13   Artículos

 
en línea
Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt    
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existin... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Georgios Karantaidis and Constantine Kotropoulos    
The detection of computer-generated (CG) multimedia content has become of utmost importance due to the advances in digital image processing and computer graphics. Realistic CG images could be used for fraudulent purposes due to the deceiving recognition ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean    
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Li Fan, Wei Li and Xiaohui Cui    
Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding the i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Aminollah Khormali and Jiann-Shiun Yuan    
Recent advancements of Generative Adversarial Networks (GANs) pose emerging yet serious privacy risks threatening digital media?s integrity and trustworthiness, specifically digital video, through synthesizing hyper-realistic images and videos, i.e., Dee... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen    
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet... ver más
Revista: Information    Formato: Electrónico

 
en línea
Qian Li, Rangding Wang and Dawen Xu    
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveill... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »