|
|
|
Arivazhagan S, Newlin Shebiah Russel, Saranyaa M, Shanmuga Priya R
Pág. 80 - 91
|
|
|
|
|
|
|
Yi Zhao and Song-Kyoo Kim
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ...
ver más
|
|
|
|
|
|
|
Amal Naitali, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch
Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These artificial media creations, made possible by deep learning algorithms, allow for the manipulatio...
ver más
|
|
|
|
|
|
|
Jin Peng, Chengming Liu, Haibo Pang, Xiaomeng Gao, Guozhen Cheng and Bing Hao
With the rise of image manipulation techniques, an increasing number of individuals find it easy to manipulate image content. Undoubtedly, this presents a significant challenge to the integrity of multimedia data, thereby fueling the advancement of image...
ver más
|
|
|
|
|
|
|
Niousha Ghannad and Kalpdrum Passi
Currently, video and digital images possess extensive utility, ranging from recreational and social media purposes to verification, military operations, legal proceedings, and penalization. The enhancement mechanisms of this medium have undergone signifi...
ver más
|
|
|
|
|
|
|
Diana Cri?an, Alexandru Irimia, Dan Gota, Liviu Miclea, Adela Puscasiu, Ovidiu Stan and Honoriu Valean
The Newcomb?Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ...
ver más
|
|
|
|
|
|
|
Clemens Seibold, Anna Hilsmann and Peter Eisert
Detecting morphed face images has become an important task to maintain the trust in automated verification systems based on facial images, e.g., at automated border control gates. Deep Neural Network (DNN)-based detectors have shown remarkable results, b...
ver más
|
|
|
|
|
|
|
Aminollah Khormali and Jiann-Shiun Yuan
Recent advancements of Generative Adversarial Networks (GANs) pose emerging yet serious privacy risks threatening digital media?s integrity and trustworthiness, specifically digital video, through synthesizing hyper-realistic images and videos, i.e., Dee...
ver más
|
|
|
|
|
|
|
Chih-Chung Hsu, Yi-Xiu Zhuang and Chia-Yen Lee
Generative adversarial networks (GANs) can be used to generate a photo-realistic image from a low-dimension random noise. Such a synthesized (fake) image with inappropriate content can be used on social media networks, which can cause severe problems. Wi...
ver más
|
|
|
|
|
|
|
Younis Abdalla, M. Tariq Iqbal and Mohamed Shehata
The problem of forged images has become a global phenomenon that is spreading mainly through social media. New technologies have provided both the means and the support for this phenomenon, but they are also enabling a targeted response to overcome it. D...
ver más
|
|
|
|