_ | tampered | _ |
Adaptive Feature Calculation and Diagonal Mapping for Successive Recovery of | tampered | Regions |
Blind Video | tamper | Detection Based on Fusion of Source Features |
Camera | tamper | Detection Using Wavelet Analysis for Video Surveillance |
Colour image watermarking for | tamper | proofing and pattern-based recovery |
Content Authentication and | tamper | Detection in Digital Video |
Copy-Move | tamper | Detection, Forensics |
Crc-Ntmac for Image | tamper | Proofing and Authentication, The |
DCT Based Approach for | tampered | Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme |
Detecting multiple copies in | tampered | images |
Detecting | tampered | Scene Text in the Wild |
Detecting | tampered | Videos with Multimedia Forensics and Deep Learning |
Detection of Duplicated Regions in | tampered | Digital Images by Bit-Plane Analysis |
Digital Image | tamper | Detection Based on Multimodal Fusion of Residue Features |
Digital watermarking for telltale | tamper | proofing and authentication |
Dual watermark for image | tamper | detection and recovery |
Effective self-embedding watermarking scheme for image | tampered | detection and localization with recovery capability |
Efficient Image Self-recovery and | tamper | Detection Using Fragile Watermarking, An |
Fast, automatic and fine-grained | tampered | JPEG image detection via DCT coefficient analysis |
Four-scanning attack on hierarchical digital watermarking method for image | tamper | detection and recovery |
Fragile watermarking scheme for | tamper | localization in images using logistic map and singular value decomposition |
hierarchical digital watermarking method for image | tamper | detection and recovery, A |
Image authentication and | tamper | detection using two complementary watermarks |
Image | tamper | detection and classification using support vector machines |
Image | tamper | detection based on demosaicing artifacts |
Image | tamper | Detection using Mathematical Morphology |
Image watermarking for | tamper | detection |
Improving Capability of Locating | tampered | Pixels of Statistical Fragile Watermarking |
Improving the experimental analysis of | tampered | image detection algorithms for biometric systems |
Individual Restoration of | tampered | Pixels for Statistical Fragile Watermarking |
Joint Bi-Watermarking and Halftoning Technique Capability for Both | tampered | Areas Localization and Recovery of Still Image |
Joint near-lossless compression and watermarking of still images for authentication and | tamper | localization |
Learning to Immunize Images for | tamper | Localization and Self-Recovery |
Multi-level | tamper | detection and recovery with tamper type identification |
Multi-level | tamper | detection and recovery with tamper type identification |
New Semi-Fragile Watermarking Scheme for Authentication and | tamper | Localization in Remote Sensing Images, A |
New Watermarking Method for Video Authentication with | tamper | Localization, A |
Nighttime Traffic Flow Analysis for Rain-Drop | tampered | Cameras |
novel blind | tamper | detection and localization scheme for multiple faces in digital images, A |
Novel wavelet-based QIM data hiding technique for | tamper | detection and correction of digital images |
PCA-based watermarking scheme for | tamper | -proof of web pages, A |
Quantization-Based Fragile Watermarking Using Block-Wise Authentication and Pixel-Wise Recovery Scheme for | tampered | Image |
Raindrop- | tampered | Scene Detection and Traffic Flow Estimation for Nighttime Traffic Surveillance |
Real-Time Adaptive Camera | tamper | Detection for Video Surveillance |
Recovering | tampered | regions in encrypted video using POB number system |
Robust medical image watermarking technique for accurate detection of | tamper | s inside region of interest and recovering original region of interest |
Robust watermarking scheme for | tamper | detection and authentication exploiting CA |
ROI-Based Reversible Data Hiding Scheme for Medical Images with | tamper | Detection |
secure image authentication algorithm with pixel-level | tamper | localization, A |
Semi-fragile watermarking for grayscale image authentication and | tamper | detection based on an adjusted expanded-bit multiscale quantization-based technique |
Semi-fragile Watermarking for | tamper | Proofing and Authentication of Still Images |
signal detection theory approach for camera | tamper | detection, A |
singular-value-based semi-fragile watermarking scheme for image content authentication with | tamper | localization, A |
Statistical Fragile Watermarking Capable of Locating Individual | tampered | Pixels |
study on a watermarking method for both copyright protection and | tamper | detection, A |
| tamper | Detection Based on Regularity of Wavelet Transform Coefficients |
| tamper | detection for active surveillance systems |
| tamper | Detection, Forensics |
| tamper | video detection and localization using an adaptive segmentation and deep network technique |
| tamper | -Localization Watermarking with Systematic Error Correcting Code |
| tamper | -Proofing Video With Hierarchical Attention Autoencoder Hashing on Blockchain |
| tampered | Region Localization of Digital Color Images Based on JPEG Compression Noise |
Tool to Support the Creation of Datasets of | tampered | Videos, A |
Towards a telltale watermarking technique for | tamper | -proofing |
Towards Robust | tampered | Text Detection in Document Image: New Dataset and New Solution |
TRLH: Fragile and blind dual watermarking for image | tamper | detection and self-recovery based on lifting wavelet transform and halftoning technique |
