Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization
暂无分享,去创建一个
[1] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[2] Kannan Ramchandran,et al. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).
[3] Bin Li,et al. Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation , 2015, IEEE Transactions on Image Processing.
[4] Jiwu Huang,et al. Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.
[5] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[6] Chang-Tsun Li. Source camera identification using enhanced sensor pattern noise , 2010, IEEE Trans. Inf. Forensics Secur..
[7] Alessandro Foi,et al. Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering , 2007, IEEE Transactions on Image Processing.
[8] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[9] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[10] Davide Cozzolino,et al. Multiple Classifier Systems for Image Forgery Detection , 2013, ICIAP.
[11] Carsten Rother,et al. DenseCut: Densely Connected CRFs for Realtime GrabCut , 2015, Comput. Graph. Forum.
[12] Giulia Boato,et al. Detecting photo manipulation on signs and billboards , 2010, 2010 IEEE International Conference on Image Processing.
[13] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[14] Xiaochun Cao,et al. Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut , 2010, IEEE Transactions on Information Forensics and Security.
[15] Jian Sun,et al. Guided Image Filtering , 2010, ECCV.
[16] Alex ChiChung Kot,et al. Manipulation Detection on Image Patches Using FusionBoost , 2012, IEEE Transactions on Information Forensics and Security.
[17] Davide Cozzolino,et al. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[18] Bin Li,et al. Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[19] Jiwu Huang,et al. Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk , 2016, IEEE Signal Processing Letters.
[20] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[21] Vladimir Kolmogorov,et al. An experimental comparison of min-cut/max- flow algorithms for energy minimization in vision , 2001, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[23] Alex ChiChung Kot,et al. Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.
[24] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[25] Mauro Barni,et al. A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.
[26] Guna Seetharaman,et al. Harnessing Motion Blur to Unveil Splicing , 2014, IEEE Transactions on Information Forensics and Security.
[27] Shaziya .P.S. Khan,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .
[28] Davide Cozzolino,et al. Guided filtering for PRNU-based localization of small-size image forgeries , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[29] Luisa Verdoliva,et al. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.
[30] Jiwu Huang,et al. Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise , 2012, IEEE Transactions on Information Forensics and Security.
[31] Olga Veksler,et al. Fast Approximate Energy Minimization via Graph Cuts , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[32] Mauro Barni,et al. Dealing with uncertainty in image forensics: A fuzzy approach , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[33] S. Prasad,et al. On Resampling Detection and its Application to Detect Image Tampering , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[34] A. De Rosa,et al. Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[35] Hai-Dong Yuan,et al. Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.
[36] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.
[37] L. Verdoliva,et al. PRNU-based detection of small-size image forgeries , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[38] Timothy K. Shih,et al. Tamper Detection of JPEG Image Due to Seam Modifications , 2015, IEEE Transactions on Information Forensics and Security.
[39] Jessica J. Fridrich,et al. Camera identification from cropped and scaled images , 2008, Electronic Imaging.
[40] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[41] Kai Wang,et al. General-purpose image forensics using patch likelihood under image statistical models , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[42] Jessica J. Fridrich,et al. Sensor-fingerprint based identification of images corrected for lens distortion , 2012, Other Conferences.
[43] Martial Hebert,et al. Exploiting Inference for Approximate Parameter Learning in Discriminative Fields: An Empirical Study , 2005, EMMCVPR.
[44] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[45] Shih-Fu Chang,et al. Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection , 2010, IEEE Transactions on Information Forensics and Security.
[46] Jiwu Huang,et al. A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.
[47] Xufeng Lin,et al. Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization , 2016, IEEE Transactions on Information Forensics and Security.
[48] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[49] Chang-Tsun Li,et al. Using improved imaging sensor pattern noise for source camera identification , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[50] Davide Cozzolino,et al. A feature-based approach for image tampering detection and localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[51] Chiou-Ting Hsu,et al. What has been tampered? From a sparse manipulation perspective , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[52] Xinpeng Zhang,et al. Detecting Image Splicing Based on Noise Level Inconsistency , 2017, Multimedia Tools and Applications.
[53] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[54] Paolo Bestagini,et al. Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).