Digital image modification detection using color information and its histograms.
暂无分享,去创建一个
Na Fan | Bo Liu | Xinghui Zhu | Yue Shen | Haoyu Zhou | Zigang Fu | Bo Liu | N. Fan | Haoyu Zhou | Xinghui Zhu | Zi-Gang Fu | Yue Shen
[1] Markus A. Stricker,et al. Similarity of color images , 1995, Electronic Imaging.
[2] Tong Zhang,et al. Accelerating Stochastic Gradient Descent using Predictive Variance Reduction , 2013, NIPS.
[3] Donald Gustafson,et al. Fuzzy clustering with a fuzzy covariance matrix , 1978, 1978 IEEE Conference on Decision and Control including the 17th Symposium on Adaptive Processes.
[4] Yizhen Huang,et al. Super-resolution using neural networks based on the optimal recovery theory , 2006, 2006 16th IEEE Signal Processing Society Workshop on Machine Learning for Signal Processing.
[5] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[6] Vera Kurková,et al. Kolmogorov's theorem and multilayer neural networks , 1992, Neural Networks.
[7] Yizhen Huang,et al. Learning images using compositional pattern-producing neural networks for source camera identification and digital demographic diagnosis , 2012, Pattern Recognit. Lett..
[8] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[9] J. Kahane. Sur le théorème de superposition de Kolmogorov , 1975 .
[10] Yizhen Huang,et al. Learning from interpolated images using neural networks for digital forensics , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[11] Yizhen Huang,et al. Image Based Source Camera Identification using Demosaicking , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[12] Sun Xingming,et al. DWT-PCA (EVD) Based Copy-move Image Forgery Detection , 2011 .
[13] Yiannis S. Boutalis,et al. CEDD: Color and Edge Directivity Descriptor: A Compact Descriptor for Image Indexing and Retrieval , 2008, ICVS.
[14] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[15] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[16] Ting Zhang,et al. Copy-Move Forgery Detection Based on SVD in Digital Image , 2009, 2009 2nd International Congress on Image and Signal Processing.
[17] Jiwu Huang,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[18] Yoshua Bengio,et al. How transferable are features in deep neural networks? , 2014, NIPS.
[19] Tiegang Gao,et al. A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.
[20] Yiannis S. Boutalis,et al. FCTH: Fuzzy Color and Texture Histogram - A Low Level Feature for Accurate Image Retrieval , 2008, 2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services.
[21] Feiping Nie,et al. New primal SVM solver with linear computational cost for big data classifications , 2014, ICML 2014.
[22] Akio Yamada,et al. The MPEG-7 color layout descriptor: a compact image feature description for high-speed image/video segment retrieval , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[23] Jichang Guo,et al. Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.
[24] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[25] Shih-Fu Chang,et al. Overview of the MPEG-7 standard , 2001, IEEE Trans. Circuits Syst. Video Technol..
[26] Jie Hu,et al. An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection , 2011, 2011 Second International Conference on Networking and Distributed Computing.
[27] Zhen Li,et al. A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[28] Yizhen Huang,et al. Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.