Improvement of the accuracy of detection of cloned regions in digital images
Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
Подобные документы
- 51. Strategies of information and innovation activity development at enterprise in digital conditions
The robotics complex as a strategy for the development of information and innovation activity in the enterprise in terms of digitalization. The digital recording, chronology, accessibility and openness, globality - the main benefits of blockchain.
статья, добавлен 08.04.2022 Modeling attempts of unauthorized extraction of stegano content (halftone test images) for different variants of disintegration of the array of lengths of the series of reference blocks of the original images. Modeling using portrait and landscape.
статья, добавлен 25.02.2024Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.
учебное пособие, добавлен 15.09.2012Изучение информационной системы отдела кадров вуза и рассмотрение средств защиты системы. Создание модели отдела с помощью экспертной системы Digital Security Office для выявления угроз безопасности и поиска дальнейших решений по их устранению.
статья, добавлен 23.03.2018The support was the key to effective implementation of advanced technologies and systemic implementation scale of China’s digital policy. A comparative analysis of the transformational processes of digitalization of China and Ukraine was carried out.
статья, добавлен 21.08.2022The physical principles of meteor radio. A block diagram of hardware and software for sensing meteor trails. The principles of software-defined radio system. А functional diagram of a digital oscillator. shortcomings. Range and security meteor radio.
статья, добавлен 06.05.2018The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
статья, добавлен 25.03.2016The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.
статья, добавлен 04.09.2022Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.
статья, добавлен 28.09.2016Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
статья, добавлен 27.05.2021Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.
статья, добавлен 29.04.2019The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.
статья, добавлен 21.04.2020Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.
статья, добавлен 14.01.2017In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
статья, добавлен 07.12.2016Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.
книга, добавлен 08.03.2014The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
статья, добавлен 26.08.2020The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
статья, добавлен 24.03.2016Search for numerical encoding methods for lossless binary message. Consideration of methods for compressing digital data using binomial coefficients. Using the decomposition of the Bernoulli information source and calculating the maximum value of entropy.
статья, добавлен 02.10.2024Description of the differential circuits compute checksums. Collision detection for a set of hash functions (MD4, MD5). Reconstructing the Chinese method of encryption. Check internal differences files and conditions for pair of colliding messages.
статья, добавлен 15.03.2014The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
статья, добавлен 18.09.2020Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.
статья, добавлен 26.10.2016Pattern discovery in biosequences. Social network mining from the web. Discovering spatio-textual association rules in document images. Discovery of latent patterns with hierarchical bayesian mixed-membership models and the issue of model choice.
книга, добавлен 19.03.2014The problem of three-dimensional reconstruction on Android devices, sensors system. Process of reconstructing three-dimensional models. Camera calibration, finding matching points between images, the use of sensors Android device to solve the problem.
магистерская работа, добавлен 27.08.2016Система PDH (Plesiochronous Digital Hierarchy) как одна из первых систем, предназначенных для передачи информации в цифровом виде на большие расстояния. Схема мультиплексирования европейской системы, анализ и оценка ее главных преимуществ и недостатков.
реферат, добавлен 02.12.2013