|
|
|
Younis Abdalla, M. Tariq Iqbal and Mohamed Shehata
The problem of forged images has become a global phenomenon that is spreading mainly through social media. New technologies have provided both the means and the support for this phenomenon, but they are also enabling a targeted response to overcome it. D...
ver más
|
|
|
|
|
|
|
Arivazhagan S, Newlin Shebiah Russel, Saranyaa M, Shanmuga Priya R
Pág. 80 - 91
|
|
|
|
|
|
|
Amal Naitali, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These artificial media creations, made possible by deep learning algorithms, allow for the manipulatio...
ver más
|
|
|
|
|
|
|
Niousha Ghannad and Kalpdrum Passi
Currently, video and digital images possess extensive utility, ranging from recreational and social media purposes to verification, military operations, legal proceedings, and penalization. The enhancement mechanisms of this medium have undergone signifi...
ver más
|
|
|
|
|
|
|
Clemens Seibold, Anna Hilsmann and Peter Eisert
Detecting morphed face images has become an important task to maintain the trust in automated verification systems based on facial images, e.g., at automated border control gates. Deep Neural Network (DNN)-based detectors have shown remarkable results, b...
ver más
|
|
|
|
|
|
|
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ...
ver más
|
|
|
|
|
|
|
Chih-Chung Hsu, Yi-Xiu Zhuang and Chia-Yen Lee
Generative adversarial networks (GANs) can be used to generate a photo-realistic image from a low-dimension random noise. Such a synthesized (fake) image with inappropriate content can be used on social media networks, which can cause severe problems. Wi...
ver más
|
|
|
|
|
|
|
Qian Li, Rangding Wang and Dawen Xu
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee. Ascertaining the authenticity of surveill...
ver más
|
|
|
|
|
|
|
Yanli Li, Lala Mei, Ran Li and Changan Wu
Frame repetition (FR) is a common temporal-domain tampering operator, which is often used to increase the frame rate of video sequences. Existing methods detect FR forgery by analyzing residual variation or similarity between video frames; however, these...
ver más
|
|
|
|
|
|
|
Yanli Li, Lala Mei, Ran Li and Changan Wu
Frame repetition (FR) is a common temporal-domain tampering operator, which is often used to increase the frame rate of video sequences. Existing methods detect FR forgery by analyzing residual variation or similarity between video frames; however, these...
ver más
|
|
|
|
|
|
|
Kazuki Nakamura, Koji Hori and Shoichi Hirose
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import...
ver más
|
|
|
|
|
|
|
Mohammad Javad Razmi,Sahar Sherkat Bazazan
Pág. 448 - 459
The present study aims to investigate the effect of social capital on human development in Iran. For this purpose, Iran society in the period 1984 to 2009 by using time series data and Autoregressive Distributed Lags (ARDL) technique has been studied. Du...
ver más
|
|
|
|
|
|
|
Jin-A Lee and Keun-Chang Kwak
Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks du...
ver más
|
|
|
|
|
|
|
Yi Zhao and Song-Kyoo Kim
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ...
ver más
|
|
|
|
|
|
|
Jin Peng, Chengming Liu, Haibo Pang, Xiaomeng Gao, Guozhen Cheng and Bing Hao
With the rise of image manipulation techniques, an increasing number of individuals find it easy to manipulate image content. Undoubtedly, this presents a significant challenge to the integrity of multimedia data, thereby fueling the advancement of image...
ver más
|
|
|
|
|
|
|
Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho and Zbigniew Ras
Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniquen...
ver más
|
|
|
|
|
|
|
SULPECIA PONCE,DOMSHELL CAHILES
This study attempts to explore the involvement in graft and corruption among elective barangay youth officials in a city inSouthern Philippines. Using a qualitative research design employing a case study method, 10 informants were included in thisstudy a...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Jing Wang and Tao Feng
The SCADA system, which is widely used in the continuous monitoring and control of the physical process of modern critical infrastructure, relies on the feedback control loop. The remote state estimation system triggers the control algorithm or control c...
ver más
|
|
|
|
|
|
|
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing...
ver más
|
|
|
|