期刊文献+
共找到921篇文章
< 1 2 47 >
每页显示 20 50 100
Passive detection of copy-paste forgery between JPEG images 被引量:5
1
作者 李香花 赵于前 +2 位作者 廖苗 F.Y.Shih Y.Q.Shi 《Journal of Central South University》 SCIE EI CAS 2012年第10期2839-2851,共13页
A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed forma... A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed format or in a JPEG compressed format.Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios.The tampered region is detected by computing the averaged sum of absolute difference(ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors.The experimental results show the advantages of the proposed method:capability of detecting small and/or multiple tampered regions,simple computation,and hence fast speed in processing. 展开更多
关键词 image forensic JPEG compression copy-paste tbrgery passive detection tampered image compressed image
在线阅读 下载PDF
图像抠图与copy-paste结合的数据增强方法 被引量:1
2
作者 杨天成 杨建红 陈伟鑫 《华侨大学学报(自然科学版)》 CAS 2023年第2期243-249,共7页
提出一种基于图像抠图与copy-paste结合的数据增强方法(matting-paste),采用图像抠图法获取单个垃圾实例的准确轮廓,并对单个实例进行旋转和亮度变换.根据物体轮廓信息,把实例粘贴到背景图上,无需额外的人工标注即可生成新的带有标注的... 提出一种基于图像抠图与copy-paste结合的数据增强方法(matting-paste),采用图像抠图法获取单个垃圾实例的准确轮廓,并对单个实例进行旋转和亮度变换.根据物体轮廓信息,把实例粘贴到背景图上,无需额外的人工标注即可生成新的带有标注的数据,从而提高数据集的多样性和复杂性.结果表明:数据集扩充后的mask比数据集扩充前的识别精度提高了0.039,matting-paste能在已有数据集上有效地扩充数据,进一步提高模型的识别精度. 展开更多
关键词 数据增强 图像抠图 copy-paste 实例分割
在线阅读 下载PDF
Face Forgery Detection via Multi-Scale Dual-Modality Mutual Enhancement Network
3
作者 Yuanqing Ding Hanming Zhai +3 位作者 Qiming Ma Liang Zhang Lei Shao Fanliang Bu 《Computers, Materials & Continua》 2025年第10期905-923,共19页
As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many de... As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many deep learning-based facial forgery detection approaches show promise,they often fail to delve deeply into the complex relationships between image features and forgery indicators,limiting their effectiveness to specific forgery techniques.To address this challenge,we propose a dual-branch collaborative deepfake detection network.The network processes video frame images as input,where a specialized noise extraction module initially extracts the noise feature maps.Subsequently,the original facial images and corresponding noise maps are directed into two parallel feature extraction branches to concurrently learn texture and noise forgery clues.An attention mechanism is employed between the two branches to facilitate mutual guidance and enhancement of texture and noise features across four different scales.This dual-modal feature integration enhances sensitivity to forgery artifacts and boosts generalization ability across various forgery techniques.Features from both branches are then effectively combined and processed through a multi-layer perception layer to distinguish between real and forged video.Experimental results on benchmark deepfake detection datasets demonstrate that our approach outperforms existing state-of-the-art methods in terms of detection performance,accuracy,and generalization ability. 展开更多
关键词 Face forgery detection dual branch network noise features attention mechanism multiple scale
在线阅读 下载PDF
An adaptive dual-domain feature representation method for enhanced deep forgery detection
4
作者 Ming Li Yan Qin +1 位作者 Heng Zhang Zhiguo Shi 《Journal of Automation and Intelligence》 2025年第4期273-281,共9页
Deep forgery detection technologies are crucial for image and video recognition tasks,with their performance heavily reliant on the features extracted from both real and fake images.However,most existing methods prima... Deep forgery detection technologies are crucial for image and video recognition tasks,with their performance heavily reliant on the features extracted from both real and fake images.However,most existing methods primarily focus on spatial domain features,which limits their accuracy.To address this limitation,we propose an adaptive dual-domain feature representation method for enhanced deep forgery detection.Specifically,an adaptive region dynamic convolution module is established to efficiently extract facial features from the spatial domain.Then,we introduce an adaptive frequency dynamic filter to capture effective frequency domain features.By fusing both spatial and frequency domain features,our approach significantly improves the accuracy of classifying real and fake facial images.Finally,experimental results on three real-world datasets validate the effectiveness of our dual-domain feature representation method,which substantially improves classification precision. 展开更多
