-
121
Protecting the trust and credibility of data by tracking forgery trace based on GANs
Published 2022-12-01Subjects: “…Forgery detection…”
Get full text
Article -
122
FI-SURF algorithm for image copy-flip-move forgery detection
Published 2015-05-01Subjects: Get full text
Article -
123
A Survey of Partition-Based Techniques for Copy-Move Forgery Detection
Published 2014-01-01“…This survey attempts to cover existing partition-based copy-move forgery detection techniques.…”
Get full text
Article -
124
Forgery of artists’ signatures on paintings or print from the perspective of Polish law
Published 2023-02-01Subjects: Get full text
Article -
125
FI-SURF algorithm for image copy-flip-move forgery detection
Published 2015-05-01Subjects: “…SURF;interest point;image forgery;copy-flip-move…”
Get full text
Article -
126
Research on the Face Forgery Detection Model Based on Adversarial Training and Disentanglement
Published 2024-05-01Subjects: “…face forgery detection…”
Get full text
Article -
127
Combined spatial and frequency dual stream network for face forgery detection
Published 2024-04-01Subjects: “…Face forgery detection…”
Get full text
Article -
128
Physical Properties Evaluation of Rice Bran Forgery with Corn Cob Addition
Published 2022-10-01Subjects: Get full text
Article -
129
Multi-Feature Fusion Based Deepfake Face Forgery Video Detection
Published 2022-03-01Subjects: Get full text
Article -
130
Enforcement of Law of Copyright Infringement and Forgery with the Rise of the Digital Music Industry
Published 2021-06-01“…The problem of this research is how the enforcement of the law of copyright infringement and forgery is with the emergence of the digital industry. …”
Get full text
Article -
131
Modal-Guided Multi-Domain Inconsistency Learning for Face Forgery Detection
Published 2024-12-01Subjects: Get full text
Article -
132
Cultural Relativism and “Our Way of Life”: Patricia Highsmith’s The Tremor of Forgery
Published 2022-12-01“…Like Meursault in The Stranger (1942) by Albert Camus, the 34-year-old protagonist of Patricia Highsmith’s The Tremor of Forgery (1969) is almost certain of having killed an Arab in self-defence but feels no remorse for the deed except as it is judged by other Americans within his orbit of Western influence. …”
Get full text
Article -
133
Digital Image Forgery Detection And Localization Using The Innovated U-Net
Published 2024-06-01“…A reliable image copy–move forgery detection approach adaptable to different scenarios of tampering with color images is crucial for many applications. …”
Get full text
Article -
134
Fast copy-move forgery detection algorithm based on group SIFT
Published 2020-03-01Subjects: “…copy-move forgery detection;feature matching;SIFT;structure tensor…”
Get full text
Article -
135
Forgery, Dis/possession, Ventriloquism in the Works of A.S. Byatt and Peter Ackroyd
Published 2003-12-01Subjects: Get full text
Article -
136
Fast copy-move forgery detection algorithm based on group SIFT
Published 2020-03-01Subjects: “…copy-move forgery detection…”
Get full text
Article -
137
Dual branch convolutional neural network for copy move forgery detection
Published 2021-02-01“…Even the most secure data channels sometimes suffer to validate the integrity of images. Forgery of multimedia data is devastating in various important applications like defence and satellite. …”
Get full text
Article -
138
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01Subjects: “…U-shaped detection network;hidden feature information;conditional random field;image forgery detection…”
Get full text
Article -
139
A Blockchain-Enabled Group Covert Channel against Transaction Forgery
Published 2024-01-01“…In this paper, we define the capabilities of malicious receivers in blockchain-based group covert communication scenarios and propose a group covert communication scheme resistant to transaction forgery attacks. Theoretical analysis and experiments prove that our covert transactions do not have any transaction correlativity, ensuring the unique authenticity of the sender’s identity while maintaining supreme concealment compared with the existing schemes. …”
Get full text
Article -
140
Hierarchical Progressive Image Forgery Detection and Localization Method Based on UNet
Published 2024-09-01“…To address the limited feature field of view caused by inconsistent forgery sizes, we employ three sets of densely cross-connected hierarchical networks for sufficient interaction between feature images at different resolutions. …”
Get full text
Article