Ahmed, 2023 - Google Patents
Integrity analysis and detection of digital forensic evidencesAhmed, 2023
View PDF- Document ID
- 15874953351838762089
- Author
- Ahmed E
- Publication year
External Links
Snippet
Technology has improved people's day to day activities like how we communicate and access information. These days people are equipped with a digital camera and mobile phone and they tend to record almost everything happening around them like capturing food …
- 238000001514 detection method 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zheng et al. | A survey on image tampering and its detection in real-world photos | |
Tyagi et al. | A detailed analysis of image and video forgery detection techniques | |
Bayram et al. | Image manipulation detection | |
Armas Vega et al. | Copy-move forgery detection technique based on discrete cosine transform blocks features | |
Benalcazar et al. | Synthetic ID card image generation for improving presentation attack detection | |
Asghar et al. | Edge–texture feature-based image forgery detection with cross-dataset evaluation | |
Liu et al. | Overview of image inpainting and forensic technology | |
Nowroozi et al. | Detecting high-quality GAN-generated face images using neural networks | |
RU2715515C2 (en) | System and method of detecting image containing identification document | |
Mani et al. | A survey on digital image forensics: Metadata and image forgeries | |
Suresh et al. | Deep learning-based image forgery detection system | |
Singh et al. | Image forgery detection: comprehensive review of digital forensics approaches | |
Ramesh et al. | Facial recognition as a tool to identify Roman emperors: towards a new methodology | |
Chawla et al. | Classification of computer generated images from photographic images using convolutional neural networks | |
Beck | Image manipulation in scholarly publications: are there ways to an automated solution? | |
Chowdhury et al. | Review on deep fake: A looming technological threat | |
Kaya et al. | Copy-move forgery detection in digital forensic images using CNN | |
Ahmed | Integrity analysis and detection of digital forensic evidences | |
Remya Revi et al. | Portrait photography splicing detection using ensemble of convolutional neural networks | |
Zhou et al. | Triangle mesh watermarking and steganography | |
Kumari et al. | Image splicing forgery detection: A review | |
Rao et al. | ResTran: Long distance relationship on image forgery detection | |
Filius | Interpol review of imaging and video 2016–2019 | |
Ashok et al. | Deepfake Detection Using XceptionNet | |
Hayathunnisa et al. | Art of Detection: Custom CNN and VGG19 for Accurate Real Vs Fake Image Identification |