期刊文献+
共找到312篇文章
< 1 2 16 >
每页显示 20 50 100
A fluorescence-enhanced inverse opal sensing film for multi-sources detection of formaldehyde
1
作者 Xiaokang Lu Bo Han +6 位作者 Deyilei Wei Mingzhu Chu Haojie Ma Ran Li Xueyan Hou Yuqi Zhang Jijiang Wang 《Food Science and Human Wellness》 2025年第5期1818-1826,共9页
The SiO_(2) inverse opal photonic crystals(PC)with a three-dimensional macroporous structure were fabricated by the sacrificial template method,followed by infiltration of a pyrene derivative,1-(pyren-8-yl)but-3-en-1-... The SiO_(2) inverse opal photonic crystals(PC)with a three-dimensional macroporous structure were fabricated by the sacrificial template method,followed by infiltration of a pyrene derivative,1-(pyren-8-yl)but-3-en-1-amine(PEA),to achieve a formaldehyde(FA)-sensitive and fluorescence-enhanced sensing film.Utilizing the specific Aza-Cope rearrangement reaction of allylamine of PEA and FA to generate a strong fluorescent product emitted at approximately 480 nm,we chose a PC whose blue band edge of stopband overlapped with the fluorescence emission wavelength.In virtue of the fluorescence enhancement property derived from slow photon effect of PC,FA was detected highly selectively and sensitively.The limit of detection(LoD)was calculated to be 1.38 nmol/L.Furthermore,the fast detection of FA(within 1 min)is realized due to the interconnected three-dimensional macroporous structure of the inverse opal PC and its high specific surface area.The prepared sensing film can be used for the detection of FA in air,aquatic products and living cells.The very close FA content in indoor air to the result from FA detector,the recovery rate of 101.5%for detecting FA in aquatic products and fast fluorescence imaging in 2 min for living cells demonstrate the reliability and accuracy of our method in practical applications. 展开更多
关键词 Inverse opal photonic crystals Slow photon effect Fluorescence enhancement multi-sources detection FORMALDEHYDE
在线阅读 下载PDF
Face Forgery Detection via Multi-Scale Dual-Modality Mutual Enhancement Network
2
作者 Yuanqing Ding Hanming Zhai +3 位作者 Qiming Ma Liang Zhang Lei Shao Fanliang Bu 《Computers, Materials & Continua》 2025年第10期905-923,共19页
As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many de... As the use of deepfake facial videos proliferate,the associated threats to social security and integrity cannot be overstated.Effective methods for detecting forged facial videos are thus urgently needed.While many deep learning-based facial forgery detection approaches show promise,they often fail to delve deeply into the complex relationships between image features and forgery indicators,limiting their effectiveness to specific forgery techniques.To address this challenge,we propose a dual-branch collaborative deepfake detection network.The network processes video frame images as input,where a specialized noise extraction module initially extracts the noise feature maps.Subsequently,the original facial images and corresponding noise maps are directed into two parallel feature extraction branches to concurrently learn texture and noise forgery clues.An attention mechanism is employed between the two branches to facilitate mutual guidance and enhancement of texture and noise features across four different scales.This dual-modal feature integration enhances sensitivity to forgery artifacts and boosts generalization ability across various forgery techniques.Features from both branches are then effectively combined and processed through a multi-layer perception layer to distinguish between real and forged video.Experimental results on benchmark deepfake detection datasets demonstrate that our approach outperforms existing state-of-the-art methods in terms of detection performance,accuracy,and generalization ability. 展开更多
关键词 Face forgery detection dual branch network noise features attention mechanism multiple scale
在线阅读 下载PDF
An adaptive dual-domain feature representation method for enhanced deep forgery detection
3
作者 Ming Li Yan Qin +1 位作者 Heng Zhang Zhiguo Shi 《Journal of Automation and Intelligence》 2025年第4期273-281,共9页
