A copy-move forgery detection method based on CMFD-SIFT

B Yang, X Sun, H Guo, Z Xia, X Chen - Multimedia Tools and Applications, 2018 - Springer
A very common way of image tampering is the copy-move attack. When creating a copy-
move forgery, it is often necessary to add or remove important objects from an image. To …

Design of cyber-physical-social systems with forensic-awareness based on deep learning

B Yang, H Guo, E Cao - Advances in Computers, 2021 - Elsevier
Cyber-physical-social systems (CPSSs) contain integrated cyber parts, including computing,
communication, and physical parts; it uses computations and communication embedded in …

A state of the art review on copy move forgery detection techniques

R Dhanya, RK Selvi - 2017 IEEE International conference on …, 2017 - ieeexplore.ieee.org
In today's age of Information and Cyber technology, videos and pictures are having a wider
range of applications such as authentication, military, law enforcement, information sharing …

A real-time image forensics scheme based on multi-domain learning

B Yang, Z Li, T Zhang - Journal of Real-Time Image Processing, 2020 - Springer
In recent years, researchers have attempted to explore methods for real-time image forgery
detection. Many approaches were developed to detect a certain number of image …

Deep Learning for Localization of Mixed Image Tampering Techniques

RE Yancey - 2022 29th International Conference on Systems …, 2022 - ieeexplore.ieee.org
With technological advances leading to an increase in mechanisms for image tampering,
fraud detection methods must continue to be upgraded to match their sophistication. One …

Improving Copy-Move Forgery Detection: An Investigation into Techniques Based on Blocks and Key Points

JH Desai, SH Buch - International Conference on Advancements in Smart …, 2023 - Springer
Digital image forgery, especially in the form of “Copy-Move Forgery” a prevalent form of
image alteration that threatens the authenticity of digital visual content. To combat this …

Computer aided art design Ps course teaching based on FPGA and embedded system graphics processing

L Zhu - Microprocessors and Microsystems, 2021 - Elsevier
Photoshop Spread through electronic media, the source of presentation to development,
receipt and visual coordinators. The result of accessible media innovations has empowered …

Source-destination discrimination on copy-move forgeries

E Gürbüz, G Ulutas, M Ulutas - Multimedia Tools and Applications, 2021 - Springer
Since digital images are one of the most important carriers of information, their authenticity is
quite important. There are miscellaneous forgery techniques for manipulating digital images …

[图书][B] Improving Machine Learning Models for Large Data and Image Detection

RE Yancey - 2022 - search.proquest.com
Abstract The combination of Big Data with the memory size limitations common in the
moderately-sized machines used in many complex ML applications motivates a search for …

Deep localization of mixed image tampering techniques

RE Yancey - arXiv preprint arXiv:1904.08484, 2019 - arxiv.org
With technological advances leading to an increase in mechanisms for image tampering,
fraud detection methods must continue to be upgraded to match their sophistication. One …