Image manipulation represents a true "art", which takes into account the images with a lot of their properties. There are many ways a digital photo can be manipulated, so the forger can use one or more combi...
详细信息
ISBN:
(纸本)9781538649015
Image manipulation represents a true "art", which takes into account the images with a lot of their properties. There are many ways a digital photo can be manipulated, so the forger can use one or more combinations of these in order to make their detection more difficult. On the other hand, only one detection technique is specific to a single image manipulation. For instance, a duplication detection method is based on an existing correlation between the segment of the original image and the copied image. This paper presents a robust Java implementation of an algorithm detecting such a Copy-Move forged pictures.
Distributed detection of information flows is considered. The detector detects the presence of information flows by collecting timing information from nodes of interest through channels of finite capacity. The informa...
详细信息
ISBN:
(纸本)9781424413973
Distributed detection of information flows is considered. The detector detects the presence of information flows by collecting timing information from nodes of interest through channels of finite capacity. The information flows are assumed to be perturbed up to a bounded delay and interleaved with chaff. Joint compression and detection schemes are proposed to achieve reliable detection with inaccurate measurements. detection performance is analytically evaluated by robustness against chaff as functions of the capacity constraints in the data collection. The proposed detectors are proved to be optimal for their corresponding quantizers. A comparison of their performance gives guidelines on quantizer design.
暂无评论