Search

Your search keyword '"Image forensics"' showing total 1,282 results

Search Constraints

Start Over You searched for: Descriptor "Image forensics" Remove constraint Descriptor: "Image forensics"
1,282 results on '"Image forensics"'

Search Results

1. Shallowfake and deepfake image manipulation localization using noise and RGB-based dual branch method.

2. Synthetic Face Discrimination via Learned Image Compression.

3. A robust PRNU-based source camera attribution with convolutional neural networks.

4. A copy-move forgery detection technique using DBSCAN-based keypoint similarity matching.

5. Low scaling factor Seam Carving tamper detection algorithm with hybrid attention

6. A Lightweight Double Compression Detector for HEIF Images Based on Encoding Information.

7. An improved PRNU noise extraction model for highly compressed image blocks with low resolutions.

8. Content bias in deep learning image age approximation: A new approach towards better explainability.

9. 融入混合注意力的低缩放因子 Seam Carving 篡改检测算法.

10. JPEG 原图重构取证方法.

11. Enhanced Image Manipulation Detection with TPB-Net: Integrating Triple-Path Backbone and Dual-Path Compressed Sensing Attention

12. EL-FDL: Improving Image Forgery Detection and Localization via Ensemble Learning

13. Double Compression Detection of HEIF Images Using Coding Ghosts

18. Exploring Multi-modal Fusion for Image Manipulation Detection and Localization

19. Ignored Details in Eyes: Exposing GAN-Generated Faces by Sclera

20. Simple Methods for Improving the Forensic Classification between Computer-Graphics Images and Natural Images

21. A two-stage fake face image detection algorithm with expanded attention.

22. Image operator forensics and sequence estimation using robust deep neural network.

23. A semi-fragile reversible watermarking method based on qdft and tamper ranking.

24. Forensic analysis and detection using polycolor model binary pattern for colorized images.

25. Forensic discrimination between traditional and compressive imaging by blurring kernel investigation.

26. Detection of background forgery using a two-stream convolutional neural network architecture.

27. SharpenNet: Detecting Anti-Forensics USM Sharpening Adversarial Examples Based on ConvNeXt.

28. Forensic analysis of AI-compression traces in spatial and frequency domain.

29. Forgery detection using polynomial fitting in recompressed JPEG images.

30. GAN-Generated Face Detection Based on Multiple Attention Mechanism and Relational Embedding.

31. Dual‐Stream Fusion and Multi‐scale Analysis: Introducing the Synergistic Dual‐Stream Network (SDS‐Net) for Image Manipulation Segmentation.

32. Survey on image copy-move forgery detection.

33. Simple Methods for Improving the Forensic Classification between Computer-Graphics Images and Natural Images.

34. ADFF: Adaptive de‐morphing factor framework for restoring accomplice's facial image

35. Dual-Stream Intermediate Fusion Network for Image Forgery Localization

36. A Proposed Workflow for the Restoration of Image Artifacts in Forensic Applications

37. Tri-Path Backbone Network for Image Manipulation Localization

38. Spectral Filter Predictor for Progressive Latent Fingerprint Restoration

39. Advancing Copy-Move Manipulation Detection in Complex Image Scenarios Through Multiscale Detector

40. Exploiting AC Histogram Statistics for Misalignment Estimation in Double JPEG Compressed Images

41. Enhancing Deepfake Detection With Diversified Self-Blending Images and Residuals

42. Synthbuster: Towards Detection of Diffusion Model Generated Images

43. MSA-Net: Multi-scale attention network for image splicing localization.

44. ADFF: Adaptive de‐morphing factor framework for restoring accomplice's facial image.

45. Block-level double JPEG compression detection for image forgery localization.

46. High Frequency Component Enhancement Network for Image Manipulation Detection.

47. Neural Network-Based Algorithm for Identification of Recaptured Images.

48. Automated identification of copy‐move forgery using Hessian and patch feature extraction techniques.

49. Exposing fake images generated by text-to-image diffusion models.

50. Dual‐Stream Fusion and Multi‐scale Analysis: Introducing the Synergistic Dual‐Stream Network (SDS‐Net) for Image Manipulation Segmentation

Catalog

Books, media, physical & digital resources