Search Results - (( java simulation optimization algorithm ) OR ( forgery detection using algorithm ))

Refine Results
  1. 1

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…A copy-move forgery detector should be able to detect forgery in a reasonable amount of time. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Forgery detection in medical images using Complex Valued Neural Network (CVNN) by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Zeki, Akram M., Aburas, Abdurazzag Ali

    Published 2011
    “…This factor has hindered proper detection and treatment. A new technique for detecting forgery in medical watermarked image using CVNN is proposed in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  4. 4
  5. 5

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients by Moghaddasi, Zahra, Jalab, Hamid Abdullah, Noor, Rafidah Md

    Published 2019
    “…This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    New Texture Descriptor Based on Modified Fractional Entropy for Digital Image Splicing Forgery Detection by Jalab, Hamid Abdullah, Subramaniam, Thamarai, Ibrahim, Rabha Waell, Kahtan, Hasan, Noor, Nurul Fazmidar Mohd

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors. © 2019 by the authors.…”
    Get full text
    Get full text
    Article
  11. 11

    New texture descriptor based on modified fractional entropy for digital image splicing forgery detection by Hamid, A. Jalab, Subramaniam, Thamarai, Rabha, W. Ibrahim, Kahtan, Hasan, Nurul F., Mohd Noor

    Published 2019
    “…The standard image dataset CASIA v2 was used to evaluate the proposed approach. Superior detection accuracy and positive and false positive rates were achieved compared with other state-of-the-art approaches with a low-dimension of feature vectors.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Image splicing forgery approachs: A review and future direction by Ernawati, Muji, Ernawan, Ferda, Abbker, Yagoub, Fakhreldin, Mohammad Adam Ibrahim, Adi, Prajanto Wahyu

    Published 2022
    “…This paper presents existing datasets, pre-processing techniques, feature extraction techniques, and classification algorithms that have been used in image splicing. This paper suggests some recommendations for future research which focuses on image localization, pre-processing, and feature extraction to improve accuracy in detecting image splicing forgery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Image Splicing Detection With Constrained Convolutional Neural Network by Lee, Yang Yang

    Published 2019
    “…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  20. 20

    Detection of alterations in watermarked medical images using Fast Fourier Transform and Complex-Valued Neural Network by Olanrewaju, R. F., Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Zeki, Akram M.

    Published 2011
    “…This factor has hindered proper detection and treatment. This paper proposed a distortion free algorithm based on Fast Fourier Transform and Complex Valued Neural Network (FFT-CVNN) that can be used for watermarking medical images. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper