A Piva - International Scholarly Research Notices, 2013 - Wiley Online Library
The aim of this survey is to provide a comprehensive overview of the state of the art in the area of image forensics. These techniques have been designed to identify the source of a …
In this paper, we improve the parallel deep neural network (DNN) scheme BusterNet for image copy-move forgery localization with source/target region distinguishment. BusterNet …
With the proliferation of smartphones and social media, journalistic practices are increasingly dependent on information and images contributed by local bystanders through …
MA Qureshi, M Deriche - Signal Processing: Image Communication, 2015 - Elsevier
With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. Now, you can add, change or delete significant information …
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in computational imaging and adoption of artificial intelligence have spawned new editing …
After several years of development, deep synthesis technology has made significant progress in image and video synthesis. Deep forgery represented by Deepfakes has …
Y Yu, X Zhao, R Ni, S Yang, Y Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, realistic DeepFake videos have raised severe security concerns in society. Existing video-based detection methods observe local spatial regions with the coarse …
KB Meena, V Tyagi - Data, Engineering and Applications: Volume 2, 2019 - Springer
In this age of digitization, digital images are used as a prominent carrier of visual information. Images are becoming increasingly ubiquitous in everyday life. Unprecedented …
In a tampered blurred image generated by splicing, the spliced region and the original image may have different blur types. Splicing localization in this image is a challenging …