A comprehensive survey on methods for image integrity
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …
video, audio, and text), along with their manipulation/generation also by artificial intelligence …
The Use of Terrestrial and Maritime Autonomous Vehicles in Nonintrusive Object Inspection
D Mamchur, J Peksa, A Kolodinskis, M Zigunovs - Sensors, 2022 - mdpi.com
Traditional nonintrusive object inspection methods are complex or extremely expensive to
apply in certain cases, such as inspection of enormous objects, underwater or maritime …
apply in certain cases, such as inspection of enormous objects, underwater or maritime …
Eyedrive: A deep learning model for continuous driver authentication
Eye movement (EM) is considerably a new behavioral modality for biometric authentication.
In this work, we use this modality in the context of continuous driver authentication. Existing …
In this work, we use this modality in the context of continuous driver authentication. Existing …
Beyond prnu: Learning robust device-specific fingerprint for source camera identification
Source-camera identification tools assist image forensics investigators to associate an
image with a camera. The Photo Response Non-Uniformity (PRNU) noise pattern caused by …
image with a camera. The Photo Response Non-Uniformity (PRNU) noise pattern caused by …
[PDF][PDF] M2FRED Analysis Using MobileNet and Siamese Neural Network
R Annisa, B Soewito - Journal of Advances in Information …, 2023 - researchgate.net
Mobile face recognition has become increasingly important, especially during the COVID-19
pandemic when the use of masks has become ubiquitous. The area that can be analyzed for …
pandemic when the use of masks has become ubiquitous. The area that can be analyzed for …
Eye Biometrics Signal Analysis and Potential Applications in User Authentication and Affective Computing
B Taha - 2023 - search.proquest.com
As the adoption of biometric technologies grows, there is an escalating worry regarding the
potential for bypassing, disguising, or replicating biometric data. Established biometric …
potential for bypassing, disguising, or replicating biometric data. Established biometric …
FaceNet-cGAN: A Deep Learning-based Approach for Masked Face Recognition
M Alkhaleefah, TH Tan, MK Yeh… - … -Taiwan (ICCE-Taiwan), 2023 - ieeexplore.ieee.org
Masked faces can pose a challenge for security systems, making it easier for individuals to
disguise themselves and evade identification. To address this issue, developing a system …
disguise themselves and evade identification. To address this issue, developing a system …
[PDF][PDF] Déploiement mobile d'un réseau de neurones profond pour l'identification des étudiants de l'UAC/ISDA en salle d'examens
L'objectif global de cette recherche a été de mettre en place un système de reconnaissance
et d'identification des étudiants de Université de l'Assomption/Institut Supérieur de …
et d'identification des étudiants de Université de l'Assomption/Institut Supérieur de …