<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="style/detail_T.xsl"?>
<bibitem type="J">   <ARLID>0343316</ARLID> <utime>20240103193533.1</utime><mtime>20100607235959.9</mtime>   <WOS>000278065000002</WOS> <SCOPUS>77952812041</SCOPUS>  <DOI>10.1109/MAES.2010.5467652</DOI>           <title language="eng" primary="1">Blind Methods for Detecting Image Fakery</title>  <specification> <page_count>7 s.</page_count> </specification>   <serial><ARLID>cav_un_epca*0253189</ARLID><ISSN>0885-8985</ISSN><title>IEEE Aerospace and Electronic Systems Magazine</title><part_num/><part_title/><volume_id>25</volume_id><volume>4 (2010)</volume><page_num>18-24</page_num></serial>    <keyword>Image forensics</keyword>   <keyword>Image Fakery</keyword>   <keyword>Forgery detection</keyword>   <keyword>Authentication</keyword>    <author primary="1"> <ARLID>cav_un_auth*0206076</ARLID> <name1>Mahdian</name1> <name2>Babak</name2> <full_dept language="cz">Zpracování obrazové informace</full_dept> <full_dept language="eng">Department of Image Processing</full_dept> <department language="cz">ZOI</department> <department language="eng">ZOI</department> <institution>UTIA-B</institution> <full_dept>Department of Image Processing</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author> <author primary="0"> <ARLID>cav_un_auth*0101189</ARLID> <name1>Saic</name1> <name2>Stanislav</name2> <full_dept language="cz">Zpracování obrazové informace</full_dept> <full_dept>Department of Image Processing</full_dept> <department language="cz">ZOI</department> <department>ZOI</department> <institution>UTIA-B</institution> <full_dept>Department of Image Processing</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author>   <source> <url>http://library.utia.cas.cz/separaty/2010/ZOI/saic-0343316.pdf</url> </source>        <cas_special> <project> <project_id>GA102/08/0470</project_id> <agency>GA ČR</agency> <ARLID>cav_un_auth*0239565</ARLID> </project> <research> <research_id>CEZ:AV0Z10750506</research_id> </research>  <abstract language="eng" primary="1">In today’s digital age, it is possible to effortlessly create image forgeries without leaving any obvious traces of tampering. In this paper we bring a brief review of existing blind methods for detecting image fakery.  Blind methods are regarded as a new direction and work without using any prior information about the image  being investigated or its source.</abstract>     <reportyear>2011</reportyear>  <RIV>BD</RIV>     <unknown tag="mrcbC52"> 4 A 4a 20231122134036.5 </unknown>  <permalink>http://hdl.handle.net/11104/0185822</permalink>          <unknown tag="mrcbT16-e">ENGINEERINGAEROSPACE|ENGINEERINGELECTRICALELECTRONIC</unknown> <unknown tag="mrcbT16-f">0.446</unknown> <unknown tag="mrcbT16-g">0.014</unknown> <unknown tag="mrcbT16-h">6.3</unknown> <unknown tag="mrcbT16-i">0.00156</unknown> <unknown tag="mrcbT16-j">0.219</unknown> <unknown tag="mrcbT16-k">361</unknown> <unknown tag="mrcbT16-l">70</unknown> <unknown tag="mrcbT16-q">32</unknown> <unknown tag="mrcbT16-s">0.265</unknown> <unknown tag="mrcbT16-y">9.87</unknown> <unknown tag="mrcbT16-x">0.63</unknown> <unknown tag="mrcbT16-4">Q2</unknown> <unknown tag="mrcbT16-B">18.303</unknown> <unknown tag="mrcbT16-C">9.793</unknown> <unknown tag="mrcbT16-D">Q4</unknown> <unknown tag="mrcbT16-E">Q2</unknown> <arlyear>2010</arlyear>    <unknown tag="mrcbTft">  Soubory v repozitáři: saic-0343316.pdf </unknown>    <unknown tag="mrcbU14"> 77952812041 SCOPUS </unknown> <unknown tag="mrcbU34"> 000278065000002 WOS </unknown> <unknown tag="mrcbU63"> cav_un_epca*0253189 IEEE Aerospace and Electronic Systems Magazine 0885-8985 1557-959X Roč. 25 č. 4 2010 18 24 </unknown> </cas_special> </bibitem>