咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 7 篇 电气工程
    • 4 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
    • 1 篇 软件工程
  • 3 篇 理学
    • 3 篇 物理学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 特种医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 11 篇 forensic image a...
  • 1 篇 digital images
  • 1 篇 fias / quantizat...
  • 1 篇 ccd charge trans...
  • 1 篇 recognition meth...
  • 1 篇 prnuc
  • 1 篇 statistical tech...
  • 1 篇 dcnu
  • 1 篇 method
  • 1 篇 computer vision ...
  • 1 篇 digital surveill...
  • 1 篇 autoscaling
  • 1 篇 ear biometrics
  • 1 篇 forensic science
  • 1 篇 integrity
  • 1 篇 face recognition
  • 1 篇 data compression
  • 1 篇 hot pixel
  • 1 篇 multimedia
  • 1 篇 ear

机构

  • 1 篇 section of legal...
  • 1 篇 swedish national...
  • 1 篇 cased hsch darms...
  • 1 篇 univ engn & tech...
  • 1 篇 pattern analyt r...
  • 1 篇 inst forens anth...
  • 1 篇 baghdad univ com...
  • 1 篇 coll educ pure s...
  • 1 篇 nelson mandela m...
  • 1 篇 prince sultan un...
  • 1 篇 univ frankfurt m...
  • 1 篇 friedrich alexan...
  • 1 篇 univ engn & tech...
  • 1 篇 univ hamburg epp...
  • 1 篇 univ sci & techn...
  • 1 篇 edith cowan univ...
  • 1 篇 univ. of linkoep...
  • 1 篇 comsats univ isl...
  • 1 篇 friedrich alexan...
  • 1 篇 hazara univ mase...

作者

  • 1 篇 kettner m.
  • 1 篇 genc yakup
  • 1 篇 shah mohsin
  • 1 篇 klasen l
  • 1 篇 furnell steven
  • 1 篇 fahlander o
  • 1 篇 santoro valeria
  • 1 篇 akiba norimitsu
  • 1 篇 verhoff m. a.
  • 1 篇 igarashi naoaki
  • 1 篇 clarke nathan
  • 1 篇 mehmood zahid
  • 1 篇 potente s.
  • 1 篇 gehl a.
  • 1 篇 anjum adeel
  • 1 篇 scheler nicole
  • 1 篇 pflug a.
  • 1 篇 riess christian
  • 1 篇 tsuchiya ken'ich...
  • 1 篇 mashhadani shahl...

