Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images
暂无分享,去创建一个
[1] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[2] Eduardo F. Nakamura,et al. Information fusion for wireless sensor networks: Methods, models, and classifications , 2007, CSUR.
[3] Martial Hebert,et al. Discriminative random fields: a discriminative framework for contextual interaction in classification , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[4] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[5] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[6] A. De Rosa,et al. Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[7] Yuan-Kai Wang,et al. Single Image Defogging by Multiscale Depth Fusion , 2014, IEEE Transactions on Image Processing.
[8] Stan Z. Li,et al. Markov Random Field Modeling in Image Analysis , 2001, Computer Science Workbench.
[9] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[10] Stefan Harmeling,et al. Improving Denoising Algorithms via a Multi-scale Meta-procedure , 2011, DAGM-Symposium.
[11] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[12] Edward H. Adelson,et al. PYRAMID METHODS IN IMAGE PROCESSING. , 1984 .
[13] Davide Cozzolino,et al. Guided filtering for PRNU-based localization of small-size image forgeries , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[14] Pawel Korus,et al. Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.
[15] Jing Dong,et al. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.
[16] Michael Elad,et al. Image denoising through multi-scale learnt dictionaries , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[17] Mauro Barni,et al. A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.
[18] Heinz H. Bauschke,et al. Recompression of JPEG images by requantization , 2003, IEEE Trans. Image Process..
[19] William T. Freeman,et al. A computational approach for obstruction-free photography , 2015, ACM Trans. Graph..
[20] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[21] Domènec Puig,et al. Supervised texture classification by integration of multiple texture methods and evaluation windows , 2007, Image Vis. Comput..
[22] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[23] Vladimir Kolmogorov,et al. An Experimental Comparison of Min-Cut/Max-Flow Algorithms for Energy Minimization in Vision , 2004, IEEE Trans. Pattern Anal. Mach. Intell..
[24] Pawel Korus,et al. Towards Practical Self-Embedding for JPEG-Compressed Digital Images , 2015, IEEE Transactions on Multimedia.
[25] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[26] P.K. Varshney,et al. Optimal Data Fusion in Multiple Sensor Detection Systems , 1986, IEEE Transactions on Aerospace and Electronic Systems.
[27] Olga Veksler,et al. Fast approximate energy minimization via graph cuts , 2001, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[28] Vladimir Kolmogorov,et al. An experimental comparison of min-cut/max- flow algorithms for energy minimization in vision , 2001, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[30] Christel Chamaret,et al. Spatio-temporal combination of saliency maps and eye-tracking assessment of different strategies , 2010, 2010 IEEE International Conference on Image Processing.
[31] Xiaochun Cao,et al. Saliency map fusion based on rank-one constraint , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[32] Chiou-Ting Hsu,et al. What has been tampered? From a sparse manipulation perspective , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[33] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[34] Ali Borji,et al. Boosting bottom-up and top-down visual features for saliency estimation , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[35] R. Polikar,et al. Ensemble based systems in decision making , 2006, IEEE Circuits and Systems Magazine.
[36] Mauro Barni,et al. Dealing with uncertainty in image forensics: A fuzzy approach , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[37] Bin Li,et al. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[38] Martin Kraus,et al. Depth‐of‐Field Rendering by Pyramidal Image Processing , 2007, Comput. Graph. Forum.
[39] Mohammad Ali Akhaee,et al. A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery , 2015, IEEE Transactions on Image Processing.
[40] Moshe Porat,et al. Toward optimal real-time transcoding using requantization in the DCT domain , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[41] Raanan Fattal,et al. Image and video upscaling from local self-examples , 2011, TOGS.
[42] Luisa Verdoliva,et al. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.
[43] Sameer Singh,et al. Approaches to Multisensor Data Fusion in Target Tracking: A Survey , 2006, IEEE Transactions on Knowledge and Data Engineering.
[44] Davide Cozzolino,et al. Multiple Classifier Systems for Image Forgery Detection , 2013, ICIAP.
[45] Lior Rokach,et al. Ensemble-based classifiers , 2010, Artificial Intelligence Review.
[46] Roberto Caldelli,et al. Splicing forgeries localization through the use of first digit features , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[47] Bin Li,et al. Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[48] Ananthram Swami,et al. Trust and independence aware decision fusion in distributed networks , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[49] Paolo Bestagini,et al. Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[50] Alain Trémeau,et al. A performance evaluation of fusion techniques for spatio-temporal saliency detection in dynamic scenes , 2013, 2013 IEEE International Conference on Image Processing.