Image and Video Forensics
Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways...
Saved in:
Other Authors: | , , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2022
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_78721 | ||
005 | 20220224 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20220224s2022 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-2807-6 | ||
020 | |a 9783036528076 | ||
020 | |a 9783036528069 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-2807-6 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KNTX |2 bicssc | |
100 | 1 | |a Amerini, Irene |4 edt | |
700 | 1 | |a Baldini, Gianmarco |4 edt | |
700 | 1 | |a Leotta, Francesco |4 edt | |
700 | 1 | |a Amerini, Irene |4 oth | |
700 | 1 | |a Baldini, Gianmarco |4 oth | |
700 | 1 | |a Leotta, Francesco |4 oth | |
245 | 1 | 0 | |a Image and Video Forensics |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2022 | ||
300 | |a 1 electronic resource (424 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Information technology industries |2 bicssc | |
653 | |a face morphing | ||
653 | |a forensics detection | ||
653 | |a face landmarks | ||
653 | |a automatic border control | ||
653 | |a biometrics | ||
653 | |a facial recognition | ||
653 | |a facial anti-spoofing | ||
653 | |a facial Presentation Attack Detection (PAD) | ||
653 | |a RGB camera-based anti-spoofing methods | ||
653 | |a deep learning | ||
653 | |a survey | ||
653 | |a computer vision | ||
653 | |a pattern recognition | ||
653 | |a PRNU | ||
653 | |a photo response non-uniformity | ||
653 | |a source camera identification | ||
653 | |a videos | ||
653 | |a compression | ||
653 | |a snapchat | ||
653 | |a resolution | ||
653 | |a camera fingerprint | ||
653 | |a smartphone identification | ||
653 | |a user profile linking | ||
653 | |a digital investigations | ||
653 | |a social network | ||
653 | |a classification | ||
653 | |a inter-frame forgery | ||
653 | |a digital forensics | ||
653 | |a correlation | ||
653 | |a SVD | ||
653 | |a Harris | ||
653 | |a GLCM | ||
653 | |a Tensor | ||
653 | |a video forensic | ||
653 | |a digital image forensics | ||
653 | |a source identification | ||
653 | |a GAN-generated image detection | ||
653 | |a copy-move forgery detection | ||
653 | |a fake image | ||
653 | |a transfer learning | ||
653 | |a VGG | ||
653 | |a image forensics | ||
653 | |a fake image detection | ||
653 | |a neural network | ||
653 | |a Deepfake | ||
653 | |a anomaly detection | ||
653 | |a UAV videos | ||
653 | |a deep one-class | ||
653 | |a cybersecurity | ||
653 | |a multimedia content manipulation | ||
653 | |a deepfake | ||
653 | |a convolutional neural networks | ||
653 | |a support vector machines | ||
653 | |a discrete fourier transform | ||
653 | |a DeepFake detection | ||
653 | |a hand-crafted features | ||
653 | |a forensic process model | ||
653 | |a plausibility of decisions | ||
653 | |a forensic evidence evaluation | ||
653 | |a video source attribution | ||
653 | |a likelihood ratio | ||
653 | |a performance | ||
653 | |a blind estimation | ||
653 | |a forged image detection | ||
653 | |a heatmap | ||
653 | |a JPEG | ||
653 | |a noise level function | ||
653 | |a deepfake detection | ||
653 | |a Generative Adversarial Networks | ||
653 | |a multimedia forensics | ||
653 | |a camera model identification | ||
653 | |a video forensics | ||
653 | |a audio forensics | ||
653 | |a media forensics | ||
653 | |a social media platform identification | ||
653 | |a deepfakes | ||
653 | |a facial manipulations | ||
653 | |a social networks | ||
653 | |a estimation by rotational invariant techniques (ESPRIT) | ||
653 | |a short-time Fourier transform (STFT) | ||
653 | |a multiple signal classification (MUSIC) | ||
653 | |a simple linear iterative clustering (SLIC) | ||
653 | |a n/a | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/4812 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/78721 |7 0 |z DOAB: description of the publication |