50,354 Hits in 4.8 sec

Future Trends in Digital Face Manipulation and Detection [chapter]

Ruben Tolosana, Christian Rathgeb, Ruben Vera-Rodriguez, Christoph Busch, Luisa Verdoliva, Siwei Lyu, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Peter Rot, Klemen Grm, Vitomir Štruc (+10 others)
2022 Advances in Computer Vision and Pattern Recognition  
AbstractRecently, digital face manipulation and its detection have sparked large interest in industry and academia around the world.  ...  This chapter briefly discusses the state of the art of digital face manipulation and detection.  ...  Future Trends in Digital Face Manipulation and Detection  ... 
doi:10.1007/978-3-030-87664-7_21 fatcat:i4xchpnqvza33lyjkapoc64sre

Book flipping and scanning machine review

2016 International Journal of Latest Trends in Engineering and Technology  
Although paper documents can be preserved by imaging and digitization, manual book scanning is expensive and tedious. As a result , lesser-used documents tend to have a lower scanning priority.  ...  Our future generations will undoubtedly find that many of the lost documents would been crucial to their research. Hence scanning of books and documents is vital as well as necessary.  ...  Along with this technology and trend, particularly in the form of books, is fetching demand and book digitization is developing fast in whole world.  ... 
doi:10.21172/1.72.538 fatcat:6tjailfmnrf53ehihox4vsim4m

MEWS: Real-time Social Media Manipulation Detection and Analysis [article]

Trenton W. Ford, William Theisen, Michael Yankoski, Tom Henry, Farah Khashman, Katherine R. Dearstyne, Tim Weninger
2022 arXiv   pre-print
It describes the various aspects of the ingestion, manipulation detection, and graphing algorithms employed to determine--in near real-time--the relationships between social media images as they emerge  ...  By combining these various technologies into a single processing pipeline, MEWS can identify manipulated media items as they arise and identify when these particular items begin trending on individual  ...  Acknowledgments This work was supported by the US Agency for International Development (USAID) Cooperative Agreement number 7200AA18CA00059 and by the Defense Advanced Research Projects Agency and the  ... 
arXiv:2205.05783v2 fatcat:wmvinrd6kzfoho5sj2tg7263dy

Identifying Photo Forgery using Lighting Elements

Manoj Kumar, Sangeet Srivastava
2016 Indian Journal of Science and Technology  
Nowadays digital media manipulation has become a common trend. Digital media, especially images, being one of the primary modes of communication, can be easily manipulated.  ...  Current research trends in digital image forensics focus on validating the authenticity of the image.  ...  This digital data is massively shared and distributed over the internet and due to this, data is prone to manipulations.  ... 
doi:10.17485/ijst/2016/v9i48/105748 fatcat:m3xeu4wfnjboba3ehxqoo3q56u

Silent Sound Technology: A Solution to Noisy Communication

Priya Jethani, Bharat Choudhari
2014 International Journal of Engineering Trends and Technoloy  
when we are in movie, theatre, bus, train there is lot of noise around us we can't speak properly on a mobile phone. In future this problem is eliminated with the help of Silent sound technology.  ...  that occur when we speak and converting them into electrical pulses that can then be turned into speech, without a sound uttered .When demonstrated, it seems to detect every lip movement and internally  ...  involves a collection of techniques for the manipulation of digital images by computers.  ... 
doi:10.14445/22315381/ijett-v9p331 fatcat:u7mrqfyvf5fwnpwbjjtxlzbhba

On the Detection of Digital Face Manipulation [article]

Hao Dang, Feng Liu, Joel Stehouwer, Xiaoming Liu, Anil Jain
2020 arXiv   pre-print
Detecting manipulated facial images and videos is an increasingly important topic in digital media forensics.  ...  Hence, it is crucial to detect manipulated face images and localize manipulated regions.  ...  State-of-the-art performance of digital facial forgery detection for both seen and unseen manipulation methods. Related Work Digital Face Manipulation Methods.  ... 
arXiv:1910.01717v5 fatcat:cwue4oqnyndxpdqjaosf4d77sm


Carlos Davalos
2020 ENERO - DICIEMBRE 2020  
Another objective of the presented research is to set a baseline for future efforts focused on how Latin American democratic regimes behave and generate digital communication on social media platforms.  ...  Using a qualitative approach, consisting of observation, textual analysis, and online ethnography, findings show that some Mexican government's manipulation of inconvenient Twitter conversations could  ...  Is Twitter, then, as secure as having a face-to-face conversation about politics?  ... 
doi:10.29105/rcp2-6 fatcat:hvduw3i44fda5j6qhjhad6l63i

Detection of Forgery Part in Forgery Image Using Color Intensity

Ms Kopulkar Shital Rangnath
Powerful digital image editing software makes images modifications straightforward. Questions pictures as evidence for real world events, this undermines our trust in photographs and in particular.  ...  In the color of the illumination of images, we propose a forgery detection method that exploits subtle inconsistencies. Our approach is machine learning based and requires minimal user interaction.  ...  Anderson de Rezende Rocha for their beneficial information and knowledge  ... 
doi:10.18535/ijetst/v3i02.03 fatcat:wk56tazguvcmxnbvg2adhpoy7u

