相关期刊:《Optoelectronics Letters》《The Journal of China Universities of Posts and Telecommunications》《Journal of Literature and Art Studies》《Digital Communications and Networks》更多>>
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ...
QuỹĐổi mới sáng tạo Vingroup,Grant/Award Number:VINIF.2020.ThS.BK.10。
In recent years,visual facial forgery has reached a level of sophistication that humans cannot identify fraud,which poses a significant threat to information security.A wide range of malicious applications have emerge...
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery detection.Ther...
supported by the Graduate Research Innovation Project of Civil Aviation University of China (No.2022YJS014)。
Most of existing methods exhibit poor performance in detecting forged images due to the small size of tampered areas and the limited pixel difference between untampered and tampered regions. To alleviate the above pro...
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ...
the National Key Research and Development Program of China(No.2020YFB1005805);Peng Cheng Laboratory Project(Grant No.PCL2021A02);Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies(2022B1212010005);Shenzhen Basic Research(General Project)(No.JCYJ20190806142601687);Shenzhen Stable Supporting Program(General Project)(No.GXWD20201230155427003-20200821160539001).
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connect...
This work is supported by Supported by the National Key Research and Development Program of China under Grant No.2020YFF0304902;the Science and Technology Research Project of Jiangxi Provincial Department of Education under Grant No.GJJ202511。
The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection qu...
This study is supported by the Fundamental Research Funds for the Central Universities of PPSUC under Grant 2022JKF02009.
Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain f...
The work presented in this article focuses on document forgery. Document fraud is a generic term used to designate a fraud, a falsification of a document. The said falsification can be observed in several sectors of e...
This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding...