Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access


    A New Method for Image Tamper Detection Based on an Improved U-Net

    Jie Zhang, Jianxun Zhang*, Bowen Li, Jie Cao, Yifan Guo

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2883-2895, 2023, DOI:10.32604/iasc.2023.039805

    Abstract With the improvement of image editing technology, the threshold of image tampering technology decreases, which leads to a decrease in the authenticity of image content. This has also driven research on image forgery detection techniques. In this paper, a U-Net with multiple sensory field feature extraction (MSCU-Net) for image forgery detection is proposed. The proposed MSCU-Net is an end-to-end image essential attribute segmentation network that can perform image forgery detection without any pre-processing or post-processing. MSCU-Net replaces the single-scale convolution module in the original network with an improved multiple perceptual field convolution module so that the decoder can synthesize the… More >

  • Open Access


    An Overview of Image Tamper Detection

    Xingyu Chen*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 103-113, 2022, DOI:10.32604/jihpp.2022.039766

    Abstract With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software, the threshold of digital image editing becomes lower and lower. This makes it easy to trick the human visual system with professionally altered images. These tampered images have brought serious threats to many fields, including personal privacy, news communication, judicial evidence collection, information security and so on. Therefore, the security and reliability of digital information has been increasingly concerned by the international community. In this paper, digital image tamper detection methods are classified according to the clues that they rely on, detection methods… More >

  • Open Access


    Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

    Ali A. R. Alkhafaji*, Nilam Nur Amir Sjarif, M. A. Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 77-102, 2021, DOI:10.32604/cmc.2021.015770

    Abstract The text of the Quran is principally dependent on the Arabic language. Therefore, improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difficult challenges that researchers face today. Consequently, the diacritical marks in the Holy Quran which represent Arabic vowels () known as the kashida (or “extended letters”) must be protected from changes. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper… More >

  • Open Access


    Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3635-3648, 2021, DOI:10.32604/cmc.2021.015865

    Abstract The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks. Therefore, improving the security and authenticity of the text when it is transferred via the internet has become one of the most difficult challenges that researchers face today. Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra, and Damma in which making basic changes such as modifying diacritic arrangements can lead to change the text meaning. In… More >

Displaying 1-10 on page 1 of 4. Per Page