Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Media forensics and deepfakes: an overview
L Verdoliva - IEEE journal of selected topics in signal …, 2020 - ieeexplore.ieee.org
With the rapid progress in recent years, techniques that generate and manipulate
multimedia content can now provide a very advanced level of realism. The boundary …
multimedia content can now provide a very advanced level of realism. The boundary …
Digital image forgery detection using passive techniques: A survey
Today manipulation of digital images has become easy due to powerful computers,
advanced photo-editing software packages and high resolution capturing devices. Verifying …
advanced photo-editing software packages and high resolution capturing devices. Verifying …
Using AI and social media multimodal content for disaster response and management: Opportunities, challenges, and future directions
Abstract People increasingly use Social Media (SM) platforms such as Twitter and Facebook
during disasters and emergencies to post situational updates including reports of injured or …
during disasters and emergencies to post situational updates including reports of injured or …
Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured
synthetic or reconstructed sample is a significant problem in biometric authentication, which …
synthetic or reconstructed sample is a significant problem in biometric authentication, which …
An overview on image forensics
A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the
area of image forensics. These techniques have been designed to identify the source of a …
area of image forensics. These techniques have been designed to identify the source of a …
Information forensics: An overview of the first decade
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …
development of VLSI technologies, to communication and networking infrastructure, to the …
Image forgery detection
H Farid - IEEE Signal processing magazine, 2009 - ieeexplore.ieee.org
We are undoubtedly living in an age where we are exposed to a remarkable array of visual
imagery. While we may have historically had confidence in the integrity of this imagery …
imagery. While we may have historically had confidence in the integrity of this imagery …
Determining image origin and integrity using sensor noise
In this paper, we provide a unified framework for identifying the source digital camera from
its images and for revealing digitally altered images using photo-response nonuniformity …
its images and for revealing digitally altered images using photo-response nonuniformity …
Multi-scale analysis strategies in PRNU-based tampering localization
Accurate unsupervised tampering localization is one of the most challenging problems in
digital image forensics. In this paper, we consider a photo response non-uniformity analysis …
digital image forensics. In this paper, we consider a photo response non-uniformity analysis …
Contrast enhancement-based forensics in digital images
As a retouching manipulation, contrast enhancement is typically used to adjust the global
brightness and contrast of digital images. Malicious users may also perform contrast …
brightness and contrast of digital images. Malicious users may also perform contrast …