Two-Stream Neural Networks for | tampered | Face Detection |
UCM-Net: A U-Net-Like | tampered | -Region-Related Framework for Copy-Move Forgery Detection |
Wavelet-based Watermarking for | tamper | Proofing of Still Images |
68 for tamper
_ | tampering | _ |
Are You | tampering | with My Data? |
Augment and Adapt: A Simple Approach to Image | tampering | Detection |
Automatic | tampering | Detection in Spliced Images with Different Compression Levels |
Binary Image Authentication With | tampering | Localization by Embedding Cryptographic Signature and Block Identifier |
Categorization of Document Image | tampering | Techniques and How to Identify Them |
Comparative Study and Enhancement of Camera | tampering | Detection Algorithms |
compressive-sensing based watermarking scheme for sparse image | tampering | identification, A |
Copy-move | tampering | detection using affine transformation property preservation on clustered keypoints |
Cross-Layer Defense Method for Blockchain Empowered CBTC Systems Against Data | tampering | Attacks, A |
Detection of Metadata | tampering | Through Discrepancy Between Image Content and Metadata Using Multi-task Deep Learning |
Detection of | tampering | Inconsistencies on Mobile Photos |
Digital image | tampering | detection and localization using singular value decomposition technique |
DNN self-embedding watermarking: Towards | tampering | detection and parameter recovery for deep neural network |
DWT and TSVQ-based Semi-fragile Watermarking Scheme for | tampering | Detection in Remote Sensing Images |
effective fragile watermarking scheme for color image | tampering | detection and self-recovery, An |
Effective image | tampering | localization with multi-scale ConvNeXt feature fusion |
effective SVD-based image | tampering | detection and self-recovery using active watermarking, An |
Efficiently secure image transmission against | tampering | in wireless visual sensor networks |
Gauss-Jordan elimination-based image | tampering | detection and self-recovery |
Geographical Assesment of Results From Preventing the Parameter | tampering | in A Web Application |
Hash-Based Identification of Sparse Image | tampering | |
Identification of Sparse Audio | tampering | Using Distributed Source Coding and Compressive Sensing Techniques |
Identifying | tampering | operations in image operator chains based on decision fusion |
Image manipulation detection by multiple | tampering | traces and edge artifact enhancement |
Image | tampering | detection based on stationary distribution of Markov chain |
Image | tampering | Identification using Blind Deconvolution |
Improved | tampering | Localization in Digital Image Forensics Based on Maximal Entropy Random Walk |
Improving Robustness of Image | tampering | Detection for Compression |
In-Vehicle CAN Bus | tampering | Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method |
Interpretable Image | tampering | Detection Approach Based on Cooperative Game, An |
Laser speckle photography for surface | tampering | detection |
lightweight image splicing | tampering | localization method based on MobileNetV2 and SRM, A |
Local Geometry Analysis For Image | tampering | Detection |
Localization of sparse image | tampering | via random projections |
Localization of | tampering | in contrast and brightness adjusted images using distributed source coding and expectation maximization |
Medical Image | tampering | Detection: A New Dataset and Baseline |
Multi-Scale Fusion for Improved Localization of Malicious | tampering | in Digital Images |
New Developments in Image | tampering | Detection |
New Feature Presentation of Transition Probability Matrix for Image | tampering | Detection |
new semi-fragile image watermarking with robust | tampering | restoration using irregular sampling, A |
Noise Features for Image | tampering | Detection and Steganalysis |
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image | tampering | Recovery |
novel chaos-based fragile watermarking for image | tampering | detection and self-recovery, A |
Novel Watermarking Technique for | tampering | Detection in Digital Images, A |
Perceptual hash-based coarse-to-fine grained image | tampering | forensics method |
Rapid detection of camera | tampering | and abnormal disturbance for video surveillance system |
Real-time detecting one specific | tampering | operation in multiple operator chains |
Real-Time Detection of Camera | tampering | |
Reconfigurable self-embedding with high quality restoration under extensive | tampering | |
Region-based | tampering | detection and recovery using homogeneity analysis in quality-sensitive imaging |
Robust Approach to Detect | tampering | by Exploring Correlation Patterns, A |
Robust Hash for Detecting and Localizing Image | tampering | |
Spatiotemporal Trident Networks: Detection and Localization of Object Removal | tampering | in Video Passive Forensics |
Survey of Passive Image | tampering | Detection, A |
survey on image | tampering | and its detection in real-world photos, A |
| tampering | Detection and Localization in Images from Social Networks: A CBIR Approach |
| tampering | Detection and Localization Through Clustering of Camera-Based CNN Features |
| tampering | with a watermarking-based image authentication scheme |
Topological Data Analysis for Image | tampering | Detection |
Toward Encrypted Video | tampering | Detection and Localization Based on POB Number System Over Cloud |
Undetectable image | tampering | through JPEG compression anti-forensics |
Video | tampering | Detection for Decentralized Video Transcoding Networks |
watermarking-based image ownership and | tampering | authentication scheme, A |
63 for tampering