Joint image splicing detection in DCT and Contourlet transform domain
暂无分享,去创建一个
Wei Lu | Jian Weng | Qingbo Zhang | W. Lu | Jian Weng | Qingbo Zhang
[1] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[2] Guna Seetharaman,et al. Harnessing Motion Blur to Unveil Splicing , 2014, IEEE Transactions on Information Forensics and Security.
[3] Jing Dong,et al. Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[4] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[5] Yongdong Zhang,et al. A Highly Parallel Framework for HEVC Coding Unit Partitioning Tree Decision on Many-core Processors , 2014, IEEE Signal Processing Letters.
[6] Davide Cozzolino,et al. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[7] Yongdong Zhang,et al. Parallel deblocking filter for HEVC on many-core processor , 2014 .
[8] Pan Feng,et al. A survey of passive technology for digital image forensics , 2007 .
[9] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[10] Alex ChiChung Kot,et al. Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.
[11] Wei Su,et al. Steganalysis Versus Splicing Detection , 2008, IWDW.
[12] Yun Q. Shi,et al. A natural image model approach to splicing detection , 2007, MM&Sec.
[13] Jiwu Huang,et al. A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.
[14] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[15] Minh N. Do,et al. Pyramidal directional filter banks and curvelets , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[16] Jason Weston,et al. Gene Selection for Cancer Classification using Support Vector Machines , 2002, Machine Learning.
[17] Korris Fu-Lai Chung,et al. Revealing digital fakery using multiresolution decomposition and higher order statistics , 2011, Eng. Appl. Artif. Intell..
[18] Yongdong Zhang,et al. Efficient Parallel Framework for HEVC Motion Estimation on Many-Core Processors , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[19] Jessica J. Fridrich,et al. Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.
[20] Shih-Fu Chang,et al. A Data Set of Authentic and Spliced Image Blocks , 2004 .
[21] Chinmay A. Vyas,et al. A review on methods for image authentication and visual cryptography in digital image watermarking , 2014 .
[22] M. Do,et al. Directional multiscale modeling of images using the contourlet transform , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[23] Jing Dong,et al. Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.
[24] Alex ChiChung Kot,et al. Image tampering detection by exposing blur type inconsistency , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[25] Minh N. Do,et al. Ieee Transactions on Image Processing the Contourlet Transform: an Efficient Directional Multiresolution Image Representation , 2022 .
[26] Alex ChiChung Kot,et al. Splicing detection in out-of-focus blurred images , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[27] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[28] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[29] Hongtao Lu,et al. Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..
[30] Jiwu Huang,et al. A survey of passive technology for digital image forensics , 2007, Frontiers of Computer Science in China.
[31] J Granty Regina Elwin,et al. Survey on passive methods of image tampering detection , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).
[32] Davide Cozzolino,et al. A feature-based approach for image tampering detection and localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[33] Yongdong Zhang,et al. Highly Parallel Framework for HEVC Motion Estimation on Many-Core Platform , 2013, 2013 Data Compression Conference.
[34] Wei Lu,et al. Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..
[35] Rohit Srivastava,et al. A Comprehensive Survey on Digital Image Watermarking Techniques , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[36] Jianhua Li,et al. Passive Image-Splicing Detection by a 2-D Noncausal Markov Model , 2015, IEEE Transactions on Circuits and Systems for Video Technology.