Artigos de revistas sobre o tema "Image tamperings"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Image tamperings".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Gaffar, Achmad Fanany Onnilita, Supriadi Supriadi, Arief Bramanto Wicaksono Saputra, Rheo Malani e Agusma Wajiansyah. "A Splicing Technique for Image Tampering using Morphological Operations". Signal and Image Processing Letters 1, n.º 2 (19 de julho de 2019): 36–45. http://dx.doi.org/10.31763/simple.v1i2.4.
Texto completo da fonteSinghania, Shruti, Arju N.A e Raina Singh. "Image Tampering Detection Using Convolutional Neural Network". International Journal of Synthetic Emotions 10, n.º 1 (janeiro de 2019): 54–63. http://dx.doi.org/10.4018/ijse.2019010103.
Texto completo da fonteAgarwal, Ritu, e Mallika Pant. "Image tampering detection using genetic algorithm". MATEC Web of Conferences 277 (2019): 02026. http://dx.doi.org/10.1051/matecconf/201927702026.
Texto completo da fonteLi, Su Ying. "Round Descriptor Based on SIFT Operator Copy and Paste Forensics". Advanced Materials Research 912-914 (abril de 2014): 1379–82. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1379.
Texto completo da fonteZhan, Cai, Lu Leng, Chin-Chen Chang e Ji-Hwei Horng. "Reversible Image Fragile Watermarking with Dual Tampering Detection". Electronics 13, n.º 10 (11 de maio de 2024): 1884. http://dx.doi.org/10.3390/electronics13101884.
Texto completo da fonteChang, Yu Hong. "Based on Digital Image Forensics Double JPEG Compression Algorithm". Advanced Materials Research 1044-1045 (outubro de 2014): 1098–101. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1098.
Texto completo da fonteLee, Chin-Feng, Chin-Ting Yeh, Jau-Ji Shen e Taeshik Shon. "Image Authentication and Restoration Using Block-Wise Variational Automatic Encoding and Generative Adversarial Networks". Electronics 12, n.º 16 (10 de agosto de 2023): 3402. http://dx.doi.org/10.3390/electronics12163402.
Texto completo da fonteZeng, Pingping, Lianhui Tong, Yaru Liang, Nanrun Zhou e Jianhua Wu. "Multitask Image Splicing Tampering Detection Based on Attention Mechanism". Mathematics 10, n.º 20 (17 de outubro de 2022): 3852. http://dx.doi.org/10.3390/math10203852.
Texto completo da fonteMire, Archana V., Sanjay B. Dhok, Narendra J. Mistry e Prakash D. Porey. "Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting". International Journal of Digital Crime and Forensics 7, n.º 4 (outubro de 2015): 33–54. http://dx.doi.org/10.4018/ijdcf.2015100103.
Texto completo da fonteThabit, Rasha, Jaffer Ali e Doaa Subhi. "Tampering Reveal Technique for Iris Images". International Journal of Computer Networks and Communications Security 8, n.º 6 (30 de junho de 2020): 46–51. http://dx.doi.org/10.47277/ijcncs/8(6)1.
Texto completo da fonteJena, Riyanka, Priyanka Singh e Manoranjan Mohanty. "PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization". Journal of Imaging 9, n.º 9 (27 de agosto de 2023): 172. http://dx.doi.org/10.3390/jimaging9090172.
Texto completo da fonteDoegar, Amit, Srinidhi Hiriyannaiah, G. M. Siddesh, K. G. Srinivasa e Maitreyee Dutta. "Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics". BioMed Research International 2021 (10 de abril de 2021): 1–12. http://dx.doi.org/10.1155/2021/5546572.
Texto completo da fonteAbbadi, Nidhal, e Alyaa Mohsin. "Blind Digital Images Tampering Detection Based on Singular Value Decomposition". International Journal of Intelligent Engineering and Systems 13, n.º 6 (31 de dezembro de 2020): 338–48. http://dx.doi.org/10.22266/ijies2020.1231.30.
Texto completo da fonteVijayaraghavan, P., M. Joe Nelson, R. Prasanna e M. K. Raghavendran. "Surveillance Footage Video Tampering Detection". Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, n.º 01 (1 de dezembro de 2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.
Texto completo da fonteHu, Yuan-Yuan, Hao Luo e Xia-Mu Niu. "Image hashing framework for tampering localization in distorted images". IEICE Electronics Express 7, n.º 22 (2010): 1679–85. http://dx.doi.org/10.1587/elex.7.1679.
Texto completo da fonteSathish, A., R. Aasha, P. Abinayasri e B. Kaviya. "Cyber vaccinator for image tamper resilient and recovery using invertible neural network". i-manager's Journal on Digital Forensics & Cyber Security 2, n.º 1 (2024): 27. http://dx.doi.org/10.26634/jdf.2.1.21059.
Texto completo da fonteHuang, Chen-Hsiu, e Ja-Ling Wu. "A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression". Big Data and Cognitive Computing 9, n.º 1 (15 de janeiro de 2025): 14. https://doi.org/10.3390/bdcc9010014.