Deep forgery detection technologies are crucial for image and video recognition tasks,with their performance heavily reliant on the features extracted from both real and fake images.However,most existing methods prima... Deep forgery detection technologies are crucial for image and video recognition tasks,with their performance heavily reliant on the features extracted from both real and fake images.However,most existing methods primarily focus on spatial domain features,which limits their accuracy.To address this limitation,we propose an adaptive dual-domain feature representation method for enhanced deep forgery detection.Specifically,an adaptive region dynamic convolution module is established to efficiently extract facial features from the spatial domain.Then,we introduce an adaptive frequency dynamic filter to capture effective frequency domain features.By fusing both spatial and frequency domain features,our approach significantly improves the accuracy of classifying real and fake facial images.Finally,experimental results on three real-world datasets validate the effectiveness of our dual-domain feature representation method,which substantially improves classification precision. 展开更多
关键词 Dynamic convolution module Dynamic filter Feature representation Facial images Deep forgery detection
在线阅读 下载PDF
Lip-Audio Modality Fusion for Deep Forgery Video Detection
4
作者 Yong Liu Zhiyu Wang +3 位作者 Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng 《Computers, Materials & Continua》 2025年第2期3499-3515,共17页
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC features. Then, these features are processed separately through the two branches of the Siamese network. Finally, the model is trained and optimized through fully connected layers and loss functions. The experimental results show that the testing accuracy of the model in this study on the LRW (Lip Reading in the Wild) dataset reaches 92.3%;the recall rate is 94.3%;the F1 score is 93.3%, significantly better than the results of CNN (Convolutional Neural Networks) and LSTM (Long Short-Term Memory) models. In the validation of multi-resolution image streams, the highest accuracy of dual-resolution image streams reaches 94%. Band-pass filters can effectively improve the signal-to-noise ratio of deep forgery video detection when processing different types of audio signals. The real-time processing performance of the model is also excellent, and it achieves an average score of up to 5 in user research. These data demonstrate that the method proposed in this study can effectively fuse visual and audio information in deep forgery video detection, accurately identify inconsistencies between video and audio, and thus verify the effectiveness of lip-audio modality fusion technology in improving detection performance. 展开更多
关键词 Deep forgery video detection lip-audio modality fusion mel frequency cepstrum coefficient siamese neural network band-pass filter
在线阅读 下载PDF
An effective copy-move forgery detection algorithm using fractional quaternion Zernike moments and improved PatchMatch algorithm 被引量:4
5
作者 Chen Beijing Gao Ye +2 位作者 Yu Ming Wu Peng Shu Huazhong 《Journal of Southeast University(English Edition)》 EI CAS 2019年第4期431-439,共9页
An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSA... An effective algorithm is proposed to detect copy-move forgery.In this algorithm,first,the PatchMatch algorithm is improved by using a reliable order-statistics-based approximate nearest neighbor search algorithm(ROSANNA)to modify the propagation process.Then,fractional quaternion Zernike moments(FrQZMs)are considered to be features extracted from color forged images.Finally,the extracted FrQZMs features are matched by the improved PatchMatch algorithm.The experimental results on two publicly available datasets(FAU and GRIP datasets)show that the proposed algorithm performs better than the state-of-the-art algorithms not only in objective criteria F-measure value but also in visual.Moreover,the proposed algorithm is robust to some attacks,such as additive white Gaussian noise,JPEG compression,rotation,and scaling. 展开更多
关键词 QUATERNION fractional Zernike moments PatchMatch algorithm copy-move forgery detection
在线阅读 下载PDF
Image Forgery Detection Using Segmentation and Swarm Intelligent Algorithm 被引量:2
6
作者 ZHAO Fei SHI Wenchang +1 位作者 QIN Bo LIANG Bin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期141-148,共8页
Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm ... Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm is proposed. This method segments image into small nonoverlapping blocks. A calculation of smooth degree is given for each block. Test image is segmented into independent layers according to the smooth degree. SI algorithm is applied in finding the optimal detection parameters for each layer. These parameters are used to detect each layer by scale invariant features transform (SIFT)-based scheme, which can locate a mass of keypoints. The experimental results prove the good performance of the proposed method, which is effective to identify the CMF image with small or smooth cloned region. 展开更多
