|
|
|
|
LEADER |
05707nma a2201345 u 4500 |
001 |
EB002050040 |
003 |
EBX01000000000000001193706 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220822 ||| eng |
020 |
|
|
|a 9783036528069
|
020 |
|
|
|a 9783036528076
|
020 |
|
|
|a books978-3-0365-2807-6
|
100 |
1 |
|
|a Amerini, Irene
|
245 |
0 |
0 |
|a Image and Video Forensics
|h Elektronische Ressource
|
260 |
|
|
|a Basel
|b MDPI - Multidisciplinary Digital Publishing Institute
|c 2022
|
300 |
|
|
|a 1 electronic resource (424 p.)
|
653 |
|
|
|a facial Presentation Attack Detection (PAD)
|
653 |
|
|
|a deepfakes
|
653 |
|
|
|a forensic evidence evaluation
|
653 |
|
|
|a image forensics
|
653 |
|
|
|a forged image detection
|
653 |
|
|
|a multimedia content manipulation
|
653 |
|
|
|a photo response non-uniformity
|
653 |
|
|
|a deep learning
|
653 |
|
|
|a smartphone identification
|
653 |
|
|
|a video forensic
|
653 |
|
|
|a compression
|
653 |
|
|
|a audio forensics
|
653 |
|
|
|a facial manipulations
|
653 |
|
|
|a deep one-class
|
653 |
|
|
|a hand-crafted features
|
653 |
|
|
|a short-time Fourier transform (STFT)
|
653 |
|
|
|a face landmarks
|
653 |
|
|
|a user profile linking
|
653 |
|
|
|a forensics detection
|
653 |
|
|
|a social networks
|
653 |
|
|
|a camera fingerprint
|
653 |
|
|
|a fake image
|
653 |
|
|
|a Information technology industries / bicssc
|
653 |
|
|
|a facial recognition
|
653 |
|
|
|a RGB camera-based anti-spoofing methods
|
653 |
|
|
|a social media platform identification
|
653 |
|
|
|a digital forensics
|
653 |
|
|
|a Deepfake
|
653 |
|
|
|a convolutional neural networks
|
653 |
|
|
|a GAN-generated image detection
|
653 |
|
|
|a fake image detection
|
653 |
|
|
|a computer vision
|
653 |
|
|
|a Harris
|
653 |
|
|
|a camera model identification
|
653 |
|
|
|a anomaly detection
|
653 |
|
|
|a face morphing
|
653 |
|
|
|a deepfake detection
|
653 |
|
|
|a media forensics
|
653 |
|
|
|a cybersecurity
|
653 |
|
|
|a PRNU
|
653 |
|
|
|a videos
|
653 |
|
|
|a survey
|
653 |
|
|
|a support vector machines
|
653 |
|
|
|a n/a
|
653 |
|
|
|a performance
|
653 |
|
|
|a discrete fourier transform
|
653 |
|
|
|a multimedia forensics
|
653 |
|
|
|a likelihood ratio
|
653 |
|
|
|a source identification
|
653 |
|
|
|a plausibility of decisions
|
653 |
|
|
|a facial anti-spoofing
|
653 |
|
|
|a simple linear iterative clustering (SLIC)
|
653 |
|
|
|a social network
|
653 |
|
|
|a video source attribution
|
653 |
|
|
|a VGG
|
653 |
|
|
|a inter-frame forgery
|
653 |
|
|
|a estimation by rotational invariant techniques (ESPRIT)
|
653 |
|
|
|a noise level function
|
653 |
|
|
|a blind estimation
|
653 |
|
|
|a GLCM
|
653 |
|
|
|a video forensics
|
653 |
|
|
|a transfer learning
|
653 |
|
|
|a multiple signal classification (MUSIC)
|
653 |
|
|
|a heatmap
|
653 |
|
|
|a correlation
|
653 |
|
|
|a JPEG
|
653 |
|
|
|a copy-move forgery detection
|
653 |
|
|
|a snapchat
|
653 |
|
|
|a UAV videos
|
653 |
|
|
|a digital investigations
|
653 |
|
|
|a Tensor
|
653 |
|
|
|a forensic process model
|
653 |
|
|
|a deepfake
|
653 |
|
|
|a source camera identification
|
653 |
|
|
|a resolution
|
653 |
|
|
|a biometrics
|
653 |
|
|
|a digital image forensics
|
653 |
|
|
|a classification
|
653 |
|
|
|a SVD
|
653 |
|
|
|a Generative Adversarial Networks
|
653 |
|
|
|a DeepFake detection
|
653 |
|
|
|a automatic border control
|
653 |
|
|
|a pattern recognition
|
653 |
|
|
|a neural network
|
700 |
1 |
|
|a Baldini, Gianmarco
|
700 |
1 |
|
|a Leotta, Francesco
|
700 |
1 |
|
|a Amerini, Irene
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
028 |
5 |
0 |
|a 10.3390/books978-3-0365-2807-6
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/78721
|z DOAB: description of the publication
|
856 |
4 |
0 |
|u https://www.mdpi.com/books/pdfview/book/4812
|7 0
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 000
|
082 |
0 |
|
|a 780
|
082 |
0 |
|
|a 700
|
082 |
0 |
|
|a 600
|
520 |
|
|
|a Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity.
|