Copy-move forgery detection: survey, challenges and future directions
The authenticity and reliability of digital images are increasingly important due to the ease in
modifying such images. Thus, the capability to identify image manipulation is a current …
modifying such images. Thus, the capability to identify image manipulation is a current …
Digital image integrity–a survey of protection and verification techniques
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …
computational imaging and adoption of artificial intelligence have spawned new editing …
Hybrid lstm and encoder–decoder architecture for detection of image forgeries
With advanced image journaling tools, one can easily alter the semantic meaning of an
image by exploiting certain manipulation techniques such as copy clone, object splicing …
image by exploiting certain manipulation techniques such as copy clone, object splicing …
Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks
Mobile edge computing (MEC) is a promising paradigm to provide cloud-computing
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
Busternet: Detecting copy-move image forgery with source/target localization
We introduce a novel deep neural architecture for image copy-move forgery detection
(CMFD), code-named BusterNet. Unlike previous eorts, BusterNet is a pure, end-to-end …
(CMFD), code-named BusterNet. Unlike previous eorts, BusterNet is a pure, end-to-end …
Novel visual and statistical image features for microblogs news verification
Microblog has been a popular media platform for reporting and propagating news. However,
fake news spreading on microblogs would severely jeopardize its public credibility. To …
fake news spreading on microblogs would severely jeopardize its public credibility. To …
Efficient detection of copy-move forgery using polar complex exponential transform and gradient direction pattern
Evidence plays a vital role in image forensics. If evidence is an image, then its authenticity
verification is the key to image forensics. One of the common forgeries in digital images is …
verification is the key to image forensics. One of the common forgeries in digital images is …
A color and texture based approach for the detection and classification of plant leaf disease using KNN classifier
Modern organic farming is gaining popularity in the agriculture of many develo**
countries. There are many problems arise in farming due to various environmental factors …
countries. There are many problems arise in farming due to various environmental factors …
Firefly algorithm with neighborhood attraction
Firefly algorithm (FA) is a new optimization technique based on swarm intelligence. It
simulates the social behavior of fireflies. The search pattern of FA is determined by the …
simulates the social behavior of fireflies. The search pattern of FA is determined by the …
Robust detection of image operator chain with two-stream convolutional neural network
Many forensic techniques have recently been developed to determine whether an image
has undergone a specific manipulation operation. When multiple consecutive operations are …
has undergone a specific manipulation operation. When multiple consecutive operations are …