Basim Galeb Mejbel's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (3)
Citations
... Image can tamper with different techniques such as copymove, image splicing, and retouching [5]. In the Copy-move forgery technique, a small image segment is copied and pasted at a different location in the same image [6,7]. In image splicing, a certain part is selected from an image and then pasted into another suitable image [8]. ...
... There are various ways of image tampering, but different tampering methods leave special traces in the image [2]. Digital image forensics technologies determine whether the image has been tampered with by analysing the noise characteristics and statistical characteristics inside the image [3]. According to whether image prepossessing is required, digital image forensics technology can be divided into two categories [2]: active forensics and passive forensics. ...