23   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Younis Abdalla, M. Tariq Iqbal and Mohamed Shehata    
The problem of forged images has become a global phenomenon that is spreading mainly through social media. New technologies have provided both the means and the support for this phenomenon, but they are also enabling a targeted response to overcome it. D... ver más
Revista: Information    Formato: Electrónico

 
en línea
Arivazhagan S, Newlin Shebiah Russel, Saranyaa M, Shanmuga Priya R     Pág. 80 - 91
Revista: Inteligencia Artificial    Formato: Electrónico

 
en línea
Amal Naitali, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch    
Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These artificial media creations, made possible by deep learning algorithms, allow for the manipulatio... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Niousha Ghannad and Kalpdrum Passi    
Currently, video and digital images possess extensive utility, ranging from recreational and social media purposes to verification, military operations, legal proceedings, and penalization. The enhancement mechanisms of this medium have undergone signifi... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Clemens Seibold, Anna Hilsmann and Peter Eisert    
Detecting morphed face images has become an important task to maintain the trust in automated verification systems based on facial images, e.g., at automated border control gates. Deep Neural Network (DNN)-based detectors have shown remarkable results, b... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean    
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chih-Chung Hsu, Yi-Xiu Zhuang and Chia-Yen Lee    
Generative adversarial networks (GANs) can be used to generate a photo-realistic image from a low-dimension random noise. Such a synthesized (fake) image with inappropriate content can be used on social media networks, which can cause severe problems. Wi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qian Li, Rangding Wang and Dawen Xu    
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveill... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yanli Li, Lala Mei, Ran Li and Changan Wu    
Frame repetition (FR) is a common temporal-domain tampering operator, which is often used to increase the frame rate of video sequences. Existing methods detect FR forgery by analyzing residual variation or similarity between video frames; however, these... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yanli Li, Lala Mei, Ran Li and Changan Wu    
Frame repetition (FR) is a common temporal-domain tampering operator, which is often used to increase the frame rate of video sequences. Existing methods detect FR forgery by analyzing residual variation or similarity between video frames; however, these... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kazuki Nakamura, Koji Hori and Shoichi Hirose    
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mohammad Javad Razmi,Sahar Sherkat Bazazan     Pág. 448 - 459
The present study aims to investigate the effect of social capital on human development in Iran. For this purpose, Iran society in the period 1984 to 2009 by using time series data and Autoregressive Distributed Lags (ARDL) technique has been studied. Du... ver más
Revista: International Journal of Economics and Financial Issues    Formato: Electrónico

 
en línea
Jin-A Lee and Keun-Chang Kwak    
Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks du... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yi Zhao and Song-Kyoo Kim    
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jin Peng, Chengming Liu, Haibo Pang, Xiaomeng Gao, Guozhen Cheng and Bing Hao    
With the rise of image manipulation techniques, an increasing number of individuals find it easy to manipulate image content. Undoubtedly, this presents a significant challenge to the integrity of multimedia data, thereby fueling the advancement of image... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho and Zbigniew Ras    
Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniquen... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
SULPECIA PONCE,DOMSHELL CAHILES    
This study attempts to explore the involvement in graft and corruption among elective barangay youth officials in a city inSouthern Philippines. Using a qualitative research design employing a case study method, 10 informants were included in thisstudy a... ver más
Revista: Journal of Government and Politics    Formato: Electrónico

 
en línea
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jing Wang and Tao Feng    
The SCADA system, which is widely used in the continuous monitoring and control of the physical process of modern critical infrastructure, relies on the feedback control loop. The remote state estimation system triggers the control algorithm or control c... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng    
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »