Search Results - (( forgery detection using algorithm ) OR ( java based optimization algorithm ))

Refine Results
  1. 1

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…A copy-move forgery detector should be able to detect forgery in a reasonable amount of time. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Forgery detection in medical images using Complex Valued Neural Network (CVNN) by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Zeki, Akram M., Aburas, Abdurazzag Ali

    Published 2011
    “…This factor has hindered proper detection and treatment. A new technique for detecting forgery in medical watermarked image using CVNN is proposed in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  4. 4
  5. 5

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients by Moghaddasi, Zahra, Jalab, Hamid Abdullah, Noor, Rafidah Md

    Published 2019
    “…This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    New Texture Descriptor Based on Modified Fractional Entropy for Digital Image Splicing Forgery Detection by Jalab, Hamid Abdullah, Subramaniam, Thamarai, Ibrahim, Rabha Waell, Kahtan, Hasan, Noor, Nurul Fazmidar Mohd

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors. © 2019 by the authors.…”
    Get full text
    Get full text
    Article
  11. 11

    New texture descriptor based on modified fractional entropy for digital image splicing forgery detection by Hamid, A. Jalab, Subramaniam, Thamarai, Rabha, W. Ibrahim, Kahtan, Hasan, Nurul F., Mohd Noor

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Image splicing forgery approachs: A review and future direction by Ernawati, Muji, Ernawan, Ferda, Abbker, Yagoub, Fakhreldin, Mohammad Adam Ibrahim, Adi, Prajanto Wahyu

    Published 2022
    “…This paper presents existing datasets, pre-processing techniques, feature extraction techniques, and classification algorithms that have been used in image splicing. This paper suggests some recommendations for future research which focuses on image localization, pre-processing, and feature extraction to improve accuracy in detecting image splicing forgery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Image Splicing Detection With Constrained Convolutional Neural Network by Lee, Yang Yang

    Published 2019
    “…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  17. 17

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  20. 20

    Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network by Olanrewaju, R. F., Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Zeki, Akram M.

    Published 2011
    “…This factor has hindered proper detection and treatment. This paper proposed a distortion free algorithm based on Fast Fourier Transform and Complex Valued Neural Network (FFT-CVNN) that can be used for watermarking medical images. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper