Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on image authentication for tamper detection with localization
The data that is stored or transmitted in digital form is susceptible to be attacked. Digital
images are particularly vulnerable to unauthorized access and illicit alterations. As a result …
images are particularly vulnerable to unauthorized access and illicit alterations. As a result …
Datasets, clues and state-of-the-arts for multimedia forensics: An extensive review
With the large chunks of social media data being created daily and the parallel rise of
realistic multimedia tampering methods, detecting and localising tampering in images and …
realistic multimedia tampering methods, detecting and localising tampering in images and …
RRU-Net: The ringed residual U-Net for image splicing forgery detection
Detecting a splicing forgery image and then locating the forgery regions is a challenging
task. Some traditional feature extraction methods and convolutional neural network (CNN) …
task. Some traditional feature extraction methods and convolutional neural network (CNN) …
A secured distributed detection system based on IPFS and blockchain for industrial image and video data security
Copyright infringement adversely affects the interest of copyright holders of images and
videos which are uploaded to different websites and peer-to-peer image sharing systems …
videos which are uploaded to different websites and peer-to-peer image sharing systems …
Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering
This paper proposes a splicing forgery detection method with two parts: a coarse-to-refined
convolutional neural network (C2RNet) and diluted adaptive clustering. The proposed …
convolutional neural network (C2RNet) and diluted adaptive clustering. The proposed …
DCU-Net: a dual-channel U-shaped network for image splicing forgery detection
H Ding, L Chen, Q Tao, Z Fu, L Dong, X Cui - Neural computing and …, 2023 - Springer
The detection and location of image splicing forgery are a challenging task in the field of
image forensics. It is to study whether an image contains a suspicious tampered area pasted …
image forensics. It is to study whether an image contains a suspicious tampered area pasted …
Perceptual hashing with complementary color wavelet transform and compressed sensing for reduced-reference image quality assessment
Image quality assessment (IQA) is an important task of image processing and has diverse
applications, such as image super-resolution reconstruction, image transmission and …
applications, such as image super-resolution reconstruction, image transmission and …
Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints
In this paper, a novel perceptual image hashing scheme based on convolutional neural
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
network (CNN) with multiple constraints is proposed, in which our deep hashing network …
It's not what it looks like: Manipulating perceptual hashing based applications
Perceptual hashing is widely used to search or match similar images for digital forensics and
cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well …
cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well …
Efficient hashing method using 2D-2D PCA for image copy detection
Image copy detection is an important technology of copyright protection. This paper
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …