SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Markos Zampoglou
Postdoctoral Research Associate, CERTH
Workshop on Content Verification Tools
June 6, 2018 @ Thessaloniki, Greece
DETECTING MALICIOUS TAMPERING
IN DIGITAL IMAGES
Image forgeries in the news
https://thelede.blogs.nytimes.com/2008/07/10/in-an-iranian-image-a-missile-
too-many/
Image forensics
Lens
Optical
filter
CFA pattern
Real-world
scene
R
G
G
B
Imaging
sensor
(e.g. CCD)
CFA
interpolat.
In-camera
SW
processing
In-camera
JPEG
compress.
DIGITAL CAMERA
Digital image
Tampered
digital image
Out of camera SW
processing
Piva, A. (2013). An overview on image forensics. ISRN Signal Processing, 2013.
Example: JPEG Ghosts
Farid, H. (2009). Exposing digital forgeries from JPEG ghosts. IEEE transactions on information forensics
and security, 4(1), 154-160.
• JPEG compression
• DCT coefficient quantization
• Tampered areas: different
quantization coefficients
• Recompression &
subtraction highlights
differences
• JPEG Ghosts
Tampering localization algorithms
Tampering
localization
Splicing
localization
Copy-move
detection
Block
matching
Keypoint
matching
High-frequency
noise
CFA
patterns
JPEG compression
traces
Filtering and
analysis
Camera-
specific (PRNU)
Quantization
artefacts
Compression grid
misalignment
JPEG ghosts,
ELA
Web image forensics
REVEAL Media Verification Assistant
Features
• Tampering localization maps
• “Magnifying glass”
• GPS localization
• Thumbnails
• Metadata
• Tutorials and examples
• Export PDF
Using the tools
1. Magnifying glass
2. Tampering localization
• Do more than one maps agree?
• Does the highlighted region correspond to a specific
object/part?
• Is this part suspicious/interesting?
3. Reverse search
• Is this the best version for analysis?
Forensic analysis outputs
The pitfalls of image forensics
“MH17 – Forensic Analysis of Satellite Images
Released by the Russian Ministry of Defence”
• A report by Bellingcat1 using ELA to prove that the
Russian MoD had forged the images
• N. Krawetz: Bellingcat “misinterpreted the results”2
1https://www.bellingcat.com
2http://www.hackerfactor.com/blog/index.php?/archives/676-Continuing-Education.html
The future of image forensics
https://www.technologyreview.com/s/610784/this-algorithm-
automatically-spots-face-swaps-in-videos/
Acknowledgements
• Dr. Chryssanthi Iakovidou (CAGI algorithm)
• Olga Papadopoulou (back-end development)
• Lazaros Apostolidis (front-end development)
• Dr. Symeon Papadopoulos (Overview & design)
• Ruben Bouwmeester, DW (Design and evaluation)
• Yiannis Kompatsiaris (Overview)
Thank you!
http://reveal-mklab.iti.gr/reveal
Get in touch!
Markos Zampoglou markzampoglou@iti.gr
Symeon Papadopoulos papadop@iti.gr
Olga Papadopoulou olgapapa@iti.gr

Weitere ähnliche Inhalte

Ähnlich wie Presentation of the InVID technologies for image forensics analysis

A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionSymeon Papadopoulos
 
IRJET- Video Forgery Detection using Machine Learning
IRJET-  	  Video Forgery Detection using Machine LearningIRJET-  	  Video Forgery Detection using Machine Learning
IRJET- Video Forgery Detection using Machine LearningIRJET Journal
 
Elucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentElucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentVIT-AP University
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryIRJET Journal
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...IRJET Journal
 
20110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture0120110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture01Computer Science Club
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
SasuriE ajal
SasuriE ajalSasuriE ajal
SasuriE ajalAJAL A J
 
4. ijece edit sat
4. ijece edit sat4. ijece edit sat
4. ijece edit satIAESIJEECS
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image EncryptionIRJET Journal
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationOpenDNS
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMIDES Editor
 
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptxMODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptxvcrajan1
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET Journal
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro..."High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...Edge AI and Vision Alliance
 

Ähnlich wie Presentation of the InVID technologies for image forensics analysis (20)

Stegnography projects
Stegnography projectsStegnography projects
Stegnography projects
 
A Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering DetectionA Web-based Service for Image Tampering Detection
A Web-based Service for Image Tampering Detection
 
IRJET- Video Forgery Detection using Machine Learning
IRJET-  	  Video Forgery Detection using Machine LearningIRJET-  	  Video Forgery Detection using Machine Learning
IRJET- Video Forgery Detection using Machine Learning
 
Elucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentElucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragment
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
20110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture0120110220 computer vision_eruhimov_lecture01
20110220 computer vision_eruhimov_lecture01
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
SasuriE ajal
SasuriE ajalSasuriE ajal
SasuriE ajal
 
4. ijece edit sat
4. ijece edit sat4. ijece edit sat
4. ijece edit sat
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
Baythreat Cryptolocker Presentation
Baythreat Cryptolocker PresentationBaythreat Cryptolocker Presentation
Baythreat Cryptolocker Presentation
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVM
 
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptxMODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
MODIFIED-HYBIRD DESIGN (COMBINATION VERILOG HDL WITH MATLAB.pptx
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics
 
LCI - MICC Seminario-Forensics
LCI - MICC Seminario-ForensicsLCI - MICC Seminario-Forensics
LCI - MICC Seminario-Forensics
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro..."High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
"High-resolution 3D Reconstruction on a Mobile Processor," a Presentation fro...
 

Mehr von InVID Project

InVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID Project
 
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...InVID Project
 
Presentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesPresentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesInVID Project
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018InVID Project
 
IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018InVID Project
 
A state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionA state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionInVID Project
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationInVID Project
 
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...InVID Project
 
Presentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginPresentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginInVID Project
 
Overview of the InVID project
Overview of the InVID projectOverview of the InVID project
Overview of the InVID projectInVID Project
 
Second issue of the InVID newsletter
Second issue of the InVID newsletterSecond issue of the InVID newsletter
Second issue of the InVID newsletterInVID Project
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserInVID Project
 
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
Video Retrieval for Multimedia Verification  of Breaking News on Social NetworksVideo Retrieval for Multimedia Verification  of Breaking News on Social Networks
Video Retrieval for Multimedia Verification of Breaking News on Social NetworksInVID Project
 
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoThe InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoInVID Project
 
The InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabThe InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabInVID Project
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...InVID Project
 
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITITRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITIInVID Project
 
InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID Project
 
ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016InVID Project
 
InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID Project
 

Mehr von InVID Project (20)

InVID at IFCN Global Fact V
InVID at IFCN Global Fact VInVID at IFCN Global Fact V
InVID at IFCN Global Fact V
 
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...Presentation of the InVID tool for video fragmentation and keyframe-based rev...
Presentation of the InVID tool for video fragmentation and keyframe-based rev...
 
Presentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologiesPresentation of the InVID project and verification technologies
Presentation of the InVID project and verification technologies
 
Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018Presentation of the InVID verification technologies at IPTC 2018
Presentation of the InVID verification technologies at IPTC 2018
 
IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018IUT-Toulouse-InVID-2018
IUT-Toulouse-InVID-2018
 
A state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detectionA state of the art in journalism about fake image and video detection
A state of the art in journalism about fake image and video detection
 
Presentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verificationPresentation of the InVID tool for social media verification
Presentation of the InVID tool for social media verification
 
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...Presentation of the InVID tool for video fragmentation and reverse keyframe s...
Presentation of the InVID tool for video fragmentation and reverse keyframe s...
 
Presentation of the InVID Verification Plugin
Presentation of the InVID Verification PluginPresentation of the InVID Verification Plugin
Presentation of the InVID Verification Plugin
 
Overview of the InVID project
Overview of the InVID projectOverview of the InVID project
Overview of the InVID project
 
Second issue of the InVID newsletter
Second issue of the InVID newsletterSecond issue of the InVID newsletter
Second issue of the InVID newsletter
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the Browser
 
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
Video Retrieval for Multimedia Verification  of Breaking News on Social NetworksVideo Retrieval for Multimedia Verification  of Breaking News on Social Networks
Video Retrieval for Multimedia Verification of Breaking News on Social Networks
 
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpoThe InVID Vefirication Plugin at #IFRAExpo #DCXExpo
The InVID Vefirication Plugin at #IFRAExpo #DCXExpo
 
The InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLabThe InVID Vefirication Plugin at DisinfoLab
The InVID Vefirication Plugin at DisinfoLab
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
 
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITITRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
TRECVID 2016 Ad-hoc Video Seach task, CERTH-ITI
 
InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016InVID at the IPTC Autumn Meeting 2016
InVID at the IPTC Autumn Meeting 2016
 
ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016ELLA LC algorithm presentation in ICIP 2016
ELLA LC algorithm presentation in ICIP 2016
 
InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16InVID verification application presentation at SMVW16
InVID verification application presentation at SMVW16
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Presentation of the InVID technologies for image forensics analysis