Machine learning in digital forensics: a systematic literature review
T Nayerifard, H Amintoosi, AG Bafghi… - arXiv preprint arXiv …, 2023 - arxiv.org
Development and exploitation of technology have led to the further expansion and
complexity of digital crimes. On the other hand, the growing volume of data and …
complexity of digital crimes. On the other hand, the growing volume of data and …
[HTML][HTML] Interpol questioned documents review 2019–2022
M Deviterne-Lapeyre, S Ibrahim - Forensic Science International: Synergy, 2023 - Elsevier
The goal of this paper is to provide a comprehensive review of the technical advances and
general areas of research in the field of Forensic Handwriting/Forensic Document …
general areas of research in the field of Forensic Handwriting/Forensic Document …
Distortion model-based spectral augmentation for generalized recaptured document detection
Document recapturing is a presentation attack that covers the forensic traces in the digital
domain. Document presentation attack detection (DPAD) is an important step in the …
domain. Document presentation attack detection (DPAD) is an important step in the …
Vipprint: Validating synthetic image detection and source linking methods on a large scale dataset of printed documents
The possibility of carrying out a meaningful forensic analysis on printed and scanned
images plays a major role in many applications. First of all, printed documents are often …
images plays a major role in many applications. First of all, printed documents are often …
Circumferential local ternary pattern: New and efficient feature descriptors for anti-counterfeiting pattern identification
Z Zheng, B Xu, J Ju, Z Guo, C You… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
An important aspect of querying whether a product is likely to be forged is to identify its anti-
counterfeiting label. However, the use of image processing technology for label-specific …
counterfeiting label. However, the use of image processing technology for label-specific …
A system for identifying an anti-counterfeiting pattern based on the statistical difference in key image regions
Z Zheng, H Zheng, J Ju, D Chen, X Li, Z Guo… - Expert Systems with …, 2021 - Elsevier
An important aspect of identifying whether items are likely to be forged or infringe upon a
copyright is the use of an anti-counterfeiting pattern because it can help in determining and …
copyright is the use of an anti-counterfeiting pattern because it can help in determining and …
A conformable moments-based deep learning system for forged handwriting detection
Detecting forged handwriting is important in a wide variety of machine learning applications,
and it is challenging when the input images are degraded with noise and blur. This article …
and it is challenging when the input images are degraded with noise and blur. This article …
Printer source identification by feature modeling in the total variable printer space
R Hamzehyan, F Razzazi… - Journal of Forensic …, 2021 - Wiley Online Library
Advances in the digital world have attracted the attention of many researchers in terms of
developing digital forensics. Using machine learning methods for print source identification …
developing digital forensics. Using machine learning methods for print source identification …
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer
Y Yao, C Wang, H Wang, K Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Glyph perturbation adjusts the characters' structures and strokes to make the original
characters change subtly, which cannot be detected by the naked eye. These generated …
characters change subtly, which cannot be detected by the naked eye. These generated …
Source printer identification using printer specific pooling of letter descriptors
S Joshi, YK Gupta, N Khanna - Expert Systems with Applications, 2022 - Elsevier
The digital revolution has replaced the use of printed documents with their digital
counterparts. However, many applications require the use of both due to several factors …
counterparts. However, many applications require the use of both due to several factors …