Index for tampe

_tampered_
Adaptive Feature Calculation and Diagonal Mapping for Successive Recovery of tampered Regions
Blind Video tamper Detection Based on Fusion of Source Features
Camera tamper Detection Using Wavelet Analysis for Video Surveillance
Colour image watermarking for tamper proofing and pattern-based recovery
Content Authentication and tamper Detection in Digital Video
Copy-Move tamper Detection, Forensics
Crc-Ntmac for Image tamper Proofing and Authentication, The
DCT Based Approach for tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme
Detecting multiple copies in tampered images
Detecting tampered Scene Text in the Wild
Detecting tampered Videos with Multimedia Forensics and Deep Learning
Detection of Duplicated Regions in tampered Digital Images by Bit-Plane Analysis
Digital Image tamper Detection Based on Multimodal Fusion of Residue Features
Digital watermarking for telltale tamper proofing and authentication
Dual watermark for image tamper detection and recovery
Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
Efficient Image Self-recovery and tamper Detection Using Fragile Watermarking, An
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition
hierarchical digital watermarking method for image tamper detection and recovery, A
Image authentication and tamper detection using two complementary watermarks
Image tamper detection and classification using support vector machines
Image tamper detection based on demosaicing artifacts
Image tamper Detection using Mathematical Morphology
Image watermarking for tamper detection
Improving Capability of Locating tampered Pixels of Statistical Fragile Watermarking
Improving the experimental analysis of tampered image detection algorithms for biometric systems
Individual Restoration of tampered Pixels for Statistical Fragile Watermarking
Joint Bi-Watermarking and Halftoning Technique Capability for Both tampered Areas Localization and Recovery of Still Image
Joint near-lossless compression and watermarking of still images for authentication and tamper localization
Learning to Immunize Images for tamper Localization and Self-Recovery
Multi-level tamper detection and recovery with tamper type identification
Multi-level tamper detection and recovery with tamper type identification
New Semi-Fragile Watermarking Scheme for Authentication and tamper Localization in Remote Sensing Images, A
New Watermarking Method for Video Authentication with tamper Localization, A
Nighttime Traffic Flow Analysis for Rain-Drop tampered Cameras
novel blind tamper detection and localization scheme for multiple faces in digital images, A
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images
PCA-based watermarking scheme for tamper-proof of web pages, A
Quantization-Based Fragile Watermarking Using Block-Wise Authentication and Pixel-Wise Recovery Scheme for tampered Image
Raindrop-tampered Scene Detection and Traffic Flow Estimation for Nighttime Traffic Surveillance
Real-Time Adaptive Camera tamper Detection for Video Surveillance
Recovering tampered regions in encrypted video using POB number system
Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest
Robust watermarking scheme for tamper detection and authentication exploiting CA
ROI-Based Reversible Data Hiding Scheme for Medical Images with tamper Detection
secure image authentication algorithm with pixel-level tamper localization, A
Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique
Semi-fragile Watermarking for tamper Proofing and Authentication of Still Images
signal detection theory approach for camera tamper detection, A
singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization, A
Statistical Fragile Watermarking Capable of Locating Individual tampered Pixels
study on a watermarking method for both copyright protection and tamper detection, A
tamper Detection Based on Regularity of Wavelet Transform Coefficients
tamper detection for active surveillance systems
tamper Detection, Forensics
tamper video detection and localization using an adaptive segmentation and deep network technique
tamper-Localization Watermarking with Systematic Error Correcting Code
tamper-Proofing Video With Hierarchical Attention Autoencoder Hashing on Blockchain
tampered Region Localization of Digital Color Images Based on JPEG Compression Noise
Tool to Support the Creation of Datasets of tampered Videos, A
Towards a telltale watermarking technique for tamper-proofing
Towards Robust tampered Text Detection in Document Image: New Dataset and New Solution
TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique
Two-Stream Neural Networks for tampered Face Detection
UCM-Net: A U-Net-Like tampered-Region-Related Framework for Copy-Move Forgery Detection
Wavelet-based Watermarking for tamper Proofing of Still Images
68 for tamper

_tampering_
Are You tampering with My Data?
Augment and Adapt: A Simple Approach to Image tampering Detection
Automatic tampering Detection in Spliced Images with Different Compression Levels
Binary Image Authentication With tampering Localization by Embedding Cryptographic Signature and Block Identifier
Categorization of Document Image tampering Techniques and How to Identify Them
Comparative Study and Enhancement of Camera tampering Detection Algorithms
compressive-sensing based watermarking scheme for sparse image tampering identification, A
Copy-move tampering detection using affine transformation property preservation on clustered keypoints
Cross-Layer Defense Method for Blockchain Empowered CBTC Systems Against Data tampering Attacks, A
Detection of Metadata tampering Through Discrepancy Between Image Content and Metadata Using Multi-task Deep Learning
Detection of tampering Inconsistencies on Mobile Photos
Digital image tampering detection and localization using singular value decomposition technique
DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network
DWT and TSVQ-based Semi-fragile Watermarking Scheme for tampering Detection in Remote Sensing Images
effective fragile watermarking scheme for color image tampering detection and self-recovery, An
Effective image tampering localization with multi-scale ConvNeXt feature fusion
effective SVD-based image tampering detection and self-recovery using active watermarking, An
Efficiently secure image transmission against tampering in wireless visual sensor networks
Gauss-Jordan elimination-based image tampering detection and self-recovery
Geographical Assesment of Results From Preventing the Parameter tampering in A Web Application
Hash-Based Identification of Sparse Image tampering
Identification of Sparse Audio tampering Using Distributed Source Coding and Compressive Sensing Techniques
Identifying tampering operations in image operator chains based on decision fusion
Image manipulation detection by multiple tampering traces and edge artifact enhancement
Image tampering detection based on stationary distribution of Markov chain
Image tampering Identification using Blind Deconvolution
Improved tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk
Improving Robustness of Image tampering Detection for Compression
In-Vehicle CAN Bus tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method
Interpretable Image tampering Detection Approach Based on Cooperative Game, An
Laser speckle photography for surface tampering detection
lightweight image splicing tampering localization method based on MobileNetV2 and SRM, A
Local Geometry Analysis For Image tampering Detection
Localization of sparse image tampering via random projections
Localization of tampering in contrast and brightness adjusted images using distributed source coding and expectation maximization
Medical Image tampering Detection: A New Dataset and Baseline
Multi-Scale Fusion for Improved Localization of Malicious tampering in Digital Images
New Developments in Image tampering Detection
New Feature Presentation of Transition Probability Matrix for Image tampering Detection
new semi-fragile image watermarking with robust tampering restoration using irregular sampling, A
Noise Features for Image tampering Detection and Steganalysis
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image tampering Recovery
novel chaos-based fragile watermarking for image tampering detection and self-recovery, A
Novel Watermarking Technique for tampering Detection in Digital Images, A
Perceptual hash-based coarse-to-fine grained image tampering forensics method
Rapid detection of camera tampering and abnormal disturbance for video surveillance system
Real-time detecting one specific tampering operation in multiple operator chains
Real-Time Detection of Camera tampering
Reconfigurable self-embedding with high quality restoration under extensive tampering
Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging
Robust Approach to Detect tampering by Exploring Correlation Patterns, A
Robust Hash for Detecting and Localizing Image tampering
Spatiotemporal Trident Networks: Detection and Localization of Object Removal tampering in Video Passive Forensics
Survey of Passive Image tampering Detection, A
survey on image tampering and its detection in real-world photos, A
tampering Detection and Localization in Images from Social Networks: A CBIR Approach
tampering Detection and Localization Through Clustering of Camera-Based CNN Features
tampering with a watermarking-based image authentication scheme
Topological Data Analysis for Image tampering Detection
Toward Encrypted Video tampering Detection and Localization Based on POB Number System Over Cloud
Undetectable image tampering through JPEG compression anti-forensics
Video tampering Detection for Decentralized Video Transcoding Networks
watermarking-based image ownership and tampering authentication scheme, A
63 for tampering

_tamperproofing_
Image Authentication and tamperproofing for Noisy Channels

Index for "t"


Last update:25-Mar-24 16:25:56
Use price@usc.edu for comments.