Deepfake Forensics, an AI-synthesized Detection with Deep Convolutional Generative Adversarial Networks

Dafeng Gong
2020 International Journal of Advanced Trends in Computer Science and Engineering  
This study analyzes more than hundred published papers related to the application of GANs technology in various fields to generate digital multimedia data and expounds the technologies that can be used  ...  Finally, the study also puts forward its limitations and possible future research directions and recommendations.  ...  The framework achieves remarkably high detection accuracy on unseen face forgeries, as well as the ability to predict face X-rays reliably and faithfully on all kinds of recent popular face manipulations  ... 
doi:10.30534/ijatcse/2020/58932020 fatcat:o3wnwepkx5dwvpdg5asnxzzo5q

Unified Detection of Digital and Physical Face Attacks [article]

Debayan Deb, Xiaoming Liu, Anil K. Jain
2021 arXiv   pre-print
State-of-the-art defense mechanisms against face attacks achieve near perfect accuracies within one of three attack categories, namely adversarial, digital manipulation, or physical spoofs, however, they  ...  Proposed method can detect an attack within 3 milliseconds on a Nvidia 2080Ti. UniFAD can also identify the attack types and categories with 75.81% and 97.37% accuracies, respectively.  ...  Over the years, a clear trend in the increase of attack types in each category can be observed in Tab Dataset (DFFD) [12] includes 7 digital manipulation attack types.  ... 
arXiv:2104.02156v1 fatcat:2ahwj4baonh5hdbz5tpbacimee

Face Manipulation Detection in Remote Operational Systems [chapter]

Marc Michel Pic, Gaël Mahfoudi, Anis Trabelsi, Jean-Luc Dugelay
2022 Advances in Computer Vision and Pattern Recognition  
After a definition of the different Face Manipulation categories and the common algorithms used to produce them, we go through the various manipulation detection algorithms and common image and video forgery  ...  AbstractIn this chapter, we present the various categories of Face Manipulation and their use within different remote operational systems.  ...  It confirms the global trend of generalising the use of remote operations, and we believe that this trend will continue in the coming years.  ... 
doi:10.1007/978-3-030-87664-7_19 fatcat:nihnw7relzcyhakz7m5fhvgfxu

Lessons Learned From a Rural Classroom Study: Transitioning From Concrete to Virtual Manipulatives to Teach Math Fact Fluency to Students With Learning Disabilities

Matthew Kabel, Jiyung Hwang, Jiwon Hwang
2021 Journal of Curriculum Studies Research  
math fact fluency in multiplication and explored the potential for virtual manipulatives in rural classrooms from the teacher's perspective.  ...  equity in learning and teaching.  ...  These educational tools could in future be adapted for practitioners and teachers to use in virtual and face-to-face environments.  ... 
doi:10.46303/jcsr.2021.7 fatcat:3ucusrsvl5eezkqqzh3nqufhqu

Deepfake Video Detection Using Convolutional Neural Network

Aarti Karandikar
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Deepfakes refer to manipulated videos, or other digital representations produced by sophisticated artificial intelligence, that yield fabricated images and sounds that appear to be real.  ...  Detecting these videos is a massive problem because of the increasing developments in more realistic deepfake creation technologies emerging every now and then.  ...  The authors hope that the presented techniques for analysis on deepfakes will pave the way for further research in the field of image & video forgery and digital media forensics.  ... 
doi:10.30534/ijatcse/2020/62922020 fatcat:vncj6bf7pfgobn2h6v7hhze7cm

Advanced Crop Monitoring using Internet of Things based Smart Intrusion and Prevention in Agricultural Land

G. Naveen Balaji, V. Nandhini, S.Mithra | R.Naveena | N.Priya
2018 International Journal of Trend in Scientific Research and Development  
In the world, economic growth of many countries mainly depends on crop cultivation. Agriculture provides the food for people and produces several raw materials for industries.  ...  To overcome this problem, monitoring the crop water requirements, temperature and humidity of the cultivating land and a system to prevent the entry of animals into the farm is required.  ...  Well-researched domains of object detection include face detection and pedestrian detection.  ... 
doi:10.31142/ijtsrd9611 fatcat:lhtvdirxlfgi5g2543ngp4hy6u

Insights on Schemes towards Image Counterfeit Attacks & Their Effectiveness

The future direction of this investigational study aims to come up with a solution model which can address the accuracy and complexity problems which exist in the conventional system.  ...  The study reviewed the prime contribution published in the last four years and also addressed the unsolved research problems which are needed to be objectified.  ...  and identify the manipulated region in an image as manipulated regions are not visually apparent often.  ... 
doi:10.35940/ijitee.c8451.019320 fatcat:o5wyk6ao4bf7refupdqo7wwd5q
« Previous Showing results 1 — 15 out of 50,354 results