Abhishek, N Jindal - Multimedia Tools and Applications, 2021 - Springer
Image forgeries can be detected and localized by using deep convolution neural network, and semantic segmentation. Color illumination is used to apply color map after pre …
The authentication of digital images poses a significant challenge due to the wide range of image forgery techniques employed, with one notable example being a copy-move forgery …
H Xie, Y Zhang, Y He, K You, B Fan, D Yu, M Li - Sensors, 2019 - mdpi.com
Optical remote sensing systems (RSSs) for monitoring vehicle emissions can be installed on any road and provide non-contact on-road measurements, that allow law enforcement …
W Jianping, L Yingying, W Chen, G Guohong… - IEEE …, 2020 - ieeexplore.ieee.org
Underwater acoustic network (UAN) is a lightweight system used in inland waterway systems. Software-defined networking (SDN) is a promising approach to improve the …
SH Nair, KAS Nair, N Padmanabhan, S Remya… - Proceedings of Third …, 2023 - Springer
Image forgery is the process of manipulating digital images to obscure critical information or details for personal or business gain. Nowadays, tampering and forging digital images have …
GG Rajput, SD Dabhole, Prashantha - International Conference on Smart …, 2024 - Springer
Identifying the tampered regions within an image is a challenging field of study. Images are often altered using editing programs or tools such as Picasa, Photoshop, and others …
A Singh, S Singh - Journal of Image and Graphics, 2023 - joig.net
With advancement in technology, especially in imaging field, digital image forgery has increased a lot nowadays. In order to counter this problem, many forgery detection …
K Soundappan, GS Shenoy - International Conference on Emerging …, 2023 - Springer
Securing cloud computing is a significant challenge for the cloud services sector. If someone is using the cloud to store data, choosing an encryption method that would not slow things …