关键词 Dynamic convolution module Dynamic filter Feature representation Facial images Deep forgery detection
在线阅读 下载PDF
Lip-Audio Modality Fusion for Deep Forgery Video Detection
5
作者 Yong Liu Zhiyu Wang +3 位作者 Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng 《Computers, Materials & Continua》 2025年第2期3499-3515,共17页
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC features. Then, these features are processed separately through the two branches of the Siamese network. Finally, the model is trained and optimized through fully connected layers and loss functions. The experimental results show that the testing accuracy of the model in this study on the LRW (Lip Reading in the Wild) dataset reaches 92.3%;the recall rate is 94.3%;the F1 score is 93.3%, significantly better than the results of CNN (Convolutional Neural Networks) and LSTM (Long Short-Term Memory) models. In the validation of multi-resolution image streams, the highest accuracy of dual-resolution image streams reaches 94%. Band-pass filters can effectively improve the signal-to-noise ratio of deep forgery video detection when processing different types of audio signals. The real-time processing performance of the model is also excellent, and it achieves an average score of up to 5 in user research. These data demonstrate that the method proposed in this study can effectively fuse visual and audio information in deep forgery video detection, accurately identify inconsistencies between video and audio, and thus verify the effectiveness of lip-audio modality fusion technology in improving detection performance. 展开更多
关键词 Deep forgery video detection lip-audio modality fusion mel frequency cepstrum coefficient siamese neural network band-pass filter
在线阅读 下载PDF
A Survey of Image Forensics:Exploring Forgery Detection in Image Colorization
6
作者 Saurabh Agarwal Deepak Sharma +2 位作者 Nancy Girdhar Cheonshik Kim Ki-Hyun Jung 《Computers, Materials & Continua》 2025年第9期4195-4221,共27页
In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulat... In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulated images across various domains.One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images.This paper offers a comprehensive survey of existing methodologies for detecting image tampering,shedding light on the diverse approaches employed in the field of contemporary image forensics.The methods used to identify image forgery can be broadly classified into two primary categories:classical machine learning techniques,heavily reliant on manually crafted features,and deep learning methods.Additionally,this paper explores recent developments in image forensics,placing particular emphasis on the detection of counterfeit colorization.Image colorization involves predicting colors for grayscale images,thereby enhancing their visual appeal.The advancements in colorization techniques have reached a level where distinguishing between authentic and forged images with the naked eye has become an exceptionally challenging task.This paper serves as an in-depth exploration of the intricacies of image forensics in the modern age,with a specific focus on the detection of colorization forgery,presenting a comprehensive overview of methodologies in this critical field. 展开更多
关键词 Image colorization image forensic digital image forgery machine learning convolutional neural network deep learning generative adversarial network
在线阅读 下载PDF
走马楼西汉简“驾、纵、野劾不审案”所见汉代司法问题
7
作者 袁延胜 贾蕾 《南都学坛》 2026年第1期8-15,共8页
长沙走马楼西汉简所载“驾、纵、野劾不审案”起因于官吏“僮”冒用同僚“卯”之名伪造券书,以逃避佣钱支付,继而引发了一系列相关司法调查与弹劾。该案中诈为券书、劾不审、官吏逃亡等犯罪行为的法律界定与刑罚适用,鲜活展现了秦汉法... 长沙走马楼西汉简所载“驾、纵、野劾不审案”起因于官吏“僮”冒用同僚“卯”之名伪造券书,以逃避佣钱支付,继而引发了一系列相关司法调查与弹劾。该案中诈为券书、劾不审、官吏逃亡等犯罪行为的法律界定与刑罚适用,鲜活展现了秦汉法律对官吏违法行为的司法惩治程序,为研究西汉前期司法实践和司法制度提供了典型案例。 展开更多
关键词 走马楼西汉简 诈为券书 劾不审
在线阅读 下载PDF
Video Inter-Frame Forgery Identification Based on Consistency of Correlation Coefficients of Gray Values 被引量:4
8
作者 Qi Wang Zhaohong Li +1 位作者 Zhenzhen Zhang Qinglong Ma 《Journal of Computer and Communications》 2014年第4期51-57,共7页