Texto completo da fonteS, Manjunatha, e Malini M. Patil. "Efficient resampling features and convolution neural network model for image forgery detection". Indonesian Journal of Electrical Engineering and Computer Science 25, n.º 1 (1 de janeiro de 2022): 183. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp183-190.
Texto completo da fonteS, Shashikala, e Ravikumar G K. "Technology Innovation: Detection of Counterfeit Region in an Image". ECS Transactions 107, n.º 1 (24 de abril de 2022): 4517–25. http://dx.doi.org/10.1149/10701.4517ecst.
Texto completo da fonteKe, Yongzhen, e Yiping Cui. "Multiple Fusion Strategies in Localization of Local Deformation Tampering". International Journal of Digital Crime and Forensics 13, n.º 2 (março de 2021): 103–14. http://dx.doi.org/10.4018/ijdcf.2021030107.
Texto completo da fonteWei, Wang, e Tang Bin. "Analysis on Feasible Methods of Digital Image Tampering Detection". Highlights in Science, Engineering and Technology 44 (13 de abril de 2023): 371–76. http://dx.doi.org/10.54097/hset.v44i.7386.
Texto completo da fonteShikalgar, Sajeeda, Rakesh K. Yadav e Parikshit N. Mahalle. "Lightweight MobileNet Model for Image Tempering Detection". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 5 (17 de maio de 2023): 55–69. http://dx.doi.org/10.17762/ijritcc.v11i5.6524.
Texto completo da fonteKhachane, Siddharth, e Deepmalya Mondal. "Image Tampering Detection using Error Level Analysis and Concatenated Neural Networks". International Journal for Research in Applied Science and Engineering Technology 11, n.º 7 (31 de julho de 2023): 2011–18. http://dx.doi.org/10.22214/ijraset.2023.55067.
Texto completo da fonteZhang, Dengyong, Shanshan Wang, Jin Wang, Arun Kumar Sangaiah, Feng Li e Victor S. Sheng. "Detection of Tampering by Image Resizing Using Local Tchebichef Moments". Applied Sciences 9, n.º 15 (26 de julho de 2019): 3007. http://dx.doi.org/10.3390/app9153007.
Texto completo da fonteMire, Archana Vasant, Sanjay B. Dhok, Naresh J. Mistry e Prakash D. Porey. "Tampering Localization in Double Compressed Images by Investigating Noise Quantization". International Journal of Digital Crime and Forensics 8, n.º 3 (julho de 2016): 46–62. http://dx.doi.org/10.4018/ijdcf.2016070104.
Texto completo da fonteJiang, Qingyi. "Image authentication and tamper localization based on coupling between adjacent pixels". Applied and Computational Engineering 74, n.º 1 (11 de julho de 2024): 27–39. http://dx.doi.org/10.54254/2755-2721/74/20240428.
Texto completo da fonteMuniappan, Ramaraj, Dhendapani Sabareeswaran, Chembath Jothish, Joe Arun Raja, Srividhya Selvaraj, Thangarasu Nainan, Bhaarathi Ilango e Dhinakaran Sumbramanian. "Optimizing feature extraction for tampering image detection using deep learning approaches". Indonesian Journal of Electrical Engineering and Computer Science 35, n.º 3 (1 de setembro de 2024): 1853. http://dx.doi.org/10.11591/ijeecs.v35.i3.pp1853-1864.
Texto completo da fonteBashir, Iram, Fawad Ahmed, Jawad Ahmad, Wadii Boulila e Nouf Alharbi. "A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids". Entropy 21, n.º 11 (19 de novembro de 2019): 1132. http://dx.doi.org/10.3390/e21111132.
Texto completo da fonteSiddiqui, Maha. "Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de março de 2024): 1267–75. http://dx.doi.org/10.22214/ijraset.2024.59034.
Texto completo da fonteSingh, Uday Vikram, Suyash Rastogi e Asim Ahmed. "Document Tampering Detection: A Comprehensive Review". International Journal for Research in Applied Science and Engineering Technology 12, n.º 1 (31 de janeiro de 2024): 475–78. http://dx.doi.org/10.22214/ijraset.2024.57867.
Texto completo da fonteNaidu, Nalluri Brahma, Thokala Kavyasree, Tadikonda Ravi Teja, Pulimela Sushma Sarayu e Sivangula Sai. "Image Forgery Detection using ResNet50". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de março de 2024): 2222–29. http://dx.doi.org/10.22214/ijraset.2024.59317.
Texto completo da fonteK Hebbar, Nagaveni, e Ashwini S Kunte. "TRANSFER LEARNING APPROACH FOR SPLICING AND COPY-MOVE IMAGE TAMPERING DETECTION". ICTACT Journal on Image and Video Processing 11, n.º 4 (1 de maio de 2021): 2447–52. http://dx.doi.org/10.21917/ijivp.2021.0348.
Texto completo da fonteWei, Xiaoyan, Yirong Wu, Fangmin Dong, Jun Zhang e Shuifa Sun. "Developing an Image Manipulation Detection Algorithm Based on Edge Detection and Faster R-CNN". Symmetry 11, n.º 10 (1 de outubro de 2019): 1223. http://dx.doi.org/10.3390/sym11101223.
