Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Understanding digital image anti-forensics: an analytical review
N Taneja, VS Bramhe, D Bhardwaj… - Multimedia Tools and …, 2024 - Springer
Image forensics is essential for detecting image manipulation, authenticating images, and
identifying sources of images. A forensic analyst can make use of various artifacts to develop …
identifying sources of images. A forensic analyst can make use of various artifacts to develop …
ExS-GAN: Synthesizing anti-forensics images via extra supervised GAN
So far, researchers have proposed many forensics tools to protect the authenticity and
integrity of digital information. However, with the explosive development of machine …
integrity of digital information. However, with the explosive development of machine …
3D reconstruction based on the depth image: A review
Q Mi, T Gao - International Conference on Innovative Mobile and …, 2022 - Springer
Abstract Three-dimensional (3D) reconstruction is an important field of computer vision.
Though Image-based 3D reconstruction is more widely used due to its low environmental …
Though Image-based 3D reconstruction is more widely used due to its low environmental …
A robust open-set multi-instance learning for defending adversarial attacks in digital image
In recent times, digital image forensics is gaining increased attention in multimedia forensics
owing to the widespread scam alertness. Several forensic methods have been studied to …
owing to the widespread scam alertness. Several forensic methods have been studied to …
Diffusion models meet image counter-forensics
From its acquisition in the camera sensors to its storage, different operations are performed
to generate the final image. This pipeline imprints specific traces into the image to form a …
to generate the final image. This pipeline imprints specific traces into the image to form a …
Digital image forensic approach to counter the JPEG anti-forensic attacks
Rapid advancement in digital image processing tools and software's has made it extremely
simple to manipulate the digital images without leaving any footprints. It becomes a hot issue …
simple to manipulate the digital images without leaving any footprints. It becomes a hot issue …
Digital image forensic approach based on the second-order statistical analysis of CFA artifacts
The truthfulness of digital images can be evaluated by investigating the CFA artifacts
introduced due to the interpolation process of the image acquisition phase. In this paper, an …
introduced due to the interpolation process of the image acquisition phase. In this paper, an …
Systematic Review: Anti-Forensic Computer Techniques
R González Arias, J Bermejo Higuera… - Applied Sciences, 2024 - mdpi.com
The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder
the investigation of a computer attack by eliminating traces and preventing the collection of …
the investigation of a computer attack by eliminating traces and preventing the collection of …
A robust residual dense neural network for countering antiforensic attack on median filtered images
Recently, antiforensic methods have been proposed that invalidate most of the state-of-the-
art median filter digital image forensic techniques. Also, the existing counter antiforensic …
art median filter digital image forensic techniques. Also, the existing counter antiforensic …
Exposing JPEG compression footprints by using second-order statistical analysis
A Kumar, AK Kushwaha - Multimedia Tools and Applications, 2025 - Springer
JPEG standards are widely used in most picture editing software and devices for image
acquisition. Because the image format JPEG is the most popular and utmost used, therefore …
acquisition. Because the image format JPEG is the most popular and utmost used, therefore …