نتایج جستجو برای: forgery
تعداد نتایج: 1967 فیلتر نتایج به سال:
Digital images are extensively used as communication medium. Forgeries in digital image have grown to be a severe concern, owing to easy and liberated accessibility of puissant image processing tools. The literature addresses the stated issue extensively and presents solutions to them. The proposed elucidations have some commonalities in their methodologies. Nearly all of them are at variance e...
In the current era of digital world, user and investigator are more dependent on digital data. Digital data are very vast in size and also stored in various formats. So, the major problem is identification of upcoming data as true or false by the user or investigator. To overcome this problem different methods and techniques are adapted. Forensic method is used for validation of data. A compute...
Computer users have depended on email communication since its advent. This dependency has created an increased level of system trust within email systems. Individuals can verify where an email came from and who sent the email by simply looking at the senders’ email address. The sender’s email address can be hidden from unsuspecting individuals who do not know how to verify an email address and ...
-One of the most common type of tempering the digital images is copy image forgery. As this work gives a new approach for detecting copy image forgery. As earlier detection methods are used for copy image forgery that basically use block matching approaches that firstly divide the images into overlap blocks and then find out the similar ones. As in this paper hybrid approach is used with new al...
Sunil Kumar , J.V. Desai , S. Mukherjee , P. K. Das # # Faculty of Engineering & Technology Mody Institute of Technology & Science Lakshmangarh, India * Department of Electrical Engineering Indian Institute of Technology Roorkee, India 1 [email protected] 2 [email protected] 3 [email protected] Abstract— Digital image forgery detection is one of the hot research area in the rec...
Recommendation systems and content filtering approaches based on annotations and ratings, essentially rely on users expressing their preferences and interests through their actions, in order to provide personalised content. This activity, in which users engage collectively has been named social tagging, and it is one of the most popular in which users engage online, and although it has opened n...
Digital Forensic is a branch of forensic science which is related to computer crime. It deals with the investigation and recovery of material found in digital devices. Digital images and videos are the most important part of digital forensics as they are the prime evidences in law issues or in mass media. So the loyalty of the digital image is important. Due to the rapid increase and easy acces...
This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice transformation and voice conversion. Concerning voice transformation, this article proposes an automatic analysis of four specific disguised voices in order to detect the forgery and, for voice conversion, different ways to au...
This work pursues the idea of multi-forgery attacks as introduced by Ferguson in 2002. We recoin reforgeability for the complexity of obtaining further forgeries once a first forgery has succeeded. First, we introduce a security notion for the integrity (in terms of reforgeability) of authenticated encryption schemes: j-Int-CTXT, which is derived from the notion INT-CTXT. Second, we define an a...
Copy-Move is one of the most common technique for digital image tampering or forgery. Copy-Move in an image might be done to duplicate something or to hide an undesirable region. In some cases where these images are used for important purposes such as evidence in court of law, it is important to verify their authenticity. In this paper the authors propose a novel method to detect single region ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید