|
|
|
Niousha Ghannad and Kalpdrum Passi
Currently, video and digital images possess extensive utility, ranging from recreational and social media purposes to verification, military operations, legal proceedings, and penalization. The enhancement mechanisms of this medium have undergone signifi...
ver más
|
|
|
|
|
|
|
Jin Peng, Chengming Liu, Haibo Pang, Xiaomeng Gao, Guozhen Cheng and Bing Hao
With the rise of image manipulation techniques, an increasing number of individuals find it easy to manipulate image content. Undoubtedly, this presents a significant challenge to the integrity of multimedia data, thereby fueling the advancement of image...
ver más
|
|
|
|
|
|
|
Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho and Zbigniew Ras
Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniquen...
ver más
|
|
|
|
|
|
|
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ...
ver más
|
|
|
|
|
|
|
Clemens Seibold, Anna Hilsmann and Peter Eisert
Detecting morphed face images has become an important task to maintain the trust in automated verification systems based on facial images, e.g., at automated border control gates. Deep Neural Network (DNN)-based detectors have shown remarkable results, b...
ver más
|
|
|
|
|
|
|
Aminollah Khormali and Jiann-Shiun Yuan
Recent advancements of Generative Adversarial Networks (GANs) pose emerging yet serious privacy risks threatening digital media?s integrity and trustworthiness, specifically digital video, through synthesizing hyper-realistic images and videos, i.e., Dee...
ver más
|
|
|
|
|
|
|
Chih-Chung Hsu, Yi-Xiu Zhuang and Chia-Yen Lee
Generative adversarial networks (GANs) can be used to generate a photo-realistic image from a low-dimension random noise. Such a synthesized (fake) image with inappropriate content can be used on social media networks, which can cause severe problems. Wi...
ver más
|
|
|
|
|
|
|
Younis Abdalla, M. Tariq Iqbal and Mohamed Shehata
The problem of forged images has become a global phenomenon that is spreading mainly through social media. New technologies have provided both the means and the support for this phenomenon, but they are also enabling a targeted response to overcome it. D...
ver más
|
|
|
|
|
|
|
Qian Li, Rangding Wang and Dawen Xu
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveill...
ver más
|
|
|
|