搜索资源列表
LiveView_0.7b_Public_src.tar
- Live View 是一个采用 Java 开发的图形化工具,用来从直接从某个磁盘分区或者整个磁盘来创建一个 VMware 的虚拟机。 最新版0.7b已经支持Vista和Windows Server 2008-LiveView is a forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image. This allows an examiner to "boo
Prospects_on_Blind_Digital_Image_Forensics_Technol
- 数字图像盲取证技术作为一种不依赖任何预签名提取或预嵌入信息来鉴别图像真伪和来源的技术, 正逐步成为多媒 体安全领域新的研究热点,基于真实性鉴别的数字图像盲取证技术综述-Digital image forensics technology as a signature does not depend on any pre-extracted or pre-embedded information to identify the source of the image authenticity
mqzh
- 总结了数字图像盲取证技 术研究基础与发展方向,分别从数字图像取证理论模型、针对篡改手 段的真实性取证、针对隐密方法的完整性取证、基于图像自然属性的 原始性取证和隐密分析取证系统框架五个方面进行了研究 -Summary of digital image forensics technology research and development base, respectively, from the theoretical model of digital image forens
Digital-Image-Forensics-report
- tamper detection-pdf
Identification-of-JPEG
- JPEG图像盲取证技术研究,介绍经过2次,3次JPEG压缩图像的鉴别方法-JPEG image forensics technology, introduced after two times, three times a method of identifying JPEG compressed images
myPCA_Nicolas
- PCA可用于图像检测的盲取证方面,效果非常好-PCA can be used for blind image forensics testing, the effect is very good
jpegghost
- 此代码是对JPEG图像二次压缩所产生的JPEGGhost进行的Matlab仿真。适合图像取证初学者学习。-This code is a JPEG image generated by the secondary compression JPEGGhost Matlab simulation. Suitable for image forensics for beginners to learn.
surf
- surf算法对图像的配准实时的取证,经本人验证,该程序好用无误,可放心使用-surf algorithm for image registration in real time forensics, after I verify that the correct program easy to use, ease of use
NMF-NMF-SQ-Hashing
- 通过强大和安全的形象散列 非负矩阵因式分解,在信息取证与安全,376-390,2007年IEEE交易。NMF-NMF-SQ哈希- V. Monga, and M. K. Mihcak, Robust and secure image hashing via non-negative matrix factorizations, IEEE Transactions on Information Forensics and Security, 2(3), 376-390, 2007.
ImageForensics-master
- source code for image forensics
CameraFingerprint_1.0
- 利用PRNU的图像指纹识别算法,可用于进行图像认证,来源辨别等。主要用于数字图像取证方面。-PRNU image use fingerprint recognition algorithm, can be used for image authentication, and other sources to identify. Mainly used for digital image forensics.
JPEG_AntiForensic
- 【论文源代码】M. C. Stamm and K. J. R. Liu, Anti-Forensics of Digital Image Compression , IEEE Trans. on Information Forensics and Security, vol. 6, no. 3, pp. 1050 - 1065, Sep. 2011.-This code was written by Matthew C. Stamm at the University of Maryland,
illum_maps
- 论文源代码 :[2013TIFS] Exposing digital image forgeries by illumination color classification-Some notes on A) Compilation B) Execution of the code C) Parameters D) General remarks on our work in color constancy and image forensics E) Referencing
Sparse image and signal processing
- 这本书在稀疏的多尺度图像和信号处理提出了艺术状态,包括线性多尺度变换,如小波,脊波和曲波变换、非线性、多尺度变换基于中值和数学形态学算子。最近的稀疏性和形态多样性的概念描述和利用各种问题,如去噪,反问题正规化,稀疏信号分解,盲源分离,压缩感知。 这本书的理论和实践研究相结合的领域,如天文学、生物学、物理学、数字媒体应用和取证。最后一章探讨了信号处理中的一个范式转换,表明以前的信息取样和提取的限制可以用非常重要的方法加以克服。 MATLAB和IDL代码伴随这些方法和应用程序重现。 实验并说明
CNN
- 用深度卷积神经网络进行图像盲取证,定位复制粘贴篡改区域(Blind forensics of image using deep convolution neural network to locate copy-paste tampered area)