语言

  • 9 篇 英文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"主题词=Forensic Image Analysis"
11 条 记 录,以下是1-10 订阅
排序:
Compliance Challenges in forensic image analysis Under the Artificial Intelligence Act  30
Compliance Challenges in Forensic Image Analysis Under the A...
收藏 引用
30th European Signal Processing Conference (EUSIPCO)
作者: Lorch, Benedikt Scheler, Nicole Riess, Christian Friedrich Alexander Univ IT Secur Infrastruct Lab Erlangen Germany Friedrich Alexander Univ Int Criminal Law Res Unit Erlangen Germany
In many applications of forensic image analysis, state-of-the-art results are nowadays achieved with machine learning methods. However, concerns about their reliability and opacity raise the question whether such meth... 详细信息
来源: 评论
Detection of Tampered Region Boundaries in Splicing Forgery images  28
Detection of Tampered Region Boundaries in Splicing Forgery ...
收藏 引用
28th Signal Processing and Communications Applications Conference (SIU)
作者: Mutlu, Ozlem Genc, Yakup Gebze Tekn Univ Dept Comp Engn Kocaeli Turkey
The development of technology caused a significant increase in the use of images in forensic cases. It is common that manipulated images are presented as evidence in courts which requires an authenticity check. In thi... 详细信息
来源: 评论
Data hiding technique in steganography for information security using number theory
收藏 引用
JOURNAL OF INFORMATION SCIENCE 2019年 第6期45卷 767-778页
作者: Rehman, Amjad Saba, Tanzila Mahmood, Toqeer Mehmood, Zahid Shah, Mohsin Anjum, Adeel Al Yamamah Univ Riyadh CCIS Riyadh Saudi Arabia Prince Sultan Univ Dept Informat Syst CCIS Riyadh Saudi Arabia Univ Engn & Technol Dept Comp Sci Taxila Pakistan Univ Engn & Technol Dept Software Engn Taxila Pakistan Univ Sci & Technol China Sch Informat Sci & Technol Hefei Anhui Peoples R China Hazara Univ Masehra Dept Telecommun Masehra Khyber Pakhtunk Pakistan COMSATS Univ Islamabad Dept Comp Sci Islamabad Pakistan
In the current era, due to the widespread availability of the Internet, it is extremely easy for people to communicate and share multimedia contents with each other. However, at the same time, secure transfer of perso... 详细信息
来源: 评论
A Novel Multimedia-forensic analysis Tool (M-FAT)  12
A Novel Multimedia-Forensic Analysis Tool (M-FAT)
收藏 引用
12th International Conference on Internet Technology and Secured Transactions (ICITST)
作者: Mashhadani, Shahlaa Al-Kawaz, Hiba Clarke, Nathan Furnell, Steven Li, Fudong Plymouth Univ Ctr Secur Commun & Network Res Plymouth Devon England Coll Educ Pure Sci Comp Sci Dept Baghdad Iraq Baghdad Univ Comp Sci Dept Coll Sci Women Baghdad Iraq Edith Cowan Univ Secur Res Inst Perth WA Australia Nelson Mandela Metropolitan Univ Ctr Res Informat & Cyber Secur Port Elizabeth South Africa
Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based ... 详细信息
来源: 评论
Suspect Camera Determination  24
Suspect Camera Determination
收藏 引用
24th Signal Processing and Communication Application Conference (SIU)
作者: Yasar, Adem Deniz, Faruk Doru, Mehmet Jandarma Kriminal Daire Baskanligi Ankara Turkey
In this study;photograph and photograph frames taken from videos were examined for suspect camera detection. These analyses were carried out on examples taken from 15 cameras, 1 video camera and 7 mobile phones. Two m... 详细信息
来源: 评论
Ruler Detection for Autoscaling forensic images
收藏 引用
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND forensicS 2014年 第1期6卷 9-27页
作者: Bhalerao, Abhir Reynolds, Gregory Univ Warwick Dept Comp Sci Coventry W Midlands England Pattern Analyt Res Ltd Solihull W Midlands England
The assessment of forensic photographs often requires the calibration of the resolution of the image so that accurate measurements can be taken of crime-scene exhibits or latent marks. In the case of latent marks, suc... 详细信息
来源: 评论
Case studies and further improvements on source camera identification
Case studies and further improvements on source camera ident...
收藏 引用
Conference on Media Watermarking, Security, and forensics
作者: Kurosawa, Kenji Kuroki, Kenro Tsuchiya, Ken'ichi Igarashi, Naoaki Akiba, Norimitsu Natl Res Inst Police Sci Phys Sect Kashiwa Chiba 2770882 Japan
Actual case examples and further improvements on source camera identification are shown. There are three specific topics in this paper: (a) In order to improve performance of source camera identification, the hybrid i... 详细信息
来源: 评论
Ear biometrics: a survey of detection, feature extraction and recognition methods
收藏 引用
IET BIOMETRICS 2012年 第2期1卷 114-129页
作者: Pflug, A. Busch, C. CASED Hsch Darmstadt D-64295 Darmstadt Germany
The possibility of identifying people by the shape of their outer ear was first discovered by the French criminologist Bertillon, and refined by the American police officer Iannarelli, who proposed a first ear recogni... 详细信息
来源: 评论
Original or manipulated? Authenticity and integrity of digital images from a forensic perspective
收藏 引用
RECHTSMEDIZIN 2010年 第5期20卷 385-392页
作者: Ramsthaler, F. Kettner, M. Potente, S. Gehl, A. Kreutz, K. Verhoff, M. A. Univ Giessen Inst Rechtsmed D-35392 Giessen Germany Univ Frankfurt Main Zentrum Rechtsmed Frankfurt Germany Univ Hamburg Eppendorf Inst Rechtsmed Hamburg Germany Inst Forens Anthropol Wettenberg Germany
A prerequisite for the evaluation of the content of digital photographs is that the photo itself is authentic and has not been tampered with. The forensic analysis of photographs to establish whether a concealed but d... 详细信息
来源: 评论
Poor reliability of facial indices for comparative metric facial identification without parametrical superimposition
收藏 引用
forensic Science, Medicine, and Pathology 2007年 第4期3卷 275-282页
作者: Introna, Francesco De Donno, Antonio Santoro, Valeria Carbonara, Monica Section of Legal Medicine DiMIMP University of Bari Bari 70124 P.zza Giulio Cesare n.11 Italy Department of Statistic Science c/o Section of Legal Medicine University of Bari Bari 70124 P.zza Giulio Cesare n.11 Italy
The relationship between the craniometric indices that can be evinced from the comparison of two faces for identification purposes is considered a reliable method for the personal identification of faces. Our study ai... 详细信息
来源: 评论