Search Results - (( copy detection based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- detection based »
- copy detection »
-
1
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
2
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
3
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
Get full text
Get full text
Thesis -
4
Image Copy-Move Forgery Detection Algorithms Based on Spatial Feature Domain
Published 2023Conference Paper -
5
Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan
Published 2017“…This proposes a passive forgery detection to detect the most common type of forgery, which is copy-move attack. …”
Get full text
Get full text
Thesis -
6
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…Furthermore, the proposed methods are resistant to forgery where small up to 8*8 pixels and flat regions are involved, with little visual structures. The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
7
Face Detection System / Chan Beh Teng
Published 2004“…The method used for detecting face is a combination of color based technique and template matching. …”
Get full text
Get full text
Thesis -
8
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
Get full text
Get full text
Thesis -
9
An enhanced soft set data reduction using decision partition order technique
Published 2017“…The decomposition scenario in Rose’s and Kumar’s algorithms detects the reduction, but could not obtain the optimal decision. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
-
14
Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
Published 2019“…This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. …”
Get full text
Get full text
Article -
15
An improved framework for content-based spamdexing detection
Published 2020Get full text
Get full text
Get full text
Article -
16
Integrated analysis of copy number and loss of heterozygosity in primary breast carcinomas using high-density SNP array
Published 2011“…In this study, we aimed to explicate the underlying chromosomal copy number (CN) alterations and loss of heterozygosity (LOH) implicated in a cohort of Malaysian hospital-based primary breast carcinoma samples using a single nucleotide polymorphism (SNP) array platform. …”
Get full text
Get full text
Article -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
18
-
19
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
