Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Benford's law applied to digital forensic analysis
P Fernandes, M Antunes - Forensic Science International: Digital …, 2023 - Elsevier
Tampered digital multimedia content has been increasingly used in a wide set of
cyberattacks, challenging criminal investigations and law enforcement authorities. The …
cyberattacks, challenging criminal investigations and law enforcement authorities. The …
Detecting visually similar web pages: Application to phishing detection
We propose a novel approach for detecting visual similarity between two Web pages. The
proposed approach applies Gestalt theory and considers a Web page as a single indivisible …
proposed approach applies Gestalt theory and considers a Web page as a single indivisible …
[PDF][PDF] Conceptualizing Birkhoff's Aesthetic Measure Using Shannon Entropy and Kolmogorov Complexity.
Abstract In 1928, George D. Birkhoff introduced the Aesthetic Measure, defined as the ratio
between order and complexity, and, in 1965, Max Bense analyzed Birkhoff's measure from …
between order and complexity, and, in 1965, Max Bense analyzed Birkhoff's measure from …
An anti-phishing system employing diffused information
TC Chen, T Stepan, S Dick, J Miller - ACM Transactions on Information …, 2014 - dl.acm.org
The phishing scam and its variants are estimated to cost victims billions of dollars per year.
Researchers have responded with a number of anti-phishing systems, based either on …
Researchers have responded with a number of anti-phishing systems, based either on …
Universal estimation of information measures for analog sources
Q Wang, SR Kulkarni, S Verdú - Foundations and Trends® in …, 2009 - nowpublishers.com
This monograph presents an overview of universal estimation of information measures for
continuous-alphabet sources. Special attention is given to the estimation of mutual …
continuous-alphabet sources. Special attention is given to the estimation of mutual …
An improvement of kernel-based object tracking based on human perception
V Bruni, D Vitulano - IEEE Transactions on Systems, Man, and …, 2014 - ieeexplore.ieee.org
The objective of the paper is to embed perception rules into the kernel-based target tracking
algorithm and to evaluate to what extent these rules are able to improve the original tracking …
algorithm and to evaluate to what extent these rules are able to improve the original tracking …
[HTML][HTML] On the use of normalized compression distances for image similarity detection
This paper investigates the usefulness of the normalized compression distance (NCD) for
image similarity detection. Instead of the direct NCD between images, the paper considers …
image similarity detection. Instead of the direct NCD between images, the paper considers …
Automatic summarization of changes in biological image sequences using algorithmic information theory
AR Cohen, CS Bjornsson, S Temple… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
An algorithmic information-theoretic method is presented for object-level summarization of
meaningful changes in image sequences. Object extraction and tracking data are …
meaningful changes in image sequences. Object extraction and tracking data are …
Using normalized compression distance for image similarity measurement: an experimental study
PP Vázquez, J Marco - The Visual Computer, 2012 - Springer
Similarity metrics are widely used in computer graphics. In this paper, we will concentrate on
a new, algorithmic complexity-based metric called Normalized Compression Distance. It is a …
a new, algorithmic complexity-based metric called Normalized Compression Distance. It is a …
Image registration by compression
Image registration consists in finding the transformation that brings one image into the best
possible spatial correspondence with another image. In this paper, we present a new …
possible spatial correspondence with another image. In this paper, we present a new …