关键词 copy-move forgery detection scale invariant features transform (SIFT) swarm intelligent algorithm particle swarm optimization
原文传递
Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques 被引量:7
7
作者 SHI Wenchang ZHAO Fei +1 位作者 QIN Bo LIANG Bin 《China Communications》 SCIE CSCD 2016年第1期139-149,共11页
Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approach... Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance. 展开更多
关键词 copy-move forgery detection SIFT region duplication digital image forensics
在线阅读 下载PDF
Copy-Move Forgeries Detection and Localization Using Two Levels of Keypoints Extraction 被引量:1
8
作者 Soad Samir Eid Emary +1 位作者 Khaled Elsayed Hoda Onsi 《Journal of Computer and Communications》 2019年第9期1-18,共18页
Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. There... Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. Therefore, Copy-Move forgery is a very significant problem and active research area to check the confirmation of the image. In this paper, a system for Copy Move Forgery detection is proposed. The proposed system is composed of two stages: one is called the detection stages and the second is called the refine detection stage. The detection stage is executed using Speeded-Up Robust Feature (SURF) and Binary Robust Invariant Scalable Keypoints (BRISK) for feature detection and in the refine detection stage, image registration using non-linear transformation is used to enhance detection efficiency. Initially, the genuine image is picked, and then both SURF and BRISK feature extractions are used in parallel to detect the interest keypoints. This gives an appropriate number of interest points and gives the assurance for finding the majority of the manipulated regions. RANSAC is employed to find the superior group of matches to differentiate the manipulated parts. Then, non-linear transformation between the best-matched sets from both extraction features is used as an optimization to get the best-matched set and detect the copied regions. A number of numerical experiments performed using many benchmark datasets such as, the CASIA v2.0, MICC-220, MICC-F600 and MICC-F2000 datasets. With the proposed algorithm, an overall average detection accuracy of 95.33% is obtained for evaluation carried out with the aforementioned databases. Forgery detection achieved True Positive Rate of 97.4% for tampered images with object translation, different degree of rotation and enlargement. Thus, results from different datasets have been set, proving that the proposed algorithm can individuate the altered areas, with high reliability and dealing with multiple cloning. 展开更多
关键词 COPY MOVE forgery detection Keypoint Based Methods SURF BRISK Bi-Cubic Interpolation
暂未订购
Deepfake Detection Using Adversarial Neural Network
9
作者 Priyadharsini Selvaraj Senthil Kumar Jagatheesaperumal +3 位作者 Karthiga Marimuthu Oviya Saravanan Bader Fahad Alkhamees Mohammad Mehedi Hassan 《Computer Modeling in Engineering & Sciences》 2025年第5期1575-1594,共20页
With expeditious advancements in AI-driven facial manipulation techniques,particularly deepfake technology,there is growing concern over its potential misuse.Deepfakes pose a significant threat to society,partic-ularl... With expeditious advancements in AI-driven facial manipulation techniques,particularly deepfake technology,there is growing concern over its potential misuse.Deepfakes pose a significant threat to society,partic-ularly by infringing on individuals’privacy.Amid significant endeavors to fabricate systems for identifying deepfake fabrications,existing methodologies often face hurdles in adjusting to innovative forgery techniques and demonstrate increased vulnerability to image and video clarity variations,thereby hindering their broad applicability to images and videos produced by unfamiliar technologies.In this manuscript,we endorse resilient training tactics to amplify generalization capabilities.In adversarial training,models are trained using deliberately crafted samples to deceive classification systems,thereby significantly enhancing their generalization ability.In response to this challenge,we propose an innovative hybrid adversarial training framework integrating Virtual Adversarial Training(VAT)with Two-Generated Blurred Adversarial Training.This combined framework bolsters the model’s resilience in detecting deepfakes made using unfamiliar deep learning technologies.Through such adversarial training,models are prompted to acquire more versatile attributes.Through experimental studies,we demonstrate that our model achieves higher accuracy than existing models. 展开更多
