Search Results - (( copy detection using algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
    Get full text
    Get full text
    Thesis
  2. 2

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  3. 3
  4. 4
  5. 5

    Depth frame loss concealment for wireless transmission utilising motion detection information by Ranjbari, Mohamadreza

    Published 2014
    “…The methods are able to facilitate a frame copy algorithm and a high correlation of colour and depth frames to conceal depth frame loss. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The method used for detecting face is a combination of color based technique and template matching. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive digital watermarking system for authentication of intellectual properties by Olanweraju, Rashidah Funke, Abd Manaf, Azizah, Zeki, Akram M.

    Published 2011
    “…Digital watermarking is imperceptibly altering a host media to embed message or marks about the host can-ier itself, it hides message about an image, audio, text. video clip. or other work of media within that work itself, in such a way that is robust, secure and imperceptible to human observer, but can be detected algorithmically. This feature makes it useful in various applications such asauthentication, copy control, copy right protection etc. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The detection of duplicated regions can be a challenging task in digital image forensic (DIF) when images are used as evidence to influence the judgment, such as in court of law. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An enhanced soft set data reduction using decision partition order technique by Mohammed, Mohammed Adam Taheir

    Published 2017
    “…Besides, the need of extra memory is essential as redundant data makes use of storage and produce redundant copies due to its widespread use. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Integrated analysis of copy number and loss of heterozygosity in primary breast carcinomas using high-density SNP array by Ching, H.C., Naidu, R., Seong, M.K., Har, Y.C., Taib, N.A.

    Published 2011
    “…Locus-specific CN aberrations and LOH were statistically summarized using the binary segmentation algorithm and hidden Markov model. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    New Texture Descriptor Based on Modified Fractional Entropy for Digital Image Splicing Forgery Detection by Jalab, Hamid Abdullah, Subramaniam, Thamarai, Ibrahim, Rabha Waell, Kahtan, Hasan, Noor, Nurul Fazmidar Mohd

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors. © 2019 by the authors.…”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    New texture descriptor based on modified fractional entropy for digital image splicing forgery detection by Hamid, A. Jalab, Subramaniam, Thamarai, Rabha, W. Ibrahim, Kahtan, Hasan, Nurul F., Mohd Noor

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients by Moghaddasi, Zahra, Jalab, Hamid Abdullah, Noor, Rafidah Md

    Published 2019
    “…The features from DCT are extracted using SVD algorithm. The roughness measure is calculated for the set of singular values obtained. …”
    Get full text
    Get full text
    Article