Blind Detection of Digital Photomontage using Higher Order Statistics
暂无分享,去创建一个
[1] Takuso Sato,et al. Real‐time bispectral analysis of gear noise and its application to contactless diagnosis , 1977 .
[2] Paul R. White,et al. Practical Issues Concerning the Use of Bicoherence for the detection of quadratic phase coupling , 1995 .
[3] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[4] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[5] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[6] Gary Friedman,et al. The trustworthy digital camera: restoring credibility to the photographic image , 1993 .
[7] E. Powers,et al. Digital Bispectral Analysis and Its Applications to Nonlinear Wave Interactions , 1979, IEEE Transactions on Plasma Science.
[8] Nasir D. Memon,et al. Distortion-bounded authentication techniques , 2000, Electronic Imaging.
[9] Stanley Osher,et al. Modeling Textures with Total Variation Minimization and Oscillating Patterns in Image Processing , 2003, J. Sci. Comput..
[10] G. Krieger,et al. Higher-order statistics of natural images and their exploitation by operators selective to intrinsic dimensionality , 1997, Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics.
[11] C Ginzburg,et al. Morelli, Freud and Sherlock Holmes: clues and scientific method. , 1980, History workshop.
[12] Mohan S. Kankanhalli,et al. Robust image authentication using content based compression , 2003, Multimedia Systems.
[13] Nasir Memon,et al. Authentication techniques for multimedia content , 1999, Other Conferences.
[14] Rafik A. Goubran,et al. Robust voice activity detection using higher-order statistics in the LPC residual domain , 2001, IEEE Trans. Speech Audio Process..
[15] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[16] James D. Hamilton. Time Series Analysis , 1994 .
[17] Shaul Hanany,et al. An estimate of the Cosmological Bispectrum from the MAXIMA-1 CMB map , 2001 .
[18] Stephen McLaughlin,et al. Detecting Nonlinearities In Speech Sounds Using The Bicoherence , 1996 .
[19] Jean-Luc Dugelay,et al. Blind detection of malicious alterations on still images using robust watermarks , 2000 .
[20] Hany Farid,et al. Detecting Digital Forgeries Using Bispectral Analysis , 1999 .
[21] Min Wu,et al. Reading Between the Lines: Lessons from the SDMI Challenge , 2001, USENIX Security Symposium.
[22] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[23] T. Bullock,et al. Bicoherence of intracranial EEG in sleep, wakefulness and seizures. , 1997, Electroencephalography and clinical neurophysiology.
[24] Ping Wah Wong,et al. A Watermark for Image Integrity and Ownership Verification , 1998, PICS.
[25] Georgios B. Giannakis,et al. Polyspectral analysis of mixed processes and coupled harmonics , 1996, IEEE Trans. Inf. Theory.
[26] Annabel M. Patterson. Reading Between the Lines , 1992 .
[27] Paul R. White,et al. The interpretation of the bispectra of vibration signals—: I. Theory , 1995 .
[28] H. Farid. A picture tells a thousand lies , 2003 .
[29] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[30] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[31] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[32] A.V. Oppenheim,et al. The importance of phase in signals , 1980, Proceedings of the IEEE.
[33] J. Oliver,et al. When seeing is believing. , 1948, Stanford medical bulletin.
[34] Minerva M. Yeung,et al. An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.
[35] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[36] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[37] Gerhard Krieger,et al. Nonlinear image operators for the evaluation of local intrinsic dimensionality , 1996, IEEE Trans. Image Process..
[38] Shih-Fu Chang,et al. A Data Set of Authentic and Spliced Image Blocks , 2004 .
[39] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[40] Emma Vere-Jones. Picture perfect , 1991, Nature.