Digital Image Forensics (Record no. 75530)

000 -LEADER
fixed length control field 04067nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-981-10-7644-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801213729.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190513s2020 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789811076442
-- 978-981-10-7644-2
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Roy, Aniket.
245 10 - TITLE STATEMENT
Title Digital Image Forensics
Sub Title Theory and Implementation /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVI, 89 p. 45 illus., 32 illus. in color.
490 1# - SERIES STATEMENT
Series statement Studies in Computational Intelligence,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Chapter 1: Introduction -- Chapter 2: Source Camera Identification Using Statistical Features -- Chapter 3: Copy Move Forgery Detection in Digital Images – A Survey and Analysis -- Chapter 4: Copy–Move Forgery Detection exploiting Statistical Image Features -- Chapter 5: Blur-invariant Copy-move Forgery Detection utilizing SWT-SVD -- Chapter 6: Copy–Move Forgery Detection with Similar but Genuine Objects using Texture Features -- Chapter 7: Conclusions and Future Work.
520 ## - SUMMARY, ETC.
Summary, etc This book discusses blind investigation and recovery of digital evidence left behind on digital devices, primarily for the purpose of tracing cybercrime sources and criminals. It presents an overview of the challenges of digital image forensics, with a specific focus on two of the most common forensic problems. The first part of the book addresses image source investigation, which involves mapping an image back to its camera source to facilitate investigating and tracing the source of a crime. The second part of the book focuses on image-forgery detection, primarily focusing on “copy-move forgery” in digital images, and presenting effective solutions to copy-move forgery detection with an emphasis on additional related challenges such as blur-invariance, similar genuine object identification, etc. The book concludes with future research directions, including counter forensics. With the necessary mathematical information in every chapter, the book serves as a useful reference resource for researchers and professionals alike. In addition, it can also be used as a supplementary text for upper-undergraduate and graduate-level courses on “Digital Image Processing”, “Information Security”, “Machine Learning”, “Computer Vision” and “Multimedia Security and Forensics”.
700 1# - AUTHOR 2
Author 2 Dixit, Rahul.
700 1# - AUTHOR 2
Author 2 Naskar, Ruchira.
700 1# - AUTHOR 2
Author 2 Chakraborty, Rajat Subhra.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-10-7644-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2020.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal processing.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer vision.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer crimes.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal, Speech and Image Processing .
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Vision.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cybercrime.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1860-9503 ;
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.