S Walia, K Kumar - Australian Journal of Forensic Sciences, 2019 - Taylor & Francis
Image manipulation has eroded our trust of digital images, with more subtle forgery methods posing an ever-increasing challenge to the integrity of images and their authenticity. Over …
Development and exploitation of technology have led to the further expansion and complexity of digital crimes. On the other hand, the growing volume of data and …
Witnessing impressive results of deep nets in a number of computer vision problems, the image forensic community has begun to utilize them in the challenging domain of detecting …
H Mo, B Chen, W Luo - Proceedings of the 6th ACM workshop on …, 2018 - dl.acm.org
Generative Adversarial Network (GAN) is a prominent generative model that are widely used in various applications. Recent studies have indicated that it is possible to obtain fake face …
L Du, ATS Ho, R Cong - Signal Processing: Image Communication, 2020 - Elsevier
Perceptual hashing is used for multimedia content identification and authentication through perception digests based on the understanding of multimedia content. This paper presents a …
Conventional forgery localizing methods usually rely on different forgery footprints such as JPEG artifacts, edge inconsistency, camera noise, etc., with cross-entropy loss to locate …
Abhishek, N Jindal - Multimedia Tools and Applications, 2021 - Springer
Image forgeries can be detected and localized by using deep convolution neural network, and semantic segmentation. Color illumination is used to apply color map after pre …
With the advance of many image manipulation tools, carrying out image forgery and concealing the forgery is becoming easier. In this paper, the convolution neural network …
Video tampering methods have witnessed considerable progress in recent years. This is partly due to the rapid development of advanced deep learning methods, and also due to …