Forgery Detection in Aadhaar-based KYC using Deep Learning
Abstract
References
Index Terms
- Forgery Detection in Aadhaar-based KYC using Deep Learning
Recommendations
On parameterization of block based copy-move forgery detection techniques
RACS '15: Proceedings of the 2015 Conference on research in adaptive and convergent systemsWith high increase in cyber-crime along with continuous development in multimedia processing and editing technologies, the credibility of digital images is highly at stake in the present day. Digital images act as the major source of legal evidence in ...
Wavelet Based Region Duplication Forgery Detection
ITNG '12: Proceedings of the 2012 Ninth International Conference on Information Technology - New GenerationsWith the assistance of editing tools, digital images can be easily tampered without leaving many clues. As a result, the authenticity and integrity of digital images are no longer reliable, which is critical when the images are used as evidence in court ...
Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform
ICWET '11: Proceedings of the International Conference & Workshop on Emerging Trends in TechnologyIn this paper, a novel accurate method for detection of copy-move forgery is proposed. The proposed method compresses digital image using Discrete Wavelet Transform (DWT) up to the certain desired level based on the image size. This reduced dimensional ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/128784e7-471a-4997-9120-5e8d203ac29f/3651671.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 46Total Downloads
- Downloads (Last 12 months)46
- Downloads (Last 6 weeks)13
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format