Two-Stream Neural Networks for Tampered Face Detection
暂无分享,去创建一个
[1] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Alessandro Piva,et al. Improved DCT coefficient analysis for forgery localization in JPEG images , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[3] Bolei Zhou,et al. Learning Deep Features for Discriminative Localization , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[5] Yiannis Kompatsiaris,et al. Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[6] Xing Zhang,et al. Exposing Region Splicing Forgeries with Blind Local Noise Estimation , 2013, International Journal of Computer Vision.
[7] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[8] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[9] Davide Cozzolino,et al. Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[10] Shaziya .P.S. Khan,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .
[11] Hany Farid,et al. Exposing photo manipulation from user-guided 3D lighting analysis , 2015, Electronic Imaging.
[12] Davide Cozzolino,et al. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[13] Alessandro Piva,et al. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[14] Jing Dong,et al. CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[15] Davis E. King,et al. Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..
[16] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[17] Rama Chellappa,et al. Template regularized sparse coding for face verification , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).
[18] Xing Zhang,et al. Exposing image splicing with inconsistent local noise variances , 2012, 2012 IEEE International Conference on Computational Photography (ICCP).
[19] Z. Jane Wang,et al. Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.
[20] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Jessica J. Fridrich,et al. CFA-aware features for steganalysis of color images , 2015, Electronic Imaging.
[22] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.