Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution
暂无分享,去创建一个
Xianfeng Zhao | Yaqi Liu | Xiaobin Zhu | Yun Cao | Xiaobin Zhu | Xianfeng Zhao | Yun Cao | Yaqi Liu
[1] Thomas Brox,et al. FlowNet: Learning Optical Flow with Convolutional Networks , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[2] Yi Yang,et al. Attention to Scale: Scale-Aware Semantic Image Segmentation , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Xiaoyu Zhang,et al. ListNet-based object proposals ranking , 2017, Neurocomputing.
[4] Davide Cozzolino,et al. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.
[5] Jean Ponce,et al. Proposal Flow , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Xiaogang Wang,et al. Pyramid Scene Parsing Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[7] Roberto Cipolla,et al. SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Vibhav Vineet,et al. Conditional Random Fields as Recurrent Neural Networks , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[9] Ming-Hsuan Yang,et al. Semi-Supervised Learning for Optical Flow with Generative Adversarial Networks , 2017, NIPS.
[10] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[11] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[12] Davide Cozzolino,et al. A Reliable Order-Statistics-Based Approximate Nearest Neighbor Search Algorithm , 2015, IEEE Transactions on Image Processing.
[13] Raymond Y. K. Lau,et al. Least Squares Generative Adversarial Networks , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[14] Camille Couprie,et al. Semantic Segmentation using Adversarial Networks , 2016, NIPS 2016.
[15] Vladlen Koltun,et al. Efficient Inference in Fully Connected CRFs with Gaussian Edge Potentials , 2011, NIPS.
[16] Concetto Spampinato,et al. Semi Supervised Semantic Segmentation Using Generative Adversarial Network , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[17] Davide Cozzolino,et al. Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.
[18] Ming-Hsuan Yang,et al. Adversarial Learning for Semi-supervised Semantic Segmentation , 2018, BMVC.
[19] Xianfeng Zhao,et al. Copy-move forgery detection based on convolutional kernel network , 2017, Multimedia Tools and Applications.
[20] Yann LeCun,et al. Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[21] Iasonas Kokkinos,et al. Semantic Image Segmentation with Deep Convolutional Nets and Fully Connected CRFs , 2014, ICLR.
[22] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[23] Tomasz Malisiewicz,et al. Deep Image Homography Estimation , 2016, ArXiv.
[24] Han Zhang,et al. Self-Attention Generative Adversarial Networks , 2018, ICML.
[25] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[26] Ce Liu,et al. Deformable Spatial Pyramid Matching for Fast Dense Correspondences , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[27] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[28] Alex ChiChung Kot,et al. Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.
[29] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[30] Patrick J. Flynn,et al. Image Provenance Analysis at Scale , 2018, IEEE Transactions on Image Processing.
[31] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[32] Léon Bottou,et al. Wasserstein GAN , 2017, ArXiv.
[33] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[34] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[35] Josef Sivic,et al. Convolutional Neural Network Architecture for Geometric Matching , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[36] Andrew L. Maas. Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .
[37] Mauro Barni,et al. Multiple Parenting Phylogeny Relationships in Digital Images , 2016, IEEE Transactions on Information Forensics and Security.
[38] Xiaochun Cao,et al. Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut , 2010, IEEE Transactions on Information Forensics and Security.
[39] Iasonas Kokkinos,et al. DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[40] Jing Dong,et al. Optimized 3D Lighting Environment Estimation for Image Forgery Detection , 2017, IEEE Transactions on Information Forensics and Security.
[41] Guosheng Lin,et al. Efficient Piecewise Training of Deep Structured Models for Semantic Segmentation , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[42] Xianfeng Zhao,et al. Image Forgery Localization based on Multi-Scale Convolutional Neural Networks , 2018, IH&MMSec.
[43] Davide Cozzolino,et al. Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[44] Luisa Verdoliva,et al. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.
[45] George Papandreou,et al. Rethinking Atrous Convolution for Semantic Image Segmentation , 2017, ArXiv.
[46] Jiwu Huang,et al. Image Forgery Localization via Integrating Tampering Possibility Maps , 2017, IEEE Transactions on Information Forensics and Security.
[47] Yuichi Yoshida,et al. Spectral Normalization for Generative Adversarial Networks , 2018, ICLR.
[48] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[49] Andrea Vedaldi,et al. Fully-trainable deep matching , 2016, BMVC.
[50] Alessandro Piva,et al. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[51] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[52] Heiko Schuldt,et al. The PS-Battles Dataset - an Image Collection for Image Manipulation Detection , 2018, ArXiv.
[53] Ronan Collobert,et al. Recurrent Convolutional Neural Networks for Scene Labeling , 2014, ICML.
[54] 한보형,et al. Learning Deconvolution Network for Semantic Segmentation , 2015 .
[55] Matthew D. Zeiler. ADADELTA: An Adaptive Learning Rate Method , 2012, ArXiv.
[56] Luo Wei,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .
[57] David W. Jacobs,et al. WarpNet: Weakly Supervised Matching for Single-View Reconstruction , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[58] Pieter Abbeel,et al. InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets , 2016, NIPS.
[59] Simon Osindero,et al. Conditional Generative Adversarial Nets , 2014, ArXiv.
[60] Marina Del Rey,et al. Deep Matching and Validation Network: An End-to-End Solution to Constrained Image Splicing Localization and Detection , 2017, ACM Multimedia.