95 research outputs found

    A review on medicinal properties of saffron toward major diseases

    Get PDF
    The stigma of Crocus sativus, known as saffron, is one of the most expensive spices in the world. The bioactive components in saffron, picrocrocin, crocin, and safranal, have demonstrated a wide range of uses and capabilities in the medical field. This review is focused on the potential therapeutic applications of saffron on diabetes mellitus (DM), antitumor, anticancer, anti-depressant, Alzheimer’s disease (AD), cardiovascular disease (CVD), erectile dysfunction and antibacterial effects

    Blind Detection of Copy-Move Forgery in Digital Audio Forensics

    Get PDF
    Although copy-move forgery is one of the most common fabrication techniques, blind detection of such tampering in digital audio is mostly unexplored. Unlike active techniques, blind forgery detection is challenging, because it does not embed a watermark or signature in an audio that is unknown in most of the real-life scenarios. Therefore, forgery localization becomes more challenging, especially when using blind methods. In this paper, we propose a novel method for blind detection and localization of copy-move forgery. One of the most crucial steps in the proposed method is a voice activity detection (VAD) module for investigating audio recordings to detect and localize the forgery. The VAD module is equally vital for the development of the copy-move forgery database, wherein audio samples are generated by using the recordings of various types of microphones. We employ a chaotic theory to copy and move the text in generated forged recordings to ensure forgery localization at any place in a recording. The VAD module is responsible for the extraction of words in a forged audio, and these words are analyzed by applying a 1-D local binary pattern operator. This operator provides the patterns of extracted words in the form of histograms. The forged parts (copy and move text) have similar histograms. An accuracy of 96.59% is achieved, and the proposed method is deemed robust against noise

    Robust Identity Perceptual Watermark Against Deepfake Face Swapping

    Full text link
    Notwithstanding offering convenience and entertainment to society, Deepfake face swapping has caused critical privacy issues with the rapid development of deep generative models. Due to imperceptible artifacts in high-quality synthetic images, passive detection models against face swapping in recent years usually suffer performance damping regarding the generalizability issue. Therefore, several studies have been attempted to proactively protect the original images against malicious manipulations by inserting invisible signals in advance. However, the existing proactive defense approaches demonstrate unsatisfactory results with respect to visual quality, detection accuracy, and source tracing ability. In this study, we propose the first robust identity perceptual watermarking framework that concurrently performs detection and source tracing against Deepfake face swapping proactively. We assign identity semantics regarding the image contents to the watermarks and devise an unpredictable and unreversible chaotic encryption system to ensure watermark confidentiality. The watermarks are encoded and recovered by jointly training an encoder-decoder framework along with adversarial image manipulations. Extensive experiments demonstrate state-of-the-art performance against Deepfake face swapping under both cross-dataset and cross-manipulation settings.Comment: Submitted for revie

    Forgery detection using chaotic watermarking in image key areas

    Get PDF
    U radu proučavamo algoritam za nanošenje vodenog žiga na komprimiranim slikama u primjeni protiv falsifikata na novčanicama. Najprije se proučava osnovni algoritam za nanošenje vodenog žiga na osnovu informacije o rubu slike. Šifrirani vodeni žig se pretvara u binarne vrijednosti i ugrađuje u rubove, a u međuvremenu se originalni oblik ruba štiti od vidljivog uništenja. Zatim se uz pomoć flip-invariantnih SIFT karakteristika lokalizira ključno područje sadržaja poput brojki i slova na slici. Treće, primjenjuju se Tent mapa i hash funkcija u daljnjoj zaštiti tajnog vodenog žiga. Svojstvo Tent mape osiguralo je osjetljivost na promjene u početnoj vrijednosti. Stoga možemo bolje zaštititi i prikriti originalni vodeni žig. Izvršenje operacija na binarno kodiranoj slici zasniva se na kodiranim nizovima dobivenim iz kaotične mape. Odabrane su razne operacije kako bi se generirao robustni prikriveni vodeni žig. Konačno smo verificirali naš algoritam u otkrivanju falsifikata. Istraživala se i osjetljivost prema tajnim ključnim vrijednostima. Predloženi je sustav osjetljiv na ključne vrijednosti pa učinkovito štiti vodeni žig od napada. Trošak izračuna se također mjerio u praktičnoj primjeni kaotičkog vodenog žiga. Eksperimentalni rezultati pokazuju da je predložena metoda pouzdano učinkovita.In this paper we study watermarking algorithm for compressed images in the application of antiforgery in financial bills. First, the basic watermarking algorithm based on image edge information is studied. The encrypted watermark is converted into binary values and embedded into the edges, meanwhile the original edge shape is preserved from noticeable destruction. Second, the flip-invariant SIFT features are used to localize the key content area like digits and letters in the image. Third, Tent map and a hash function is used to further protect the secrete watermark. The property of Tent map ensured the sensitivity towards changes in the initial value. Therefore we can better protect and encrypt the original watermark. The operations performing on the binary coded image are based on the encryption sequences generated from chaotic map. Different operations are chosen to generate robust encrypted watermark. Finally, we verify our algorithm in antiforgery detection. The sensitivity towards secrete key values is further investigated. The proposed system is sensitive to the key values, hence it effectively protects the watermark from attack. The computational cost is also measured for practical application of the chaotic watermarking. Experimental results show that the proposed method is reliably efficient
    corecore