Search Results - (( java simulation optimization algorithm ) OR ( forgery detection using algorithm ))
Search alternatives:
-
1
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…A copy-move forgery detector should be able to detect forgery in a reasonable amount of time. …”
Get full text
Get full text
Thesis -
2
Forgery detection in medical images using Complex Valued Neural Network (CVNN)
Published 2011“…This factor has hindered proper detection and treatment. A new technique for detecting forgery in medical watermarked image using CVNN is proposed in this paper. …”
Get full text
Get full text
Get full text
Article -
3
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
4
-
5
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
Published 2019“…This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. …”
Get full text
Get full text
Article -
9
A forensic scheme for revealing post-processed region duplication forgery in suspected images
Published 2018“…In this paper, we provide an image forgery detection technique by using local interest points. …”
Get full text
Get full text
Article -
10
New Texture Descriptor Based on Modified Fractional Entropy for Digital Image Splicing Forgery Detection
Published 2019“…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors. © 2019 by the authors.…”
Get full text
Get full text
Article -
11
New texture descriptor based on modified fractional entropy for digital image splicing forgery detection
Published 2019“…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors.…”
Get full text
Get full text
Get full text
Article -
12
Image splicing forgery approachs: A review and future direction
Published 2022“…This paper presents existing datasets, pre-processing techniques, feature extraction techniques, and classification algorithms that have been used in image splicing. This paper suggests some recommendations for future research which focuses on image localization, pre-processing, and feature extraction to improve accuracy in detecting image splicing forgery.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis -
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
15
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
16
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
17
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
18
-
19
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
20
Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network
Published 2011“…This factor has hindered proper detection and treatment. This paper proposed a distortion free algorithm based on Fast Fourier Transform and Complex Valued Neural Network (FFT-CVNN) that can be used for watermarking medical images. …”
Get full text
Get full text
Get full text
Proceeding Paper