关键词 Deepfake GENERALIZATION forgery detection pixel-wise Gaussian blurring virtual adversarial training
在线阅读 下载PDF
A Thorough Investigation on Image Forgery Detection
10
作者 Anjani Kumar Rai Subodh Srivastava 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1489-1528,共40页
Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for... Image forging is the alteration of a digital image to conceal some of the necessary or helpful information.It cannot be easy to distinguish themodified region fromthe original image in somecircumstances.The demand for authenticity and the integrity of the image drive the detection of a fabricated image.There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files,including re-sampling or copy-moving.This work presents a high-level view of the forensics of digital images and their possible detection approaches.This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.These methods have identified forgery and its type and compared it with state of the art.This work will help us to find the best forgery detection technique based on the different environments.It also shows the current issues in other methods,which can help researchers find future scope for further research in this field. 展开更多
关键词 forgery detection digital forgery image forgery localization image segmentation image forensics multimedia security
在线阅读 下载PDF
Multiple Forgery Detection in Video Using Convolution Neural Network
11
作者 Vinay Kumar Vineet Kansal Manish Gaur 《Computers, Materials & Continua》 SCIE EI 2022年第10期1347-1364,共18页
With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to de... With the growth of digital media data manipulation in today’s era due to the availability of readily handy tampering software,the authenticity of records is at high risk,especially in video.There is a dire need to detect such problem and do the necessary actions.In this work,we propose an approach to detect the interframe video forgery utilizing the deep features obtained from the parallel deep neural network model and thorough analytical computations.The proposed approach only uses the deep features extracted from the CNN model and then applies the conventional mathematical approach to these features to find the forgery in the video.This work calculates the correlation coefficient from the deep features of the adjacent frames rather than calculating directly from the frames.We divide the procedure of forgery detection into two phases–video forgery detection and video forgery classification.In video forgery detection,this approach detect input video is original or tampered.If the video is not original,then the video is checked in the next phase,which is video forgery classification.In the video forgery classification,method review the forged video for insertion forgery,deletion forgery,and also again check for originality.The proposed work is generalized and it is tested on two different datasets.The experimental results of our proposed model show that our approach can detect the forgery with the accuracy of 91%on VIFFD dataset,90%in TDTV dataset and classify the type of forgery–insertion and deletion with the accuracy of 82%on VIFFD dataset,86%on TDTV dataset.This work can helps in the analysis of original and tempered video in various domain. 展开更多
关键词 Digital forensic forgery detection video authentication video interframe forgery video processing deep learning
在线阅读 下载PDF
An Active Image Forgery Detection Approach Based on Edge Detection
12
作者 Hüseyin Bilal Macit Arif Koyun 《Computers, Materials & Continua》 SCIE EI 2023年第4期1603-1619,共17页
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo... Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression. 展开更多
关键词 Image forgery image tampering edge detection
在线阅读 下载PDF
Fast Forgery Detection with the Intrinsic Resampling Properties
13
作者 Cheng-Chang Lien Cheng-Lun Shih Chih-Hsun Chou 《Journal of Information Security》 2010年第1期11-22,共12页
