Twitter spam detection: Survey of new approaches and comparative study

T Wu, S Wen, Y Xiang, W Zhou - Computers & Security, 2018 - Elsevier
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …

Spams classification and their diffusibility prediction on Twitter through sentiment and topic models

M Ahsan, TP Sharma - International Journal of Computers and …, 2022 - Taylor & Francis
Alike web spam has been a major issue to almost every aspect of the current World Wide
Web, social spam has led to a serious threat to the utilities of online social media …

Reversible data hiding for medical images using integer-to-integer wavelet transform

S Agrawal, M Kumar - 2016 IEEE Students' Conference on …, 2016 - ieeexplore.ieee.org
Reversible data hiding is a method of hiding secret information (watermark) in some
multimedia cover data in such a way that after extracting the watermark, original cover data …

[PDF][PDF] Reviewing the effectivity factor in existing techniques of image forensics

TM Shashidhar, KB Ramesh - International Journal of Electrical and …, 2017 - academia.edu
Studies towards image forensics are about a decade old and various forms of research
techniques have been presented till date towards image forgery detection. Majority of the …

[HTML][HTML] Copy move forgery detection through differential excitation component-based texture features

G Suresh, CS Rao - International Journal of Digital Crime and …, 2020 - igi-global.com
Copy-move forgery (CMF) is an established process to copy an image segment and pastes it
within the same image to hide or duplicate a portion of the image. Several CMF detection …

SVM vs Decision Tree Algorithm Cost Effective Comparison to Enhance Crime Detection and Prevention

S Geetha - Journal of Survey in Fisheries Sciences, 2023 - sifisheriessciences.com
Aim: The main objective of this research is to find the patterns of criminal activities in a
particular area and knowing the efficiency of decision trees and support vector machine …

[HTML][HTML] A generalized ghost detection and segmentation method for double-joint photographic experts group compression

S Azarianpour, AR Sadri - Journal of Medical Signals & Sensors, 2019 - journals.lww.com
Background: The versatility of digital photographs and vast usage of image processing tools
have made the image manipulation accessible and ubiquitous. Thus, there is an urgent …

SVD-based fragile reversible data hiding using DWT

M Kumar, S Agrawal, T Pant - … of Fifth International Conference on Soft …, 2016 - Springer
In today's growing world of digital technology, access to the multimedia content is very easy
and for some sensitive applications such as medical imaging, military system, legal …

[PDF][PDF] A Survey and Critique of Digital Forensic Investigative Models

RA Ajetunmobi, CO Uwadia… - International Journal of …, 2016 - academia.edu
With the concept of digital forensics becoming a subject for academic consideration, the
need to look in-depth at the various forensic models in existence has become imperative. It …

[图书][B] Cybercrime prevention among small businesses in the greater Houston area: A qualitative exploratory case study

G Ajuzie - 2019 - search.proquest.com
The purpose of the qualitative exploratory case study was to explore the lived experiences of
small business owners whose companies had fallen victim to cybercrime in the Greater …