Identifying inter-frame forgery is a hot topic in video forensics. In this paper, we propose a method based on the assumption that the correlation coefficients of gray values is consistent in an original video, while ... Identifying inter-frame forgery is a hot topic in video forensics. In this paper, we propose a method based on the assumption that the correlation coefficients of gray values is consistent in an original video, while in forgeries the consistency will be destroyed. We first extract the consistency of correlation coefficients of gray values (CCCoGV for short) after normalization and quantization as distinguishing feature to identify interframe forgeries. Then we test the CCCoGV in a large database with the help of SVM (Support Vector Machine). Experimental results show that the proposed method is efficient in classifying original videos and forgeries. Furthermore, the proposed method performs also pretty well in classifying frame insertion and frame deletion forgeries. 展开更多
关键词 INTER-FRAME Forgeries CONTENT CONSISTENCY VIDEO FORENSICS
在线阅读 下载PDF
Image Copy-Move Forgery Detection Using SURF in Opponent Color Space 被引量:4
9
作者 巩家昌 郭继昌 《Transactions of Tianjin University》 EI CAS 2016年第2期151-157,共7页
Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identif... Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat. 展开更多
关键词 copy-move forgery flat region color descriptor OwSURF
在线阅读 下载PDF
Image Forgery Detection Using Segmentation and Swarm Intelligent Algorithm 被引量:2
10
作者 ZHAO Fei SHI Wenchang +1 位作者 QIN Bo LIANG Bin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期141-148,共8页
Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm ... Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm is proposed. This method segments image into small nonoverlapping blocks. A calculation of smooth degree is given for each block. Test image is segmented into independent layers according to the smooth degree. SI algorithm is applied in finding the optimal detection parameters for each layer. These parameters are used to detect each layer by scale invariant features transform (SIFT)-based scheme, which can locate a mass of keypoints. The experimental results prove the good performance of the proposed method, which is effective to identify the CMF image with small or smooth cloned region. 展开更多
关键词 copy-move forgery detection scale invariant features transform (SIFT) swarm intelligent algorithm particle swarm optimization
原文传递
An effective copy-move forgery detection algorithm using fractional quaternion Zernike moments and improved PatchMatch algorithm 被引量:4
11
作者 Chen Beijing Gao Ye +2 位作者 Yu Ming Wu Peng Shu Huazhong 《Journal of Southeast University(English Edition)》 EI CAS 2019年第4期431-439,共9页
An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSA... An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSANNA)to modify the propagation process.Then,fractional quaternion Zernike moments(FrQZMs)are considered to be features extracted from color forged images.Finally,the extracted FrQZMs features are matched by the improved PatchMatch algorithm.The experimental results on two publicly available datasets(FAU and GRIP datasets)show that the proposed algorithm performs better than the state-of-the-art algorithms not only in objective criteria F-measure value but also in visual.Moreover,the proposed algorithm is robust to some attacks,such as additive white Gaussian noise,JPEG compression,rotation,and scaling. 展开更多
关键词 QUATERNION fractional Zernike moments PatchMatch algorithm copy-move forgery detection
在线阅读 下载PDF
Detecting JPEG image forgery based on double compression 被引量:1
12
作者 Wang Junwen Liu Guangjie Dai Yuewei Wang Zhiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1096-1103,共8页
Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilis... Detecting the forgery parts from a double compressed image is very important and urgent work for blind authentication. A very simple and efficient method for accomplishing the task is proposed. Firstly, the probabilistic model with periodic effects in double quantization is analyzed, and the probability of quantized DCT coefficients in each block is calculated over the entire iraage. Secondly, the posteriori probability of each block is computed according to Bayesian theory and the results mentioned in first part. Then the mean and variance of the posteriori probability are to be used for judging whether the target block is tampered. Finally, the mathematical morphology operations are performed to reduce the false alarm probability. Experimental results show that the method can exactly locate the doctored part, and through the experiment it is also found that for detecting the tampered regions, the higher the second compression quality is, the more exact the detection efficiency is. 展开更多
关键词 image forgery JPEG double compression QUANTIZATION posteriori probability.