With the rapid progress of the image processing software, the image forgery can leave no visual clues on the tampered regions and make us unable to authenticate the image. In general, the image forgery technologies of... With the rapid progress of the image processing software, the image forgery can leave no visual clues on the tampered regions and make us unable to authenticate the image. In general, the image forgery technologies often utilizes the scaling, rotation or skewing operations to tamper some regions in the image, in which the resampling and interpolation processes are often demanded. By observing the detectable periodic distribution properties generated from the resampling and interpolation processes, we propose a novel method based on the intrinsic properties of resampling scheme to detect the tampered regions. The proposed method applies the pre-calculated resampling weighting table to detect the periodic properties of prediction error distribution. The experimental results show that the proposed method outperforms the conventional methods in terms of efficiency and accuracy. 展开更多
关键词 IMAGE forgery RESAMPLING forgery detection INTRINSIC PROPERTIES of RESAMPLING
在线阅读 下载PDF
Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique
14
作者 C.D.Prem Kumar S.Saravana Sundaram 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期881-899,共19页
The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-mo... The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-move forgery.Conventional image processing techniques generally search for the patterns linked to the fake content and restrict the usage in massive data classification.Contrast-ingly,deep learning(DL)models have demonstrated significant performance over the other statistical techniques.With this motivation,this paper presents an Optimal Deep Transfer Learning based Copy Move Forgery Detection(ODTL-CMFD)technique.The presented ODTL-CMFD technique aims to derive a DL model for the classification of target images into the original and the forged/tampered,and then localize the copy moved regions.To perform the feature extraction process,the political optimizer(PO)with Mobile Networks(MobileNet)model has been derived for generating a set of useful vectors.Finally,an enhanced bird swarm algorithm(EBSA)with least square support vector machine(LS-SVM)model has been employed for classifying the digital images into the original or the forged ones.The utilization of the EBSA algorithm helps to properly modify the parameters contained in the Multiclass Support Vector Machine(MSVM)technique and thereby enhance the classification performance.For ensuring the enhanced performance of the ODTL-CMFD technique,a series of simulations have been performed against the benchmark MICC-F220,MICC-F2000,and MICC-F600 datasets.The experimental results have demonstrated the improvised performance of the ODTL-CMFD approach over the other techniques in terms of several evaluation measures. 展开更多
关键词 Copy move detection image forgery deep learning machine learning parameter tuning FORENSICS
在线阅读 下载PDF
Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH
15
作者 Mahmoud Emam Qi Han Hongli Zhang 《国际计算机前沿大会会议论文集》 2016年第1期83-85,共3页
Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo ... Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo some manipulations before being shared without leaving any obvious traces of tampering; due to existence of the powerful image editing softwares. Copy-move forgery technique is a very simple and common type of image forgery, where a part of the image is copied and then pasted in the same image to replicate or hide some parts from the image. In this paper, we proposed a copy-scale-move forgery detection method based on Scale Invariant Feature Operator (SFOP) detector. The keypoints are then described using MROGH descriptor. Experimental results show that the proposed method is able to locate and detect the forgery even if under some geometric transformations such as scaling. 展开更多
关键词 Image FORENSICS Copy-move forgery detection SCALE invariant feature RANSAC MROGH descriptor
在线阅读 下载PDF
Structural damage detection method based on information fusion technique 被引量:1
16
作者 刘涛 李爱群 +1 位作者 丁幼亮 费庆国 《Journal of Southeast University(English Edition)》 EI CAS 2008年第2期201-205,共5页
Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classification... Multi-source information fusion (MSIF) is imported into structural damage diagnosis methods to improve the validity of damage detection. After the introduction of the basic theory, the function model, classifications and mathematical methods of MSIF, a structural damage detection method based on MSIF is presented, which is to fuse two or more damage character vectors from different structural damage diagnosis methods on the character-level. In an experiment of concrete plates, modal information is measured and analyzed. The structural damage detection method based on MSIF is taken to localize cracks of concrete plates and it is proved to be effective. Results of damage detection by the method based on MSIF are compared with those from the modal strain energy method and the flexibility method. Damage, which can hardly be detected by using the single damage identification method, can be diagnosed by the damage detection method based on the character-level MSIF technique. Meanwhile multi-location damage can be identified by the method based on MSIF. This method is sensitive to structural damage and different mathematical methods for MSIF have different preconditions and applicabilities for diversified structures. How to choose mathematical methods for MSIF should be discussed in detail in health monitoring systems of actual structures. 展开更多
关键词 multi-source information fusion structural damage detection Bayes method D-S evidence theory
在线阅读 下载PDF
A New Method for Image Tamper Detection Based on an Improved U-Net
17
作者 Jie Zhang Jianxun Zhang +2 位作者 Bowen Li Jie Cao Yifan Guo 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2883-2895,共13页
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery dete... With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image content.This has also driven research on image forgery detection techniques.In this paper,a U-Net with multiple sensory field feature extraction(MSCU-Net)for image forgery detection is proposed.The proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or post-processing.MSCU-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that the decoder can synthesize the features of different perceptual fields use residual propagation and residual feedback to recall the input feature information and consolidate the input feature information to make the difference in image attributes between the untampered and tampered regions more obvious,and introduce the channel coordinate confusion attention mechanism(CCCA)in skip-connection to further improve the segmentation accuracy of the network.In this paper,extensive experiments are conducted on various mainstream datasets,and the results verify the effectiveness of the proposed method,which outperforms the state-of-the-art image forgery detection methods. 展开更多
关键词 forgery detection multiple receptive fields cyclic residuals U-Net channel coordinate confusion attention
在线阅读 下载PDF
融合时间空间的多尺度Transformer人脸伪造检测
18
作者 杜利莎 杨高明 《兰州工业学院学报》 2026年第1期15-20,共6页
针对目前人脸伪造检测无法充分提取时间特征、检测效率低等问题,提出一种融合时间特征和空间特征的多尺度人脸伪造检测方法MST-ViT。MST-ViT方法设计双流结构提取包含全局信息和细节信息的多尺度特征,设计帧间差异捕获模块增强对时间伪... 针对目前人脸伪造检测无法充分提取时间特征、检测效率低等问题,提出一种融合时间特征和空间特征的多尺度人脸伪造检测方法MST-ViT。MST-ViT方法设计双流结构提取包含全局信息和细节信息的多尺度特征,设计帧间差异捕获模块增强对时间伪影的提取,并通过时空Transformer提取时间特征和空间特征。实验结果表明:所提模型在FF++数据集内的AUC结果提升1.71%;在具有挑战性的DFDC跨数据集实验中AUC提升2.06%。 展开更多
关键词 人脸伪造检测 空间特征 时间特征 多尺度特征 TRANSFORMER
在线阅读 下载PDF
基于静态和动态线索的人脸深度伪造的检测方法及其特点
19
作者 孙越涵 毛施云 李慧斌 《西安交通大学学报(医学版)》 北大核心 2026年第2期224-233,共10页
随着深度学习技术的发展以及生成式人工智能的迅速兴起,人脸伪造技术的生成质量不断提升,其潜在滥用风险也日益受到关注。本文对相关领域的研究进行了系统总结,介绍了目前的人脸深度伪造的检测方法,并将其按照线索分为静态检测方法与动... 随着深度学习技术的发展以及生成式人工智能的迅速兴起,人脸伪造技术的生成质量不断提升,其潜在滥用风险也日益受到关注。本文对相关领域的研究进行了系统总结,介绍了目前的人脸深度伪造的检测方法,并将其按照线索分为静态检测方法与动态检测方法。其中静态检测方法包括显性逻辑矛盾检测方法与深层特征差异检测方法,静态检测方法通过辨别伪造图像或视频与原始图像或视频各方面的不同之处而发现伪造痕迹,动态检测方法主要对视频的时序特征以及不同的模态之间进行研究。此外,还梳理了常见的人脸伪造方法、伪造人脸图像及视频的数据集等,并对主动检测策略与提升泛化能力进行了深入探讨。 展开更多
关键词 人脸深度伪造检测 静态检测 动态检测 伪造数据集 泛化能力
在线阅读 下载PDF
基于ConvNeXt-Mamba的双编码器图像伪造检测
20
作者 潘苗绒 王燚 《计算机工程与应用》 北大核心 2026年第5期336-345,共10页
图像伪造检测在网络安全领域中是一项基础且关键的任务。卷积神经网络(CNN)是当前图像伪造检测领域的主流方法,但CNN通常只能提取局部特征,难以捕获全局特征。为此,该研究提出了融合Mamba和ConvNeXt的双编码器结构,其中Mamba负责捕获全... 图像伪造检测在网络安全领域中是一项基础且关键的任务。卷积神经网络(CNN)是当前图像伪造检测领域的主流方法,但CNN通常只能提取局部特征,难以捕获全局特征。为此,该研究提出了融合Mamba和ConvNeXt的双编码器结构,其中Mamba负责捕获全局上下文特征,ConvNeXt则聚焦于局部细节特征,通过两者的协同实现特征的综合提取。为了进一步强化关键特征表达,引入通道注意力模块(SE block),通过自适应调整特征通道的权重提升特征表达能力。针对伪造区域边界复杂带来的漏检问题,增加了边缘损失以提高模型对伪造轮廓的识别准确性。在CASIAv1等4个基准数据集上的实验表明,该方法在曲线下面积(AUC)分数和F1分数上分别平均提升0.015和0.054,显著优于现有方法,尤其在复杂伪影和模糊边界场景下展现出更强鲁棒性。 展开更多
关键词 图像伪造检测 网络安全 卷积神经网络(CNN) Mamba 全局特征 局部特征
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部