[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ahmed, 2023 - Google Patents

Integrity analysis and detection of digital forensic evidences

Ahmed, 2023

View PDF
Document ID
15874953351838762089
Author
Ahmed E
Publication year

External Links

Snippet

Technology has improved people's day to day activities like how we communicate and access information. These days people are equipped with a digital camera and mobile phone and they tend to record almost everything happening around them like capturing food …
Continue reading at dspace.bracu.ac.bd:8443 (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • G06F17/30247Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10024Color image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Zheng et al. A survey on image tampering and its detection in real-world photos
Tyagi et al. A detailed analysis of image and video forgery detection techniques
Bayram et al. Image manipulation detection
Armas Vega et al. Copy-move forgery detection technique based on discrete cosine transform blocks features
Benalcazar et al. Synthetic ID card image generation for improving presentation attack detection
Asghar et al. Edge–texture feature-based image forgery detection with cross-dataset evaluation
Liu et al. Overview of image inpainting and forensic technology
Nowroozi et al. Detecting high-quality GAN-generated face images using neural networks
RU2715515C2 (en) System and method of detecting image containing identification document
Mani et al. A survey on digital image forensics: Metadata and image forgeries
Suresh et al. Deep learning-based image forgery detection system
Singh et al. Image forgery detection: comprehensive review of digital forensics approaches
Ramesh et al. Facial recognition as a tool to identify Roman emperors: towards a new methodology
Chawla et al. Classification of computer generated images from photographic images using convolutional neural networks
Beck Image manipulation in scholarly publications: are there ways to an automated solution?
Chowdhury et al. Review on deep fake: A looming technological threat
Kaya et al. Copy-move forgery detection in digital forensic images using CNN
Ahmed Integrity analysis and detection of digital forensic evidences
Remya Revi et al. Portrait photography splicing detection using ensemble of convolutional neural networks
Zhou et al. Triangle mesh watermarking and steganography
Kumari et al. Image splicing forgery detection: A review
Rao et al. ResTran: Long distance relationship on image forgery detection
Filius Interpol review of imaging and video 2016–2019
Ashok et al. Deepfake Detection Using XceptionNet
Hayathunnisa et al. Art of Detection: Custom CNN and VGG19 for Accurate Real Vs Fake Image Identification