Forensics of visual privacy protection in digital images
暂无分享,去创建一个
Wei Lu | Xianjin Liu | Fei Xue | Qin Zhang | Honglin Ren | Huimei Xiao
[1] Wei Lu,et al. Binary Image Steganalysis Based on Histogram of Structuring Elements , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[2] Wei Lu,et al. Secure Binary Image Steganography With Distortion Measurement Based on Prediction , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Qin Zhang,et al. Downscaling Factor Estimation on Pre-JPEG Compressed Images , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[4] Wei Lu,et al. Efficient binary image steganalysis based on ensemble neural network of multi-module , 2020, J. Real Time Image Process..
[5] Wei Lu,et al. Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism , 2019, Signal Process..
[6] Jiwu Huang,et al. Secure Halftone Image Steganography Based on Pixel Density Transition , 2019, IEEE Transactions on Dependable and Secure Computing.
[7] Wei Lu,et al. Secure Binary Image Steganography Based on Fused Distortion Measurement , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Wei Lu,et al. Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment , 2019, Int. J. Digit. Crime Forensics.
[9] Wei Sun,et al. Region duplication detection based on hybrid feature and evaluative clustering , 2019, Multimedia Tools and Applications.
[10] Wei Lu,et al. Image Deblocking Detection Based on a Convolutional Neural Network , 2019, IEEE Access.
[11] Xiangyang Luo,et al. Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Fei Xue,et al. Defocus blur detection based on multiscale SVD fusion in gradient domain , 2019, J. Vis. Commun. Image Represent..
[13] Wei Lu,et al. Binary image steganography based on joint distortion measurement , 2019, J. Vis. Commun. Image Represent..
[14] Wei Lu,et al. Copy-move detection of digital audio based on multi-feature decision , 2018, J. Inf. Secur. Appl..
[15] Wei Lu,et al. Copy-move forgery detection using combined features and transitive matching , 2018, Multimedia Tools and Applications.
[16] Wei Lu,et al. Efficient halftone image steganography based on dispersion degree optimization , 2018, Journal of Real-Time Image Processing.
[17] Zhenyu Wu,et al. Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.
[18] Wei Lu,et al. Scaling factor estimation on JPEG compressed images by cyclostationarity analysis , 2018, Multimedia tools and applications.
[19] Wei Lu,et al. Double JPEG compression detection based on block statistics , 2018, Multimedia Tools and Applications.
[20] Ruxin Wang,et al. Digital image splicing detection based on Markov features in block DWT domain , 2018, Multimedia Tools and Applications.
[21] J. Lai,et al. Region duplication detection based on image segmentation and keypoint contexts , 2018, Multimedia Tools and Applications.
[22] Wei Lu,et al. Binary Image Steganalysis Based on Distortion Level Co-occurrence Matrix , 2018 .
[23] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[24] Yicong Zhou,et al. Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion , 2018, Signal Process. Image Commun..
[25] Wei Lu,et al. Natural image deblurring based on L0-regularization and kernel shape optimization , 2018, Multimedia Tools and Applications.
[26] Huan Wang,et al. New cubic reference table based image steganography , 2018, Multimedia Tools and Applications.
[27] Klaus Schöffmann,et al. Learning laparoscopic video shot classification for gynecological surgery , 2018, Multimedia Tools and Applications.
[28] Yong Jae Lee,et al. Learning to Anonymize Faces for Privacy Preserving Action Detection , 2018, ECCV.
[29] Wei Tsang Ooi,et al. Sprite tree: an efficient image-based representation for networked virtual environments , 2017, The Visual Computer.
[30] Zheng Qin,et al. Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..
[31] Fan Yang,et al. Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching , 2017, Multimedia Tools and Applications.
[32] Xin Liao,et al. Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform , 2017, Multimedia Tools and Applications.
[33] Bin Li,et al. MSE period based estimation of first quantization step in double compressed JPEG images , 2017, Signal Process. Image Commun..
[34] Wei Lu,et al. Fast Copy-Move Detection of Digital Audio , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).
[35] Fan Yang,et al. Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..
[36] Khan Muhammad,et al. CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.
[37] Hamid Hassanpour,et al. Automatic estimation and segmentation of partial blur in natural images , 2017, The Visual Computer.
[38] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..
[39] Weiming Zhang,et al. Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.
[40] Jie Li,et al. Blind image motion deblurring with L0-regularized priors , 2016, J. Vis. Commun. Image Represent..
