Automated Design of Neural Network Architectures With Reinforcement Learning for Detection of Global Manipulations
暂无分享,去创建一个
Xiangui Kang | Z. Jane Wang | Zheng Wang | Yifang Chen | Z. J. Wang | Zheng Wang | Xiangui Kang | Yifang Chen
[1] Jiwu Huang,et al. A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.
[2] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[3] Andrew Y. Ng,et al. Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping , 1999, ICML.
[4] Ramesh Raskar,et al. Designing Neural Network Architectures using Reinforcement Learning , 2016, ICLR.
[5] Jessica J. Fridrich,et al. Deep Learning for Detecting Processing History of Images , 2018, Media Watermarking, Security, and Forensics.
[6] Yun Q. Shi,et al. A multi-purpose image forensic method using densely connected convolutional neural networks , 2019, Journal of Real-Time Image Processing.
[7] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[9] K. J. Ray Liu,et al. Detectability of the Order of Operations: An Information Theoretic Approach , 2016, IEEE Transactions on Information Forensics and Security.
[10] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[11] Premkumar Natarajan,et al. ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Yao Zhao,et al. Detection of operation chain: JPEG-Resampling-JPEG , 2017, Signal Process. Image Commun..
[13] Kannan Ramchandran,et al. Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.
[14] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Belhassen Bayar,et al. Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[16] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[17] Vijay Vasudevan,et al. Learning Transferable Architectures for Scalable Image Recognition , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[18] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[19] Jiwu Huang,et al. Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Quoc V. Le,et al. Neural Architecture Search with Reinforcement Learning , 2016, ICLR.
[21] Z. Jane Wang,et al. Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.
[22] Long-Ji Lin,et al. Reinforcement learning for robots using neural networks , 1992 .
[23] Yao Zhao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.
[24] Wael Abd-Almageed,et al. BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.
[25] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[26] K. J. Ray Liu,et al. Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[27] Kai Wang,et al. General-purpose image forensics using patch likelihood under image statistical models , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[28] Jessica J. Fridrich,et al. Scalable Processing History Detector for JPEG Images , 2017, Media Watermarking, Security, and Forensics.
[29] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[30] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[31] Alessandro Piva,et al. Reverse engineering of double compressed images in the presence of contrast enhancement , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[32] Wei Wu,et al. Practical Block-Wise Neural Network Architecture Generation , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[33] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[34] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[35] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[36] Hui Zeng,et al. A Multi-purpose countermeasure against image anti-forensics using autoregressive model , 2016, Neurocomputing.
[37] Hai-Dong Yuan,et al. Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.
[38] Alessandro Piva,et al. Reverse engineering of double JPEG compression in the presence of image resizing , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).