000 03254cam a2200457 i 4500
999 _c119555
_d119555
001 20783828
003 BJBSDDR
005 20230805181440.0
006 a|||||r|||| 00| 0
007 ta
008 181217s2019 maua b 001 0 eng
010 _a 2018058334
020 _a9780262537490 (pbk. : alk. paper)
020 _a0262537494 (pbk. : alk. paper)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
041 _aeng
042 _apcc
050 1 4 _aTA 1654
_bF224f 2019
082 0 0 _a006.4/2
100 1 _aFarid, Hany,
_930226
_d1966-
245 1 0 _aFake photos /
_cHany Farid.
264 1 _aCambridge, MA :
_bThe MIT Press,
_c2019.
300 _axv, 214 pages :
_billustrations ;
_c18 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 0 _aThe MIT Press essential knowledge series
504 _aIncludes bibliographical references and index.
505 0 _aTechniques requiring minimal technical skill Techniques requiring intermediate technical skill Techniques requiring avanced technical skill Closing remarks Background
520 _aStalin, Mao, Hitler, Mussolini, and other dictators routinely doctored photographs so that the images aligned with their messages. They erased people who were there, added people who were not, and manipulated backgrounds. They knew if they changed the visual record, they could change history. Once, altering images required hours in the darkroom; today, it can be done with a keyboard and mouse. Because photographs are so easily faked, fake photos are everywhere—supermarket tabloids, fashion magazines, political ads, and social media. How can we tell if an image is real or false? In this volume in the MIT Press Essential Knowledge series, Hany Farid offers a concise and accessible guide to techniques for detecting doctored and fake images in photographs and digital media. Farid, an expert in photo forensics, has spent two decades developing techniques for authenticating digital images. These techniques model the entire image-creation process in order to find the digital disruption introduced by manipulation of the image. Each section of the book describes a different technique for analyzing an image, beginning with those requiring minimal technical expertise and advancing to those at intermediate and higher levels. There are techniques for, among other things, reverse image searches, metadata analysis, finding image imperfections introduced by JPEG compression, image cloning, tracing pixel patterns, and detecting images that are computer generated. In each section, Farid describes the techniques, explains when they should be applied, and offers examples of image analysis.
650 0 _aImage authentication.
650 0 _aTrick photography.
650 0 _aAuthentication.
650 4 _aTrucos fotográficos
_931715
650 4 _aProcesamiento digital de imágenes
_929650
650 4 _aSeguridad en computadores
_95589
830 4 _98927
_aThe MIT Press essential knowledge series
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBK