology 6, n. 04 (25 novembre 2023): 945–50. http://dx.doi.org/10.15680/ijmrset.2023.0604035.
Testo completoRao, Jyoti, Sarika Jankar e Ashwini Jarali. "Image Tampering Detection and Repairing". International Journal of Computer Applications 85, n. 17 (16 gennaio 2014): 11–15. http://dx.doi.org/10.5120/14932-3468.
Testo completoLago, Federica, Quoc-Tin Phan e Giulia Boato. "Visual and Textual Analysis for Image Trustworthiness Assessment within Online News". Security and Communication Networks 2019 (14 aprile 2019): 1–14. http://dx.doi.org/10.1155/2019/9236910.
Testo completoAbu-Faraj, Mua’ad M., e Ziad A. Alqadi. "Image Encryption using Variable Length Blocks and Variable Length PK". International Journal of Computer Science and Mobile Computing 11, n. 3 (30 marzo 2022): 138–51. http://dx.doi.org/10.47760/ijcsmc.2022.v11i03.016.
Testo completoOyama, Tatsuya, Manami Hagizaki, Shunsuke Okura e Takeshi Fujino. "Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE". Sensors 24, n. 22 (5 novembre 2024): 7121. http://dx.doi.org/10.3390/s24227121.
Testo completoShivanandappa, Manjunatha, e Malini M. Patil. "Extraction of image resampling using correlation aware convolution neural networks for image tampering detection". International Journal of Electrical and Computer Engineering (IJECE) 12, n. 3 (1 giugno 2022): 3033. http://dx.doi.org/10.11591/ijece.v12i3.pp3033-3043.
Testo completoShabat, Hafedh Ali, Khamael Raqim Raheem e Wafaa Mohammed Ridha Shakir. "Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density". Journal of Image and Graphics 12, n. 1 (2024): 10–15. http://dx.doi.org/10.18178/joig.12.1.10-15.
Testo completoNathalie Diane, Wandji Nanda, Sun Xingming e Fah Kue Moise. "A Survey of Partition-Based Techniques for Copy-Move Forgery Detection". Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/975456.
Testo completoNiu, Dongmei, Hongxia Wang, Minquan Cheng e Canghong Shi. "Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction". Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2516324.
Testo completoT. Blessington, Dr Praveen, e Prof Ravindra Mule. "Image Forgery Detection Based on Parallel Convolutional Neural Networks". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 01 (30 gennaio 2024): 1–10. http://dx.doi.org/10.55041/ijsrem28428.
Testo completo