Texto completo da fonteAbdali, Natiq M., e Zahir M. Hussain. "Reference-free differential histogram-correlative detection of steganography: performance analysis". Indonesian Journal of Electrical Engineering and Computer Science 25, n.º 1 (1 de janeiro de 2022): 329. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp329-338.
Texto completo da fonteLi, Yewen, Wei Song, Xiaobing Zhao, Juan Wang e Lizhi Zhao. "A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System". Mathematics 7, n.º 10 (12 de outubro de 2019): 955. http://dx.doi.org/10.3390/math7100955.
Texto completo da fonteZhang, Jianyi, Xuanxi Huang, Yaqi Liu, Yuyang Han e Zixiao Xiang. "GAN-based medical image small region forgery detection via a two-stage cascade framework". PLOS ONE 19, n.º 1 (2 de janeiro de 2024): e0290303. http://dx.doi.org/10.1371/journal.pone.0290303.
Texto completo da fonteShen, Jingyi, Yun Yao e Hao Mei. "Design of Image Copy-Paste Forensics System Based on Moment Invariants". International Journal for Innovation Education and Research 9, n.º 11 (1 de novembro de 2021): 552–55. http://dx.doi.org/10.31686/ijier.vol9.iss11.3547.
Texto completo da fonteXu, Zijie, e Erfu Wang. "An Algorithm for Detecting and Restoring Tampered Images Using Chaotic Watermark Embedding". Electronics 13, n.º 18 (11 de setembro de 2024): 3604. http://dx.doi.org/10.3390/electronics13183604.
Texto completo da fonteAminu, Ali Ahmad, e Nwojo Nnanna Agwu. "General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP)". Signal & Image Processing : An International Journal 12, n.º 2 (30 de abril de 2021): 13–32. http://dx.doi.org/10.5121/sipij.2021.12202.
Texto completo da fonteLi, Xuejing, Qiancheng Chen, Runfu Chu e Wei Wang. "Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability". PLOS ONE 19, n.º 2 (2 de fevereiro de 2024): e0297632. http://dx.doi.org/10.1371/journal.pone.0297632.
Texto completo da fontePandey, Prof Divya, Prof Zeba Vishwakarma, Prof Mallika Dwivedi, Jatin Pasi e Shambhavi Pandey. "Advanced Detection of Document Tampering Using Structural Similarity Index and Image Analysis Techniques". International Journal of Multidisciplinary Research in Science, Engineering and Technology 6, n.º 04 (25 de novembro de 2023): 945–50. http://dx.doi.org/10.15680/ijmrset.2023.0604035.
Texto completo da fonteRao, Jyoti, Sarika Jankar e Ashwini Jarali. "Image Tampering Detection and Repairing". International Journal of Computer Applications 85, n.º 17 (16 de janeiro de 2014): 11–15. http://dx.doi.org/10.5120/14932-3468.
Texto completo da fonteLago, Federica, Quoc-Tin Phan e Giulia Boato. "Visual and Textual Analysis for Image Trustworthiness Assessment within Online News". Security and Communication Networks 2019 (14 de abril de 2019): 1–14. http://dx.doi.org/10.1155/2019/9236910.
Texto completo da fonteAbu-Faraj, Mua’ad M., e Ziad A. Alqadi. "Image Encryption using Variable Length Blocks and Variable Length PK". International Journal of Computer Science and Mobile Computing 11, n.º 3 (30 de março de 2022): 138–51. http://dx.doi.org/10.47760/ijcsmc.2022.v11i03.016.
Texto completo da fonteOyama, Tatsuya, Manami Hagizaki, Shunsuke Okura e Takeshi Fujino. "Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE". Sensors 24, n.º 22 (5 de novembro de 2024): 7121. http://dx.doi.org/10.3390/s24227121.
Texto completo da fonteShivanandappa, Manjunatha, e Malini M. Patil. "Extraction of image resampling using correlation aware convolution neural networks for image tampering detection". International Journal of Electrical and Computer Engineering (IJECE) 12, n.º 3 (1 de junho de 2022): 3033. http://dx.doi.org/10.11591/ijece.v12i3.pp3033-3043.
Texto completo da fonteShabat, Hafedh Ali, Khamael Raqim Raheem e Wafaa Mohammed Ridha Shakir. "Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density". Journal of Image and Graphics 12, n.º 1 (2024): 10–15. http://dx.doi.org/10.18178/joig.12.1.10-15.
Texto completo da fonteNathalie Diane, Wandji Nanda, Sun Xingming e Fah Kue Moise. "A Survey of Partition-Based Techniques for Copy-Move Forgery Detection". Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/975456.
Texto completo da fonteNiu, Dongmei, Hongxia Wang, Minquan Cheng e Canghong Shi. "Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction". Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2516324.
Texto completo da fonteT. Blessington, Dr Praveen, e Prof Ravindra Mule. "Image Forgery Detection Based on Parallel Convolutional Neural Networks". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 01 (30 de janeiro de 2024): 1–10. http://dx.doi.org/10.55041/ijsrem28428.
Texto completo da fonte