在线阅读 下载PDF
Copy-Move Forgeries Detection and Localization Using Two Levels of Keypoints Extraction 被引量:1
13
作者 Soad Samir Eid Emary +1 位作者 Khaled Elsayed Hoda Onsi 《Journal of Computer and Communications》 2019年第9期1-18,共18页
Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. There... Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. Therefore, Copy-Move forgery is a very significant problem and active research area to check the confirmation of the image. In this paper, a system for Copy Move Forgery detection is proposed. The proposed system is composed of two stages: one is called the detection stages and the second is called the refine detection stage. The detection stage is executed using Speeded-Up Robust Feature (SURF) and Binary Robust Invariant Scalable Keypoints (BRISK) for feature detection and in the refine detection stage, image registration using non-linear transformation is used to enhance detection efficiency. Initially, the genuine image is picked, and then both SURF and BRISK feature extractions are used in parallel to detect the interest keypoints. This gives an appropriate number of interest points and gives the assurance for finding the majority of the manipulated regions. RANSAC is employed to find the superior group of matches to differentiate the manipulated parts. Then, non-linear transformation between the best-matched sets from both extraction features is used as an optimization to get the best-matched set and detect the copied regions. A number of numerical experiments performed using many benchmark datasets such as, the CASIA v2.0, MICC-220, MICC-F600 and MICC-F2000 datasets. With the proposed algorithm, an overall average detection accuracy of 95.33% is obtained for evaluation carried out with the aforementioned databases. Forgery detection achieved True Positive Rate of 97.4% for tampered images with object translation, different degree of rotation and enlargement. Thus, results from different datasets have been set, proving that the proposed algorithm can individuate the altered areas, with high reliability and dealing with multiple cloning. 展开更多
关键词 COPY MOVE forgery DETECTION Keypoint Based Methods SURF BRISK Bi-Cubic Interpolation
暂未订购
A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques 被引量:2
14
作者 Weijin Tan Yunqing Wu +1 位作者 Peng Wu Beijing Chen 《Journal of New Media》 2019年第1期11-25,共15页
Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the mo... Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the most common types of image forgeries.Thus,an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper.These methods are classified into three types:block-based methods,keypoint-based methods,and deep learning-based methods.In addition,the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost.Finally,further research directions are discussed. 展开更多
关键词 Image forgery copy-move forgery localization passive techniques
在线阅读 下载PDF
Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques 被引量:7
15
作者 SHI Wenchang ZHAO Fei +1 位作者 QIN Bo LIANG Bin 《China Communications》 SCIE CSCD 2016年第1期139-149,共11页
Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approach... Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance. 展开更多
关键词 copy-move forgery detection SIFT region duplication digital image forensics
在线阅读 下载PDF
Efficient Forgery Detection Approaches for Digital Color Images 被引量:1
16
作者 Amira Baumy Abeer D.Algarni +3 位作者 Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3257-3276,共20页
This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data... This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks. Hence, there is an urgent need fordeveloping efficient image forgery detection algorithms. Two main types offorgery are considered in this paper: splicing and copy-move. Splicing isperformed by inserting a part of an image into another image. On the otherhand, copy-move forgery is performed by copying a part of the image intoanother position in the same image. The proposed approach for splicingdetection is based on the assumption that illumination between the originaland tampered images is different. To detect the difference between the originaland tampered images, the homomorphic transform separates the illuminationcomponent from the reflectance component. The illumination histogramderivative is used for detecting the difference in illumination, and henceforgery detection is accomplished. Prior to performing the forgery