Image Forgery Detection Using Singular Value Decomposition with Some Attacks
暂无分享,去创建一个
Umashankar Rawat | Neelesh Kumar Jain | Prashant Shukla | Rachana Dubey | Neeraj Rathore | N. Jain | Prashant Shukla | R. Dubey | U. Rawat | N. Rathore
[1] Sonja Grgic,et al. CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.
[2] Array В. Кузнецов,et al. Алгоритм обнаружения искажённых дубликатов на цифровых изображениях с использованием бинарных градиентных контуров , 2016 .
[3] Savroop Kaur,et al. Biorthogonal Wavelet Transform Using Bilateral Filter and Adaptive Histogram Equalization , 2015 .
[4] Osamah M. Al-Qershi,et al. Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.
[5] Neeraj Rathore,et al. Dynamic Threshold Based Load Balancing Algorithms , 2016, Wirel. Pers. Commun..
[6] Neeraj Rathore,et al. Efficient Agent Based Priority Scheduling and Load Balancing Using Fuzzy Logic in Grid Computing , 2015 .
[7] Inderveer Chana,et al. Report on Hierarchical Load Balancing Technique in Grid Environment , 2013 .
[8] Inderveer Chana,et al. Job Migration Policies for Grid Environment , 2016, Wirel. Pers. Commun..
[9] Azlan Mohd Zain,et al. Glowworm swarm optimization (GSO) for optimization of machining parameters , 2016, J. Intell. Manuf..
[10] Inderveer Chana,et al. Job migration with fault tolerance based QoS scheduling using hash table functionality in social Grid computing , 2014, J. Intell. Fuzzy Syst..
[11] Hidema Tanaka,et al. Security Evaluation of Light-Weight Block Ciphers by GPGPU , 2016 .
[12] M. Ulutas,et al. A new copy move forgery detection technique with automatic threshold determination , 2016 .
[13] Vinay Chopra,et al. A Survey: Copy-Move Forgery Detection Methods , 2016 .
[14] Rathore Neeraj,et al. ETHICAL HACKING AND SECURITY AGAINST CYBER CRIME , 2016 .
[15] Inderveer Chana,et al. A sender initiate based hierarchical load balancing technique for grid using variable threshold value , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).
[16] Inderveer Chana,et al. Variable threshold-based hierarchical load balancing technique in Grid , 2014, Engineering with Computers.
[17] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[18] Rajesh Kumar,et al. Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[19] Neeraj Rathore,et al. Performance of Hybrid Load Balancing Algorithm in Distributed Web Server System , 2018, Wirel. Pers. Commun..
[20] Thuong Le-Tien,et al. A Robust Algorithm of Forgery Detection in Copy-Move and Spliced Images , 2016 .
[21] John F. Roddick,et al. An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..
[22] Umashankar Rawat,et al. Efficient Hybrid Load Balancing Algorithm , 2020, National Academy Science Letters.
[23] Guangqun Zhang,et al. SURF-based Detection of Copy-Move Forgery in Flat Region , 2012 .
[24] Vina Ayumi,et al. Distribution-Sensitive Learning on Relevance Vector Machine for Pose-Based Human Gesture Recognition , 2015 .
[25] Inderveer Chana,et al. Load Balancing and Job Migration Techniques in Grid: A Survey of Recent Trends , 2014, Wirel. Pers. Commun..
[26] Neeraj Rathore,et al. Map Reduce Architecture for Grid , 2015 .
[27] Amit Mishra,et al. An Efficient Image Forgery Detection Using Biorthogonal Wavelet Transform and Improved Relevance Vector Machine , 2018, Wirel. Pers. Commun..