| 000 | 03254cam a2200457 i 4500 | ||
|---|---|---|---|
| 999 |
_c119555 _d119555 |
||
| 001 | 20783828 | ||
| 003 | BJBSDDR | ||
| 005 | 20230805181440.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 181217s2019 maua b 001 0 eng | ||
| 010 | _a 2018058334 | ||
| 020 | _a9780262537490 (pbk. : alk. paper) | ||
| 020 | _a0262537494 (pbk. : alk. paper) | ||
| 040 |
_aDLC _beng _cDLC _erda _dDLC |
||
| 041 | _aeng | ||
| 042 | _apcc | ||
| 050 | 1 | 4 |
_aTA 1654 _bF224f 2019 |
| 082 | 0 | 0 | _a006.4/2 |
| 100 | 1 |
_aFarid, Hany, _930226 _d1966- |
|
| 245 | 1 | 0 |
_aFake photos / _cHany Farid. |
| 264 | 1 |
_aCambridge, MA : _bThe MIT Press, _c2019. |
|
| 300 |
_axv, 214 pages : _billustrations ; _c18 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 490 | 0 | _aThe MIT Press essential knowledge series | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aTechniques requiring minimal technical skill Techniques requiring intermediate technical skill Techniques requiring avanced technical skill Closing remarks Background | |
| 520 | _aStalin, Mao, Hitler, Mussolini, and other dictators routinely doctored photographs so that the images aligned with their messages. They erased people who were there, added people who were not, and manipulated backgrounds. They knew if they changed the visual record, they could change history. Once, altering images required hours in the darkroom; today, it can be done with a keyboard and mouse. Because photographs are so easily faked, fake photos are everywhere—supermarket tabloids, fashion magazines, political ads, and social media. How can we tell if an image is real or false? In this volume in the MIT Press Essential Knowledge series, Hany Farid offers a concise and accessible guide to techniques for detecting doctored and fake images in photographs and digital media. Farid, an expert in photo forensics, has spent two decades developing techniques for authenticating digital images. These techniques model the entire image-creation process in order to find the digital disruption introduced by manipulation of the image. Each section of the book describes a different technique for analyzing an image, beginning with those requiring minimal technical expertise and advancing to those at intermediate and higher levels. There are techniques for, among other things, reverse image searches, metadata analysis, finding image imperfections introduced by JPEG compression, image cloning, tracing pixel patterns, and detecting images that are computer generated. In each section, Farid describes the techniques, explains when they should be applied, and offers examples of image analysis. | ||
| 650 | 0 | _aImage authentication. | |
| 650 | 0 | _aTrick photography. | |
| 650 | 0 | _aAuthentication. | |
| 650 | 4 |
_aTrucos fotográficos _931715 |
|
| 650 | 4 |
_aProcesamiento digital de imágenes _929650 |
|
| 650 | 4 |
_aSeguridad en computadores _95589 |
|
| 830 | 4 |
_98927 _aThe MIT Press essential knowledge series |
|
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK |
||