Local Pixel Manipulation Detection with Deep Neural Networks
暂无分享,去创建一个
[1] Marvin Minsky,et al. Perceptrons: An Introduction to Computational Geometry , 1969 .
[2] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[3] Geoffrey E. Hinton,et al. Learning internal representations by error propagation , 1986 .
[4] Andreas Zell,et al. Simulation neuronaler Netze , 1994 .
[5] John J. Hopfield,et al. Neural networks and physical systems with emergent collective computational abilities , 1999 .
[6] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[7] Arnold W. M. Smeulders,et al. Color Invariance , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[9] Gustavo E. A. P. A. Batista,et al. A study of the behavior of several methods for balancing machine learning training data , 2004, SKDD.
[10] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[11] Hui Han,et al. Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.
[12] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[13] Shih-Fu Chang,et al. Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[14] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[15] Yoshua. Bengio,et al. Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..
[16] Y. Yao,et al. On Early Stopping in Gradient Descent Learning , 2007 .
[17] Luo Wei,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .
[18] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[19] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[20] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[21] Xinpeng Zhang,et al. Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery , 2010, IEEE Transactions on Information Forensics and Security.
[22] Sven Behnke,et al. Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.
[23] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[24] Hagit Hel-Or,et al. Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.
[25] Nenghai Yu,et al. Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.
[26] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[27] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[28] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[29] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[30] Kevin P. Murphy,et al. Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.
[31] James F. O'Brien,et al. Exposing photo manipulation with inconsistent reflections , 2012, TOGS.
[32] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[33] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[34] Qiang Chen,et al. Network In Network , 2013, ICLR.
[35] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[36] Luisa Verdoliva,et al. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.
[37] Z. Jane Wang,et al. Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.
[38] Thomas Brox,et al. Striving for Simplicity: The All Convolutional Net , 2014, ICLR.
[39] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[40] Subhransu Maji,et al. Bilinear CNN Models for Fine-Grained Visual Recognition , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[41] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[42] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[43] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[44] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[45] Xiangyang Wang,et al. Quaternion polar complex exponential transform for invariant color image description , 2015, Appl. Math. Comput..
[46] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[47] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[48] Davide Cozzolino,et al. Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[49] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[50] T. Qiao. Statistical detection for digital image forensics , 2016 .
[51] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[52] Stefan Winkler,et al. COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[53] Jiantao Zhou,et al. Image copy-move forgery detection using hierarchical feature point matching , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).
[54] Jiwu Huang,et al. Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.
[55] B. S. Manjunath,et al. Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[56] Jessica J. Fridrich,et al. Image Manipulation Detection Using Sensor Linear Pattern , 2018, Media Watermarking, Security, and Forensics.
[57] Andrew Owens,et al. Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.
[58] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[59] Jingsha He,et al. A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[60] Panpan Niu,et al. A new keypoint-based copy-move forgery detection for color image , 2018, Applied Intelligence.