Suggested Topics within your search.
Suggested Topics within your search.
- Child welfare 1
- Computer crimes 1
- Custody of children 1
- Digital forensic science 1
- Family assessment 1
- Family psychotherapy 1
- Forensic Psychiatry 1
- Forensic child psychology 1
- Forensic psychiatric nursing 1
- Investigation 1
- Journalistic ethics 1
- Language 1
- Law 1
- Moral and ethical aspects 1
- Photojournalism 1
- Psychiatric Nursing 1
- Psychiatric nursing 1
-
921
SLM-DFS: A systematic literature map of deepfake spread on social media
Published 2025-01-01“…The findings of this literature map suggest that DF detection is a multidisciplinary field that requires collaboration between experts in computer vision, machine learning, cybersecurity, and media forensics to address its current and future challenges…”
Get full text
Article -
922
Revealing Traces of Image Resampling and Resampling Antiforensics
Published 2017-01-01“…Image resampling is a common manipulation in image processing. The forensics of resampling plays an important role in image tampering detection, steganography, and steganalysis. …”
Get full text
Article -
923
Implementation of lightweight intrusion detection model for security of smart green house and vertical farm
Published 2018-04-01“…Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. …”
Get full text
Article -
924
-
925
Unknown presentation attack detection against rational attackers
Published 2021-09-01“…Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. …”
Get full text
Article -
926
Leveraging deep feature learning for handwriting biometric authentication
Published 2024-03-01“…The authentication of writers through handwritten text stands as a biometric technique with considerable practical importance in the field of document forensics and literary history. The verification process involves a meticulous examination of the questioned handwriting in comparison to the genuine handwriting of a known writer, aiming to determine whether a shared authorship exists. …”
Get full text
Article -
927
Comparative Analysis of the Full-Length Genome Sequence of a Clinical Isolate of Human Parainfluenza Virus 4B
Published 2012-01-01“…To gain better insights on hPIV-4B, and to test methods that we are developing for viral forensics, the entire genomic sequence of our virus was determined from archived RNA. …”
Get full text
Article -
928
Entraves ao governo aberto na Justiça Federal brasileira
Published 2020-04-01“…As dificuldades no acesso aos dados processuais, à aplicação da Lei de Acesso à Informação, bem como a lenta e desordenada informatização demonstram que ainda há uma distância considerável entre a realidade forense e os avanços legislativos.…”
Get full text
Article -
929
A 5-transcript signature for discriminating viral and bacterial etiology in pediatric pneumonia
Published 2025-02-01Get full text
Article -
930
Starting with the Digital Doesn’t Make it Easier
Published 2025-01-01“…Unrealistic expectations of collection processing, retention, growth, and publication onto openly accessible platforms can quickly overwhelm a libraries’ digital collections’ team due to size, need for digital forensics work, copyright limitations, or other capacity-related issues. …”
Get full text
Article -
931
Trajectory of human migration: insights from autosomal and non-autosomal variant clustering patterns
Published 2025-03-01“…These genetic variations have long been used as ancestry informative markers (AIMs) in forensics and evolutionary studies, primarily because of their uniparental inheritance and lack of recombination, despite the fact that gender-specific gene flow and socio-cultural practices may cause discrepancies. …”
Get full text
Article -
932
Audio classification using grasshopper‐ride optimization algorithm‐based support vector machine
Published 2021-08-01“…Abstract The accurate and robust detection of the audio has been widely grown as the speech technology in the area of audio forensics, speech recognition, and so on. However, in real time, it is a challenge to deal with the massive data arriving from distributed sources. …”
Get full text
Article -
933
Face super-resolution via iterative collaboration between multi-attention mechanism and landmark estimation
Published 2024-12-01“…Abstract Face super-resolution technology can significantly enhance the resolution and quality of face images, which is crucial for applications such as surveillance, forensics, and face recognition. However, existing methods often fail to fully utilize multi-scale information and facial priors, resulting in poor recovery of facial structures in complex images. …”
Get full text
Article -
934
Pectus excavatum em uma ninhada de Buldogue Francês: relato de caso
Published 2021-01-01“…No presente caso, o corpo de um cachorro Buldogue Francês nasceu com sinais prévios de decaimento e baixo consumo de leito materno, além de uma avaliação médica forense. De acordo com a avaliação patológica, foi encontrada uma fenda no peito esternal relacionada às esternas caudais próximas à cartilagem xifóide, conteúdo espumoso na cartilagem epiglótica da laringe e sinais graves de enfisema nos lobos caudal, craniano e médio pulmonar. …”
Get full text
Article -
935
Plant diversity and transcriptional variability assessed by retrotransposon-based molecular markers
Published 2017-03-01“…Molecular markers have become crucial part of genetics due to their use in various branches of it, such as positional cloning, which includes identification of genes responsible for desired traits and management of backcrossing programs, as well as in modern plant breeding, and human forensics. Retrotransposons are a major component of all eukaryotic genomes, which makes them suited as molecular markers. …”
Get full text
Article -
936
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01“…In the era of deepfakes and AI-generated content, digital image manipulation poses significant challenges to image authenticity, creating doubts about the credibility of images. Traditional image forensics techniques often struggle to detect sophisticated tampering, and passive detection approaches are reactive, verifying authenticity only after counterfeiting occurs. …”
Get full text
Article -
937
Noise-attention-based forgery face detection method
Published 2023-08-01“…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
Get full text
Article -
938
Protocolo de osteotecnia aplicado a manos humanas
Published 2023-01-01“…Este trabajo se realizó en el laboratorio de anatomía del Departamento de Morfología de la Universidad del Valle en Cali - Colombia; se utilizaron cuatro manos humanas entregadas en custodia por el Instituto Nacional de medicina legal y ciencias forenses. El protocolo se desarrolló en dos fases; fase I, manejo de tejidos blandos y fase II, manejo de tejido óseo. …”
Get full text
Article -
939
-
940
A Multi-Granularity Features Representation and Dimensionality Reduction Network for Website Fingerprinting
Published 2025-01-01“…Website fingerprinting (WF) refers to the identification of target websites accessed by users in anonymous communication scenarios, playing a critical role in cybercrime investigation and forensics. In recent years, deep learning-based WF has become a research focus in this field. …”
Get full text
Article