We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 2,425 results
  1. WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement

    Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However,...

    Zi-Nuo Li, Xu-Hang Chen, ... Chi-Man Pun in Journal of Computer Science and Technology
    Article 01 March 2024
  2. Spider Monkey Optimization-Based Image Data Forgery Detection Over Vehicular Cloud Computing

    Images are commonly shared through various mediums such as newspapers, magazines, Internet, and scientific journals. But with the accessibility of...
    M. Manasa, Shilpa S. Chaudhari in Human-Centric Smart Computing
    Conference paper 2024
  3. A surge in obsidian exploitation more than 1.2 million years ago at Simbiro III (Melka Kunture, Upper Awash, Ethiopia)

    Pleistocene archaeology records the changing behaviour and capacities of early hominins. These behavioural changes, for example, to stone tools, are...

    Margherita Mussi, Eduardo Mendez-Quintas, ... Susana Rubio Jara in Nature Ecology & Evolution
    Article 19 January 2023
  4. An archaeometric approach to biocontamination with manganese pigments in ancient marine hunter-gatherers of the Atacama Desert: health, ideological, and socioecononic considerations

    The use of poisonous pigments for mortuary preparation in ancient hunter-gatherers allows us to investigate the relationship between this practice...

    Bernardo Arriaza, Leonardo Figueroa, ... José Castelleti in Archaeological and Anthropological Sciences
    Article Open access 17 November 2023
  5. The Retouched Tools of the Lower Component of AEP-1 (Piedra Museo, Argentina) from a Perspective of Design

    In this chapter, the lithic assemblages from SU 4/5 and SU 6 found in the AEP-1 site (in the Piedra Museo archaeological locality) were evaluated to...
    Chapter 2022
  6. Is it possible to estimate sex from signatures and handwriting? A review of literature, observations, and future perspectives

    Estimation of sex holds great significance in the field of Forensic Science since it helps establish the identity of an individual during a crime...

    Rakesh Meena, Kewal Krishan, ... Tanuj Kanchan in The Science of Nature
    Article 03 July 2023
  7. Towards a Grammar of Manipulated Photographs: The Social Semiotics of Digital Photo Manipulation

    This article explores the visual grammatical implications of contemporary digital photo manipulation. The rapid and broad distribution of photographs...
    Morten Boeriis in Truth Claims Across Media
    Chapter Open access 2024
  8. Digital Face Manipulation in Biometric Systems

    Biometric technologies, in particular faceDigital face manipulation Biometric system recognitionCommercial Off-the-Shelf (COTS) Face recognition, are...
    Mathias Ibsen, Christian Rathgeb, ... Christoph Busch in Handbook of Digital Face Manipulation and Detection
    Chapter Open access 2022
  9. A sequential convolutional neural network for image forgery detection

    In this digital era, images are the major information carriers of contemporary society. Several multimedia manipulation tools like CorelDRAW, GIMP,...

    Simranjot Kaur, Sumit Chopra, ... Gagandeep Singh in Multimedia Tools and Applications
    Article 11 October 2023
  10. First combined application of photoacoustic and optical techniques to the study of an historical oil painting

    Optical techniques are routinely applied in artworks analysis to obtain structural, morphological, and compositional information on the examined...

    Alice Dal Fovo, George J. Tserevelakis, ... Raffaella Fontana in The European Physical Journal Plus
    Article 19 July 2021
  11. An Overview of GIMP 2.10

    If you are an absolute beginner, I hope that this chapter will provide you with enough information about GIMP to follow along with the exercises in...
    Chapter 2023
  12. Tackling the RecSys Side Effects via Deep Learning Approaches

    Digital platforms, such as social media and e-commerce websites, widely make use of Recommender Systems to provide value to users. However, social...
    Conference paper 2023
  13. Multi-Curve Translator for High-Resolution Photorealistic Image Translation

    The dominant image-to-image translation methods are based on fully convolutional networks, which extract and translate an image’s features and then...
    Yuda Song, Hui Qian, **n Du in Computer Vision – ECCV 2022
    Conference paper 2022
  14. Deepfakes and the epistemic apocalypse

    It is widely thought that deepfake videos are a significant and unprecedented threat to our epistemic practices. In some writing about deepfakes,...

    Joshua Habgood-Coote in Synthese
    Article Open access 09 March 2023
  15. A fast copy-move image forgery detection approach on a reduced search space

    This paper proposes an overlap** block-based passive forensic scheme for copy–move forgery detection in digital images that works on a reduced...

    Srilekha Paul, Arup Kumar Pal in Multimedia Tools and Applications
    Article 04 January 2023
  16. Facial Image Manipulation Detection Using Cellular Automata and Transfer Learning

    In digital media forensics, detecting manipulated facial images is a crucial topic. With the advancement of synthetic face generation technologies,...
    Conference paper 2023
  17. Image enhancement with bi-directional normalization and color attention-guided generative adversarial networks

    The image enhancement aims to improve the quality of images from contrast, detail, and color perspectives by adjusting the color of an image to match...

    Shan Liu, Shihao Shan, ... Song Wu in International Journal of Multimedia Information Retrieval
    Article 05 January 2024
  18. Moments of (Technological) Vision

    The Victorian appreciation of landscape has been suggestively characterised as ‘the dreamwork of imperialism’. In The Hand of Ethelberta, it is on...
    Chapter 2024
  19. Comprehensive analyses of image forgery detection methods from traditional to deep learning approaches: an evaluation

    The digital image proves critical evidence in the fields like forensic investigation, criminal investigation, intelligence systems, medical imaging,...

    Preeti Sharma, Manoj Kumar, Hitesh Sharma in Multimedia Tools and Applications
    Article 01 October 2022
  20. ELA-Conv: Forgery Detection in Digital Images Based on ELA and CNN

    Due to the rapid growth and evolution of smart devices like smartphones and cameras, a huge amount of digital data is generated in the form of...
    Ayush Verma, Priyank Pandey, Manju Khari in Recent Trends in Image Processing and Pattern Recognition
    Conference paper 2024
Did you find what you were looking for? Share feedback.