M Kirchner, T Gloe - … of Digital Forensics of Multimedia Data …, 2015 - Wiley Online Library
This chapter presents an overview of the state of the art of technical means to achieve camera model identification. It starts with an introduction to forensic source identification …
SR Dubey, AS Jalal - International journal of applied …, 2015 - inderscienceonline.com
Efficient and accurate recognition of fruits and vegetables from the images is one of the major challenges for computers. In this paper, we introduce a framework for the fruit and …
F Peng, J Li, M Long - Journal of forensic sciences, 2015 - Wiley Online Library
To discriminate the acquisition pipelines of digital images, a novel scheme for the identification of natural images and computer‐generated graphics is proposed based on …
RC Pandey, R Agrawal, SK Singh… - Proceedings of the 3rd …, 2015 - Springer
Copy-Move in an image might be done to duplicate something or to hide an undesirable region. So in this paper we propose a novel method to detect copy-move forgery detection …
Modern computer graphics technologies brought realism in computer-generated characters, making them achieve truly natural appearance. Besides traditional virtual reality applications …
WY Chang, YCF Wang - 2015 IEEE International Conference …, 2015 - ieeexplore.ieee.org
We propose a learning-based algorithm for body shape estimation, which only requires 2D clothing images taken in multiple views as the input data. Compared with the use of 3D …
X Pan - Handbook Of Digital Forensics of Multimedia Data and …, 2015 - Wiley Online Library
A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two …
I Amerini, R Becarelli, B Bertini… - IET image …, 2015 - Wiley Online Library
Image forensics, besides understanding if a digital image has been forged, often aims at determining information about image origin. In particular, it could be worthy to individuate …