搜索资源列表
Prospects_on_Blind_Digital_Image_Forensics_Technol
- 数字图像盲取证技术作为一种不依赖任何预签名提取或预嵌入信息来鉴别图像真伪和来源的技术, 正逐步成为多媒 体安全领域新的研究热点,基于真实性鉴别的数字图像盲取证技术综述-Digital image forensics technology as a signature does not depend on any pre-extracted or pre-embedded information to identify the source of the image authenticity
mqzh
- 总结了数字图像盲取证技 术研究基础与发展方向,分别从数字图像取证理论模型、针对篡改手 段的真实性取证、针对隐密方法的完整性取证、基于图像自然属性的 原始性取证和隐密分析取证系统框架五个方面进行了研究 -Summary of digital image forensics technology research and development base, respectively, from the theoretical model of digital image forens
Identification-of-JPEG
- JPEG图像盲取证技术研究,介绍经过2次,3次JPEG压缩图像的鉴别方法-JPEG image forensics technology, introduced after two times, three times a method of identifying JPEG compressed images
jpegghost
- 此代码是对JPEG图像二次压缩所产生的JPEGGhost进行的Matlab仿真。适合图像取证初学者学习。-This code is a JPEG image generated by the secondary compression JPEGGhost Matlab simulation. Suitable for image forensics for beginners to learn.
cmfd_framework
- OPENCV下编写的数字取证平台,算法很多很全,请参照论文"An Evaluation of Popular Copy-Move Forgery Detection Approaches" Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, Elli Angelopoulou. In: IEEE Transactions on Information Forensics and Security (TIFS)
NMF-NMF-SQ-Hashing
- 通过强大和安全的形象散列 非负矩阵因式分解,在信息取证与安全,376-390,2007年IEEE交易。NMF-NMF-SQ哈希- V. Monga, and M. K. Mihcak, Robust and secure image hashing via non-negative matrix factorizations, IEEE Transactions on Information Forensics and Security, 2(3), 376-390, 2007.
JPEG_AntiForensic
- 【论文源代码】M. C. Stamm and K. J. R. Liu, Anti-Forensics of Digital Image Compression , IEEE Trans. on Information Forensics and Security, vol. 6, no. 3, pp. 1050 - 1065, Sep. 2011.-This code was written by Matthew C. Stamm at the University of Maryland,
sea---Xufeng-Lin
- 【论文源代码】Xufeng Lin and Chang-Tsun Li, Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization, IEEE Transactions on Information Forensics and Security, vol.11, no.1, pp.126-140, Jan. 2016-Sorce Code for the article : Xufeng Lin and Chan
illum_maps
- 论文源代码 :[2013TIFS] Exposing digital image forgeries by illumination color classification-Some notes on A) Compilation B) Execution of the code C) Parameters D) General remarks on our work in color constancy and image forensics E) Referencing
sift-master
- SIFT具有比其他大多数grep选择略有不同的焦点。代码搜索、日志搜索/数字取证和数据处理是主要用例,但主要目标是提供安全的默认值,并使其易于为特定的用例配置。(sift has a slightly different focus than most other grep alternatives. Code search, log search / digital forensics and data processing are the main use cases, but the pr