[41] Wei Lu,et al. Joint image splicing detection in DCT and Contourlet transform domain , 2016, J. Vis. Commun. Image Represent..
[42] Qian Wang,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.
[43] Michael S. Ryoo,et al. Privacy-Preserving Human Activity Recognition from Extreme Low Resolution , 2016, AAAI.
[44] Sung Wook Baik,et al. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.
[45] Yicong Zhou,et al. Image encryption: Generating visually meaningful encrypted images , 2015, Inf. Sci..
[46] Sung Wook Baik,et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.
[47] Alexandros André Chaaraoui,et al. Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..
[48] Sung Wook Baik,et al. A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption , 2015, KSII Trans. Internet Inf. Syst..
[49] Yicong Zhou,et al. 2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..
[50] Cong Wang,et al. Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.
[51] Yunhao Liu,et al. Enable Portrait Privacy Protection in Photo Capturing and Sharing , 2014, ArXiv.
[52] Jing Dong,et al. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.
[53] Weiming Zhang,et al. Non-local Denoising in Encrypted Images , 2014, IOV.
[54] Yicong Zhou,et al. Image encryption using binary bitplane , 2014, Signal Process..
[55] Li Xu,et al. Discriminative Blur Detection Features , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[56] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.
[57] Yao Zhao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.
[58] Yao Zhao,et al. Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[59] Weiming Zhang,et al. A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification , 2013, IEEE Trans. Inf. Forensics Secur..
[60] Peijia Zheng,et al. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.
[61] Bin Li,et al. General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[62] Stefan Katzenbeisser,et al. Privacy-preserving architecture for forensic image recognition , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[63] Wei Lu,et al. Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..
[64] Alexandros André Chaaraoui,et al. An Efficient Approach for Multi-view Human Action Recognition Based on Bag-of-Key-Poses , 2012, HBU.
[65] Alexandros André Chaaraoui,et al. A review on vision techniques applied to Human Behaviour Analysis for Ambient-Assisted Living , 2012, Expert Syst. Appl..
[66] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[67] Tieyong Zeng,et al. Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.
[68] King Ngi Ngan,et al. A Co-Saliency Model of Image Pairs , 2011, IEEE Transactions on Image Processing.
[69] Shijian Lu,et al. Blurred image region detection and classification , 2011, ACM Multimedia.
[70] Zhenxing Qian,et al. Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.
[71] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[72] Kah Phooi Seng,et al. Privacy preserving stereoscopic vision with One-Bit transform , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[73] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[74] Seungyong Lee,et al. Fast motion deblurring , 2009, ACM Trans. Graph..
[75] Marco Zennaro,et al. Large-scale privacy protection in Google Street View , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[76] K. J. Ray Liu,et al. Digital image source coder forensics via intrinsic fingerprints , 2009, IEEE Transactions on Information Forensics and Security.
[77] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[78] David A. Forsyth,et al. Generalizing motion edits with Gaussian processes , 2009, ACM Trans. Graph..
[79] Yao Zhao,et al. Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.
[80] Sen-Ching S. Cheung,et al. Managing privacy data in pervasive camera networks , 2008, 2008 15th IEEE International Conference on Image Processing.
[81] Patricia Ladret,et al. The blur effect: perception and estimation with a new no-reference perceptual blur metric , 2007, Electronic Imaging.
[82] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[83] Yong Rui,et al. Light Weight Background Blurring for Video Conferencing Applications , 2006, 2006 International Conference on Image Processing.
[84] Shai Avidan,et al. Blind Vision , 2006, ECCV.
[85] Carman Neustaedter,et al. Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.
[86] Norihiro Hagita,et al. Stealth vision for protecting privacy , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[87] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[88] Carman Neustaedter,et al. The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness , 2003, UbiComp.
[89] Nariman Farvardin,et al. A perceptually motivated three-component image model-Part I: description of the model , 1995, IEEE Trans. Image Process..
[90] Yicong Zhou,et al. Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling , 2019, IEEE Transactions on Multimedia.
[91] Shengshan Hu,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. , 2016, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[92] Yôiti Suzuki,et al. [Foreword] Welcome to the Special Section on Future Audiovisual Media: UHDTV, 3DTV, and Beyond , 2014 .
[93] Noboru Babaguchi,et al. Recoverable Privacy Protection for Video Content Distribution , 2009, EURASIP J. Inf. Secur..