暂无分享,去创建一个
[1] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[2] Hany Farid,et al. Video Stabilization and Enhancement , 2007 .
[3] Hany Farid,et al. The specificity of the search template. , 2009, Journal of vision.
[4] Xiaochun Cao,et al. Single view compositing with shadows , 2005, The Visual Computer.
[5] Dimitrios I. Fotiadis,et al. Intravascular Imaging: Current Applications and Research Developments , 2011 .
[6] S J Hickman,et al. Seeing is not Believing , 2012 .
[7] Ron Graham,et al. Digital Imaging , 2003 .
[8] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[9] Konstantinos Toutouzas,et al. Research and Clinical Utility of Thermography , 2012 .
[10] H. Farid. A Survey of Image Forgery Detection , 2008 .
[11] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[12] Min Wu,et al. Noise Features for Image Tampering Detection and Steganalysis , 2007, 2007 IEEE International Conference on Image Processing.
[13] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[14] Xiaochun Cao,et al. Detecting photographic composites using shadows , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[15] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[16] Micah K. Johnson,et al. Lighting and optical tools for image forensics , 2007 .
[17] Xiaochun Cao,et al. Camera Calibration Using Symmetric Objects , 2006, IEEE Transactions on Image Processing.
[18] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[19] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[20] Mary J. Bravo,et al. Training determines the target representation for search , 2010 .
[21] I. Reid,et al. Single view metrology , 1999, ICCV 1999.
[22] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[23] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[24] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[25] C. E. Springer,et al. Geometry and Analysis of Projective Spaces , 1967 .
[26] D Kersten,et al. Moving Cast Shadows Induce Apparent Motion in Depth , 1997, Perception.
[27] Farhad Soleimanian Gharehchopogh,et al. A Novel Approach for Edge Detection in Images Based on Cellular Learning Automata , 2012, Int. J. Comput. Vis. Image Process..
[28] Weihong Wang,et al. Digital video forensics , 2009 .
[29] Xiaochun Cao,et al. Detecting photographic composites using two-view geometrical constraints , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[30] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[31] Hany Farid,et al. Photo Fakery and Forensics , 2009, Adv. Comput..
[32] Mahalingam Ramkumar,et al. A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[33] H. Farid. Digital Doctoring: can we trust photographs? , 2007 .
[34] Weihong Wang,et al. Detecting Re-projected Video , 2008, Information Hiding.
[35] Wei Su,et al. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.
[36] Ekta Walia,et al. Fast and High Capacity Digital Image Watermarking Technique Based on Phase of Zernike Moments , 2012, Int. J. Comput. Vis. Image Process..
[37] E. Bruce Goldstein,et al. Encyclopedia of perception , 2010 .
[38] Jan Lukás,et al. Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.
[39] Xiaochun Cao,et al. Video synchronization and its application to object transfer , 2010, Image Vis. Comput..
[40] Andrew Zisserman,et al. Metric rectification for perspective images of planes , 1998, Proceedings. 1998 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No.98CB36231).
[41] M. McPeek,et al. Modeling Three-Dimensional Morphological Structures Using Spherical Harmonics , 2009, Evolution; international journal of organic evolution.
[42] Hongmei Liu,et al. Feature based watermarking scheme for image authentication , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[43] Shih-Fu Chang,et al. A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[44] Weihong Wang,et al. Exposing digital forgeries in video by detecting double quantization , 2009, MM&Sec '09.
[45] Alin C. Popescu,et al. Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .
[46] Shih-Fu Chang,et al. Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[47] Zhanyi Hu,et al. Single view metrology from scene constraints , 2005, Image Vis. Comput..
[48] Khalid Idrissi,et al. A Semi-Supervised Metric Learning for Content-Based Image Retrieval , 2011, Int. J. Comput. Vis. Image Process..
[49] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[50] Siwei Lyu,et al. How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.
[51] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[52] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[53] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[54] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[55] Hany Farid,et al. THE CORRELATED EVOLUTION OF THREE-DIMENSIONAL REPRODUCTIVE STRUCTURES BETWEEN MALE AND FEMALE DAMSELFLIES , 2009, Evolution; international journal of organic evolution.
[56] Richard H Wiggins,et al. Digital imaging. , 2003, Seminars in ultrasound, CT, and MR.
[57] Hany Farid,et al. Detecting Photographic Composites of People , 2008, IWDW.
[58] Xiaochun Cao,et al. Camera calibration and light source orientation from solar shadows , 2007, Comput. Vis. Image Underst..
[59] Micah K. Johnson,et al. Metric Measurements on a Plane from a Single Image , 2006 .
[60] Mona Nafari,et al. Reversible Data Hiding Based on Statistical Correlation of Blocked Sub-Sampled Image , 2012, Int. J. Comput. Vis. Image Process..
[61] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[62] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[63] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.