Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
暂无分享,去创建一个
[1] H. Barrow,et al. RECOVERING INTRINSIC SCENE CHARACTERISTICS FROM IMAGES , 1978 .
[2] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[3] Charlie Daly,et al. A Technique for Detecting Plagiarism in Computer Code , 2005, Comput. J..
[4] Xiaochun Cao,et al. Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.
[5] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[6] Zhiyong Zhang. Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.
[7] Hany Farid,et al. Digital doctoring: how to tell the real from the fake , 2006 .
[8] Hagit Hel-Or,et al. Shadow Removal Using Intensity Surfaces and Texture Anchor Points , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] Kanliang Wang,et al. A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.
[10] George A. F. Seber,et al. Linear regression analysis , 1977 .
[11] Zhiyong Zhang,et al. Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .
[12] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[13] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[14] Harry Shum,et al. Natural shadow matting , 2007, TOGS.
[15] Tim Weyrich,et al. Principles of appearance acquisition and representation , 2007, SIGGRAPH '08.
[16] Xiaochun Cao,et al. Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map , 2012, IEEE Transactions on Information Forensics and Security.
[17] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[18] Mark S. Drew,et al. Removing Shadows from Images , 2002, ECCV.
[19] Thomas Ertl,et al. Hierarchical Solutions for the Deformable Surface Problem in Visualization , 2000, Graph. Model..
[20] Fred L. Bookstein,et al. Principal Warps: Thin-Plate Splines and the Decomposition of Deformations , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[21] Jiejie Zhu,et al. Learning to recognize shadows in monochromatic natural images , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[22] Min Wu,et al. Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images , 2009, IEEE Transactions on Information Forensics and Security.
[23] Cheng Lu,et al. Entropy Minimization for Shadow Removal , 2009, International Journal of Computer Vision.
[24] Hagit Hel-Or,et al. Texture-Preserving Shadow Removal in Color Images Containing Curved Surfaces , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[25] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[26] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[27] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[28] Hany Farid,et al. Detecting Photographic Composites of People , 2008, IWDW.
[29] Martin D. Levine,et al. Removing shadows , 2005, Pattern Recognit. Lett..
[30] Xiaochun Cao,et al. Detecting photographic composites using shadows , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[31] Bernhard Schölkopf,et al. A tutorial on support vector regression , 2004, Stat. Comput..
[32] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[33] Norman I. Badler,et al. Generating soft shadows with a depth buffer algorithm , 1984, IEEE Computer Graphics and Applications.
[34] Jianfeng Ma,et al. Security and Trust in Digital Rights Management: A Survey , 2009, Int. J. Netw. Secur..
[35] Ingemar J. Cox,et al. Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.
[36] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[37] Fei Peng,et al. A complete passive blind image copy-move forensics scheme based on compound statistics features. , 2011, Forensic science international.
[38] Ronen Basri,et al. Lambertian reflectance and linear subspaces , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.
[39] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[40] Primack,et al. Penumbra diffraction in the quantization of dispersing billiards. , 1995, Physical review letters.