000 | 04067nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-10-7644-2 | ||
003 | DE-He213 | ||
005 | 20220801213729.0 | ||
007 | cr nn 008mamaa | ||
008 | 190513s2020 si | s |||| 0|eng d | ||
020 |
_a9789811076442 _9978-981-10-7644-2 |
||
024 | 7 |
_a10.1007/978-981-10-7644-2 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aRoy, Aniket. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _933968 |
|
245 | 1 | 0 |
_aDigital Image Forensics _h[electronic resource] : _bTheory and Implementation / _cby Aniket Roy, Rahul Dixit, Ruchira Naskar, Rajat Subhra Chakraborty. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXVI, 89 p. 45 illus., 32 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v755 |
|
505 | 0 | _aChapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work. | |
520 | _aThis book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aComputer vision. _933969 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aComputer Vision. _933970 |
650 | 2 | 4 |
_aCybercrime. _933477 |
700 | 1 |
_aDixit, Rahul. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _933971 |
|
700 | 1 |
_aNaskar, Ruchira. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _933972 |
|
700 | 1 |
_aChakraborty, Rajat Subhra. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _933973 |
|
710 | 2 |
_aSpringerLink (Online service) _933974 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811076435 |
776 | 0 | 8 |
_iPrinted edition: _z9789811076459 |
830 | 0 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v755 _933975 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-7644-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c75530 _d75530 |