FORGERY

作品数:36被引量:28H指数:3
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:秦静蔡杰韩斐更多>>
相关机构:山东英才学院山东大学更多>>
相关期刊:《Optoelectronics Letters》《The Journal of China Universities of Posts and Telecommunications》《Journal of Literature and Art Studies》《Digital Communications and Networks》更多>>
相关基金:国家自然科学基金国家高技术研究发展计划中国博士后科学基金济南市高校院所自主创新计划项目更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Lip-Audio Modality Fusion for Deep Forgery Video Detection
《Computers, Materials & Continua》2025年第2期3499-3515,共17页Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng 
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ...
关键词:Deep forgery video detection lip-audio modality fusion mel frequency cepstrum coefficient siamese neural network band-pass filter 
A dual benchmarking study of facial forgery and facial forensics
《CAAI Transactions on Intelligence Technology》2024年第6期1377-1397,共21页Minh Tam Pham Thanh Trung Huynh Thanh Tam Nguyen Thanh Toan Nguyen Thanh Thi Nguyen Jun Jo Hongzhi Yin Quoc Viet Hung Nguyen 
QuỹĐổi mới sáng tạo Vingroup,Grant/Award Number:VINIF.2020.ThS.BK.10。
In recent years,visual facial forgery has reached a level of sophistication that humans cannot identify fraud,which poses a significant threat to information security.A wide range of malicious applications have emerge...
关键词:BENCHMARK deepfake digital forensics visual facial forgery 
IIN-FFD:Intra-Inter Network for Face Forgery Detection
《Tsinghua Science and Technology》2024年第6期1839-1850,共12页Qihua Zhou Zhili Zhou Zhipeng Bao Weina Niu Yuling Liu 
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery detection.Ther...
关键词:deep learning information security image classfication neural networks face forgery face forgery detection 
Double-branch forgery image detection based on multi-scale feature fusion
《Optoelectronics Letters》2024年第5期307-312,共6页ZHANG Hongying GUO Chunxing WANG Xuyong 
supported by the Graduate Research Innovation Project of Civil Aviation University of China (No.2022YJS014)。
Most of existing methods exhibit poor performance in detecting forged images due to the small size of tampered areas and the limited pixel difference between untampered and tampered regions. To alleviate the above pro...
关键词:branch IMAGE utilizing 
Design & Test of an Advanced Web Security Analysis Tool (AWSAT)
《Journal of Software Engineering and Applications》2024年第5期448-461,共14页Meenakshi S. P. Manikandaswamy Vijay Madisetti 
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ...
关键词:Web Security Automated Analysis Vulnerability Assessment Web Scanning Cross-Site Scripting SQL Injection Cross-Site Request Forgery 
“Half of the Node Records Are Forged?”: The Problemof Node Records Forgery in Ethereum Network
《Computer Modeling in Engineering & Sciences》2024年第2期1713-1729,共17页Yang Liu Zhiyuan Lin Yuxi Zhang Lin Jiang Xuan Wang 
the National Key Research and Development Program of China(No.2020YFB1005805);Peng Cheng Laboratory Project(Grant No.PCL2021A02);Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies(2022B1212010005);Shenzhen Basic Research(General Project)(No.JCYJ20190806142601687);Shenzhen Stable Supporting Program(General Project)(No.GXWD20201230155427003-20200821160539001).
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connect...
关键词:Blockchain ethereum peer-to-peer networks node discovery protocol malicious behavior 
Identification of a Printed Anti-Counterfeiting Code Based on Feature Guidance Double Pool Attention Networks
《Computers, Materials & Continua》2023年第5期3431-3452,共22页Changhui You Hong Zheng Zhongyuan Guo Tianyu Wang Jianping Ju Xi Li 
This work is supported by Supported by the National Key Research and Development Program of China under Grant No.2020YFF0304902;the Science and Technology Research Project of Jiangxi Provincial Department of Education under Grant No.GJJ202511。
The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection qu...
关键词:Deep learning digital image anti-counterfeiting feature guidance image processing reprint forgery 
Mining Fine-Grain Face Forgery Cues with Fusion Modality
《Computers, Materials & Continua》2023年第5期4025-4045,共21页Shufan Peng Manchun Cai Tianliang Lu Xiaowen Liu 
This study is supported by the Fundamental Research Funds for the Central Universities of PPSUC under Grant 2022JKF02009.
Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns.Despite the considerable progress in existing methods,we note that:Previous works overlooked finegrain f...
关键词:Face forgery detection fine-grain forgery cues fusion modality adaptive enhancement 
Towards a New Model for the Production of Civil Status Records Using Blockchain
《Journal of Information Security》2023年第1期52-75,共24页Tankou Tsomo Maurice Eddy Bell Bitjoka Georges Ngohe Ekam Paul Salomon 
The work presented in this article focuses on document forgery. Document fraud is a generic term used to designate a fraud, a falsification of a document. The said falsification can be observed in several sectors of e...
关键词:Blockchain FORGERY PKI Civil Status Documentary Identity 
Detection of Copy-Move Forgery in Digital Images Using Singular Value Decomposition被引量:1
《Computers, Materials & Continua》2023年第2期4135-4147,共13页Zaid Nidhal Khudhair Farhan Mohamed Amjad Rehman Tanzila Saba Saeed Ali bahaj 
This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding...
关键词:Forgery image forensic image processing region duplication SVD transformation technological development 
检索报告 对象比较 聚类工具 使用帮助 返回顶部