Forensically
From MaRDI portal
Software:5974291
swMATH44109MaRDI QIDQ5974291FDOQ5974291
Author name not available (Why is that?)
Cited In (25)
- Enhanced block-based copy-move forgery detection using \(k\)-means clustering
- A fuzzy-based multi-criteria decision-making approach for the selection of digital image forensic tools
- An intelligent forensics approach for detecting patch-based image inpainting
- Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals
- An image copy-move forgery detection scheme based on A-KAZE and SURF features
- Quantization-unaware double JPEG compression detection
- Fingerprint science
- Applied artificial bee colony optimization algorithm in fire evacuation routing system
- Chemical and forensic analysis of JFK assassination bullet lots: Is a second shooter possible?
- Nonce-Based Key Agreement Protocol Against Bad Randomness
- Novel bifurcation results for a delayed fractional-order quaternion-valued neural network
- On the use of dense SNP marker data for the identification of distant relative pairs
- Epistemic formulae, argument structures, and a narrative on identity and deception: a formal representation from the AJIT subproject within AURANGZEB
- On the vulnerability of face verification systems to hill-climbing attacks
- A Bayesian hierarchical model for evaluating forensic footwear evidence
- Passive method for rescale detection using quadrature mirror filter based higher order statistical features
- Use of random time-intervals (RTIs) generation for biometric verification
- Procedural response and digital evidence exposure in information security incidents
- A new authentication procedure for client-server applications using HMAC
- Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
- Digital image steganography: survey and analysis of current methods
- Passive detection of doctored JPEG image via block artifact grid extraction
- The solution of a generalized Sylvester quaternion matrix equation and its application
- A secure and improved self-embedding algorithm to combat digital document forgery
- Multimodal biometrics using geometry preserving projections
This page was built for software: Forensically