The problem of detection of the digital image falsification results performed by cloning is considered – one of the most often used program tools implemented in all modern graphic editors. Aim: The aim of the work is further development of approach to the solution of a cloning detection problem having the cloned image saved in a lossy format, offered by authors earlier. Materials and Methods: Further development of a new approach to the solution of a problem of cloning results detection in the digital image is presented. Approach is based on the accounting of small changes of cylindrical body volume with the generatrix, that is parallel to the OZ axis, bounded above by the interpolating function plot for a matrix of brightness of the analyz...
In the reverse engineering of double JPEG compression in the presence of image resizing between the ...
In this paper a methodology for digital image forgery detection by means of an unconventional use of...
This paper reveals basics of Digital (Image) Forensics. The paper describes the ways to manipulate i...
The modern level of information technologies development has led to unheard ease embodiments hithert...
In the work the modification of a method of detection and localization of regions of the integrity v...
In computing, JPEG is a commonly used method of lossy compression for digital photography (image). T...
Recently, a number of digital image forensic techniques have been developed which are capable of det...
In this thesis the universal technology for compression of groups of digital images is proposed, whi...
The widespread using of fake pictures in information wars, lawsuits, politics, etc., needs to develo...
This thesis proposes an adaptive algorithm which applies feature extraction and clustering technique...
The problem of image optimization, namely the reduction of the physical size of the image by minimiz...
The image processing pipeline of a traditional digital camera is often limited by processing power. ...
[[abstract]]Digital images are easy to be tempered and edited due to availability of image editing s...
Due to the powerful image editing tools images are open to several manipulations; therefore, their a...
"In this paper a methodology for digital image forgery detection by means of an unconventional use o...
In the reverse engineering of double JPEG compression in the presence of image resizing between the ...
In this paper a methodology for digital image forgery detection by means of an unconventional use of...
This paper reveals basics of Digital (Image) Forensics. The paper describes the ways to manipulate i...
The modern level of information technologies development has led to unheard ease embodiments hithert...
In the work the modification of a method of detection and localization of regions of the integrity v...
In computing, JPEG is a commonly used method of lossy compression for digital photography (image). T...
Recently, a number of digital image forensic techniques have been developed which are capable of det...
In this thesis the universal technology for compression of groups of digital images is proposed, whi...
The widespread using of fake pictures in information wars, lawsuits, politics, etc., needs to develo...
This thesis proposes an adaptive algorithm which applies feature extraction and clustering technique...
The problem of image optimization, namely the reduction of the physical size of the image by minimiz...
The image processing pipeline of a traditional digital camera is often limited by processing power. ...
[[abstract]]Digital images are easy to be tempered and edited due to availability of image editing s...
Due to the powerful image editing tools images are open to several manipulations; therefore, their a...
"In this paper a methodology for digital image forgery detection by means of an unconventional use o...
In the reverse engineering of double JPEG compression in the presence of image resizing between the ...
In this paper a methodology for digital image forgery detection by means of an unconventional use of...
This paper reveals basics of Digital (Image) Forensics. The paper describes the ways to manipulate i...