Exposing Photo Manipulation from Shading and Shadows
暂无分享,去创建一个
James F. O'Brien | Hany Farid | Eric Kee | H. Farid | E. Kee
[1] P. Beckmann,et al. The scattering of electromagnetic waves from rough surfaces , 1963 .
[2] Desmond J. Walton,et al. Terrain modelling with B-spline type surfaces defined on curved knot lines , 1987, Image Vis. Comput..
[3] Rama Chellappa,et al. Estimation of illuminant direction, albedo, and shape from shading , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[4] Narendra Ahuja,et al. Estimation of the light source distribution and its use in integrated shape recovery from stereo and shading , 1993, 1993 (4th) International Conference on Computer Vision.
[5] Shree K. Nayar,et al. Generalization of Lambert's reflectance model , 1994, SIGGRAPH.
[6] Steve Marschner,et al. Inverse Lighting for Photography , 1997, CIC.
[7] A. P. Petrov,et al. Illuminant direction and shape of a bump , 1998 .
[8] Peter Shirley,et al. A practical analytic model for daylight , 1999, SIGGRAPH.
[9] Jan-Olof Eklundh,et al. Automatic estimation of the projected light source direction , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[10] Yee-Hong Yang,et al. Multiple Illuminant Direction Detection with Application to Image Synthesis , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Yang Wang,et al. Estimation of multiple directional light sources for synthesis of augmented reality images , 2002, Graph. Model..
[12] Stephen Lin,et al. Multiple-cue illumination estimation in textured scenes , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[13] Wei Zhou,et al. A unified framework for scene illuminant estimation , 2008, Image Vis. Comput..
[14] Steffen Werner,et al. Why Cast Shadows are Expendable: Insensitivity of Human Observers and the Inherent Ambiguity of Cast Shadows in Pictorial Art , 2004, Perception.
[15] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[16] John Hart,et al. ACM Transactions on Graphics , 2004, SIGGRAPH 2004.
[17] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[18] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[19] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[20] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[21] Katsushi Ikeuchi,et al. Light source position and reflectance estimation from a single view without the distant illumination assumption , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Patrick Cavanagh,et al. Perceiving Illumination Inconsistencies in Scenes , 2005, Perception.
[23] David G. Stork,et al. Computer Vision, Image Analysis, and Master Art: Part 2 , 2006, IEEE MultiMedia.
[24] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[25] David G. Stork,et al. Estimating the location of illuminants in realist master paintings Computer image analysis addresses a debate in art history of the Baroque , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[26] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[27] Piti Irawan,et al. Appearance of Woven Cloth , 2008 .
[28] H. Farid. A Survey of Image Forgery Detection , 2008 .
[29] David G. Stork,et al. Inferring illumination direction estimated from disparate sources in paintings: an investigation into Jan Vermeer's Girl with a pearl earring , 2008, Electronic Imaging.
[30] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[31] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[32] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[33] Xiaochun Cao,et al. Detecting photographic composites using shadows , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[34] Babak Mahdian,et al. Detecting double compressed JPEG images , 2009, ICDP.
[35] Matthias Kirchner. Efficient estimation of CFA pattern configuration in digital camera images , 2010, Electronic Imaging.
[36] Christian Riess,et al. Scene Illumination as an Indicator of Image Manipulation , 2010, Information Hiding.
[37] Mary J. Bravo,et al. Image forensic analyses that elude the human visual system , 2010, Electronic Imaging.
[38] Hany Farid,et al. Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[39] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[40] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[41] David A. Forsyth,et al. Rendering synthetic objects into legacy photographs , 2011, ACM Trans. Graph..
[42] Xiaochun Cao,et al. Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.
[43] James F. O'Brien,et al. Exposing photo manipulation with inconsistent reflections , 2012, TOGS.
[44] James F. O'Brien,et al. Exposing photo manipulation with inconsistent shadows , 2013, TOGS.
[45] J. Fridrich. Digital Image Forensics Using Sensor Noise , .