Search Results - (( forgery detection method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- method algorithm »
- java application »
- using algorithm »
- forgery »
-
1
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…A copy-move forgery detector should be able to detect forgery in a reasonable amount of time. …”
Get full text
Get full text
Thesis -
2
-
3
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…In the third approach, we proposed a detection method to reveal the forgery under illumination variations. …”
Get full text
Get full text
Thesis -
4
-
5
Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
Published 2019“…This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. …”
Get full text
Get full text
Article -
6
Image splicing forgery approachs: A review and future direction
Published 2022“…This paper examines various approaches to image splicing forgery, discusses the weakness of methods, analyse the existing methods, and discusses the current solution to solve those issues, and future direction. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…An improved approach of image forgery detection, specifically image splicing detection with Constrained Convolutional Neural Network (CNN) is proposed in this research. …”
Get full text
Get full text
Thesis -
8
-
9
Web application vulnerabilities detection model
Published 2016“…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
Get full text
Get full text
Research Reports -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
-
12
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
Get full text
Get full text
Get full text
Thesis -
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The threshold adaptation was achieved by using the mean value, the standard deviation, and the L1-norm instead of the comparison of user summaries evaluation method to obtain a fully automatic video summarisation algorithm, and by eliminating the conditions in selecting the final key frames to reduce the complexity of the algorithm. …”
Get full text
Get full text
Article -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