detectionprocess, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, andsingle image super-resolution, are introduced to reinforce the details andchanges between the original and embedded sections. The proposed approachfor copy-move forgery detection is performed with the Speeded Up RobustFeatures (SURF) algorithm, which extracts feature points and feature vectors. Searching for the copied partition is accomplished through matchingwith Euclidian distance and hierarchical clustering. In addition, some preprocessing methods are used with the SURF algorithm, such as histogramequalization and single-mage super-resolution. Simulation results proved thefeasibility and the robustness of the pre-processing step in homomorphicdetection and SURF detection algorithms for splicing and copy-move forgerydetection, respectively. 展开更多
关键词 Image forgery splicing algorithm copy-move algorithm histogram matching homomorphic enhancement SISR SURF
在线阅读 下载PDF
Detection of Copy-Move Forgery in Digital Images Using Singular Value Decomposition 被引量:1
17
作者 Zaid Nidhal Khudhair Farhan Mohamed +2 位作者 Amjad Rehman Tanzila Saba Saeed Ali bahaj 《Computers, Materials & Continua》 SCIE EI 2023年第2期4135-4147,共13页
This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding... This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size.At each step,the SVD is determined.First,the diagonal matrix’s maximum value(norm)is selected(representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating thematrix or scaled).Then,the similar norms are grouped,and each leading group is separated into many subgroups(elements of each subgroup are neighbors)according to 8-adjacency(the subgroups for each leading group must be far from others by a specific distance).After that,a weight is assigned for each subgroup to classify the image as forgery or not.Finally,the F1 score of the proposed system is measured,reaching 99.1%.This approach is robust against rotation,scaling,noisy images,and illumination variation.It is compared with other similarmethods and presents very promised results. 展开更多
关键词 forgery image forensic image processing region duplication SVD transformation technological development
在线阅读 下载PDF
ITALIAN MONEY TESTED FOR FORGERY BY MOSSBAUER SPECTROSCOPY
18
作者 I.Ortalli G.Pedrazzi +1 位作者 蒋可玉 张秀芳 《Nuclear Science and Techniques》 SCIE CAS CSCD 1993年第1期39-41,共3页
Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000... Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000 lire note consisted of two Zeeman sextets, but in the "false" money there are two quadrupole doublets only. 展开更多
关键词 MOSSBAUER spectroscopy forgery BANK NOTE
在线阅读 下载PDF
A NEW FORGERY ATTACK ON MESSAGE RECOVERY SIGNATURES
19
作者 Li Zichen Li Zhongxian Yang Yixian , Wu Weilin (PO Box 126, Information Security Center, Beijing Univ. of Posts and Telecom., Beijing 100876) 《Journal of Electronics(China)》 2000年第3期234-237,共4页
After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery att... After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery attacks to (F1), (F2) and Nyberg-Rueppel’s signatures are presented. 展开更多
关键词 MESSAGE recovery SIGNATURE Discrete LOGARITHM forgery ATTACK
在线阅读 下载PDF
Exposing Image Forgery with Inconsistent Reflection Line Midpoint
20
作者 葛华勇 MALIK Hafiz +1 位作者 蒋学芹 房树娟 《Journal of Donghua University(English Edition)》 EI CAS 2017年第1期44-48,共5页
In recent years,there has been a backlash of sorts and the authenticity of images has been routinely questioned.Seeing is no longer believing.There is an urgent need for robust image forensic techniques to expose phot... In recent years,there has been a backlash of sorts and the authenticity of images has been routinely questioned.Seeing is no longer believing.There is an urgent need for robust image forensic techniques to expose photo forgery.This paper proposed a novel and effective technique to expose image forgery using inconsistent reflection.More specifically,a new technique was presented to calculate reflection line midpoint,the definition of midpoint ratio was given,and three standards were proposed and employed to detect image forgery.Accuracy and effectiveness of the proposed technique were evaluated using a data set consisting of 200 authentic and forged images.Experimental results indicate that the proposed method can detect image forgery with very high success rate. 展开更多
关键词 image forgery inconsistent reflection midpoint ratio image forensics
在线阅读 下载PDF
上一页 1 2 47 下一页 到第
使用帮助 返回顶部