Search Results - (( java application optimization algorithm ) OR ( forgery detection using algorithm ))

Refine Results
  1. 1

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…A copy-move forgery detector should be able to detect forgery in a reasonable amount of time. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Forgery detection in medical images using Complex Valued Neural Network (CVNN) by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Zeki, Akram M., Aburas, Abdurazzag Ali

    Published 2011
    “…This factor has hindered proper detection and treatment. A new technique for detecting forgery in medical watermarked image using CVNN is proposed in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  4. 4
  5. 5

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients by Moghaddasi, Zahra, Jalab, Hamid Abdullah, Noor, Rafidah Md

    Published 2019
    “…This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    New Texture Descriptor Based on Modified Fractional Entropy for Digital Image Splicing Forgery Detection by Jalab, Hamid Abdullah, Subramaniam, Thamarai, Ibrahim, Rabha Waell, Kahtan, Hasan, Noor, Nurul Fazmidar Mohd

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors. © 2019 by the authors.…”
    Get full text
    Get full text
    Article
  11. 11

    New texture descriptor based on modified fractional entropy for digital image splicing forgery detection by Hamid, A. Jalab, Subramaniam, Thamarai, Rabha, W. Ibrahim, Kahtan, Hasan, Nurul F., Mohd Noor

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Image splicing forgery approachs: A review and future direction by Ernawati, Muji, Ernawan, Ferda, Abbker, Yagoub, Fakhreldin, Mohammad Adam Ibrahim, Adi, Prajanto Wahyu

    Published 2022
    “…This paper presents existing datasets, pre-processing techniques, feature extraction techniques, and classification algorithms that have been used in image splicing. This paper suggests some recommendations for future research which focuses on image localization, pre-processing, and feature extraction to improve accuracy in detecting image splicing forgery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Image Splicing Detection With Constrained Convolutional Neural Network by Lee, Yang Yang

    Published 2019
    “…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  15. 15
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20