Robust Image Protection Countering Cropping Manipulation
暂无分享,去创建一个
[1] Xinpeng Zhang,et al. A DTCWT-SVD Based Video Watermarking Resistant to Frame Rate Conversion , 2022, 2022 International Conference on Culture-Oriented Science and Technology (CoST).
[2] Chong Mou,et al. Robust Invertible Image Steganography , 2022, 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Zhenxing Qian,et al. Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain , 2022, IEEE Transactions on Circuits and Systems for Video Technology.
[4] Zhenxing Qian,et al. Hiding Images Into Images with Real-World Robustness , 2021, 2022 IEEE International Conference on Image Processing (ICIP).
[5] Nenghai Yu,et al. JPEG Robust Invertible Grayscale , 2021, IEEE Transactions on Visualization and Computer Graphics.
[6] Sergey Tulyakov,et al. InOut: Diverse Image Outpainting via GAN Inversion , 2021, 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[7] Zhenxing Qian,et al. From Image to Imuge: Immunized Image Generation , 2021, ACM Multimedia.
[8] In So Kweon,et al. Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking , 2021, ACM Multimedia.
[9] Mai Xu,et al. HiNet: Deep Image Hiding by Invertible Network , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[10] Weiming Zhang,et al. MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression , 2021, ACM Multimedia.
[11] Xinpeng Zhang,et al. Watermarking Neural Networks With Watermarked Images , 2021, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Kin-Man Lam,et al. Invertible Image Decolorization , 2021, IEEE Transactions on Image Processing.
[13] Yunchao Wei,et al. ReGO: Reference-Guided Outpainting for Scenery Image , 2021, ArXiv.
[14] Paul L. Rosin,et al. Large-capacity Image Steganography Based on Invertible Neural Networks , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Nicolas Papernot,et al. Markpainting: Adversarial Machine Learning meets Inpainting , 2021, ICML.
[16] Juan Cao,et al. Image Manipulation Detection by Multi-View Multi-Scale Supervision , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[17] Qifeng Chen,et al. Invertible Image Signal Processing , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Zhenxing Qian,et al. Batch Steganography via Generative Network , 2021, IEEE Transactions on Circuits and Systems for Video Technology.
[19] Basile Van Hoorick,et al. Dissecting Image Crops , 2020, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).
[20] Xinlei Chen,et al. Exploring Simple Siamese Representation Learning , 2020, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Cristian Canton-Ferrer,et al. Adversarial Threats to DeepFake Detection: A Practical Perspective , 2020, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[22] Xueming Qian,et al. Sketch-Guided Scenery Image Outpainting , 2020, IEEE Transactions on Image Processing.
[23] Zhenxing Qian,et al. No way to crop: On robust image crop localization , 2021, ArXiv.
[24] Yong Ho Moon,et al. Image Tampering Localization Using Demosaicing Patterns and Singular Value Based Prediction Residue , 2021, IEEE Access.
[25] Peng Lu,et al. Learning the Relation Between Interested Objects and Aesthetic Region for Image Cropping , 2021, IEEE Transactions on Multimedia.
[26] Jing Liu,et al. A discrete wavelet transform and singular value decomposition-based digital video watermark method , 2020 .
[27] Shumeet Baluja,et al. Hiding Images within Images , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[28] Ashraful Islam,et al. DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-Move Forgery Detection and Localization , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[29] Tie-Yan Liu,et al. Invertible Image Rescaling , 2020, ECCV.
[30] M. Bethge,et al. Shortcut learning in deep neural networks , 2020, Nature Machine Intelligence.
[31] Chong Yu,et al. Attention Based Data Hiding with Generative Adversarial Networks , 2020, AAAI.
[32] Alessandro Piva,et al. A vision-based fully automated approach to robust image cropping detection , 2020, Signal Process. Image Commun..
[33] Zhenxing Qian,et al. Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[34] Luisa Verdoliva,et al. Media Forensics and DeepFakes: An Overview , 2020, IEEE Journal of Selected Topics in Signal Processing.
[35] Peyman Milanfar,et al. Distortion Agnostic Deep Watermarking , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[36] Fang Wen,et al. Face X-Ray for More General Face Forgery Detection , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[37] Alexei A. Efros,et al. CNN-Generated Images Are Surprisingly Easy to Spot… for Now , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Takashi Matsubara,et al. Data Augmentation Using Random Image Cropping and Patching for Deep CNNs , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[39] Ross B. Girshick,et al. Mask R-CNN , 2017, 1703.06870.
[40] Basile Van Hoorick. Image Outpainting and Harmonization using Generative Adversarial Networks , 2019, ArXiv.
[41] Faisal Z. Qureshi,et al. EdgeConnect: Structure Guided Image Inpainting using Edge Prediction , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).
[42] Florent Retraint,et al. An Improved Algorithm for Digital Image Authentication and Forgery Localization Using Demosaicing Artifacts , 2019, IEEE Access.
[43] Bo Du,et al. MUSICAL: Multi-Scale Image Contextual Attention Learning for Inpainting , 2019, IJCAI.
[44] Yang Wei,et al. RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[45] Kristin J. Dana,et al. Light Field Messaging With Deep Photographic Steganography , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[46] Premkumar Natarajan,et al. ManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[47] Hang Zhou,et al. Screen-Shooting Resilient Watermarking , 2019, IEEE Transactions on Information Forensics and Security.
[48] Peter Lambert,et al. A Scalable Architecture for Uncompressed-Domain Watermarked Videos , 2019, IEEE Transactions on Information Forensics and Security.
[49] Seong Joon Oh,et al. CutMix: Regularization Strategy to Train Strong Classifiers With Localizable Features , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[50] Zhenxing Qian,et al. Robust digital watermarking for color images in combined DFT and DT-CWT domains. , 2019, Mathematical biosciences and engineering : MBE.
[51] Heung-Kyu Lee,et al. Finding robust domain from attacks: A learning framework for blind watermarking , 2017, Neurocomputing.
[52] Cho-Jui Hsieh,et al. Evaluating Robustness of Deep Image Super-Resolution Against Adversarial Attacks , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[53] Hang Zhou,et al. Defining Cost Functions for Adaptive JPEG Steganography at the Microscale , 2019, IEEE Transactions on Information Forensics and Security.
[54] Shuwu Zhang,et al. Enhancing Image Watermarking With Adaptive Embedding Parameter and PSNR Guarantee , 2019, IEEE Transactions on Multimedia.
[55] Wei An,et al. Flickr1024: A Large-Scale Dataset for Stereo Image Super-Resolution , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).
[56] Wei An,et al. Learning Parallax Attention for Stereo Image Super-Resolution , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[57] Zhenxing Qian,et al. New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[58] Xinpeng Zhang,et al. Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[59] Kalyan Veeramachaneni,et al. SteganoGAN: Pushing the Limits of Image Steganography , 2019 .
[60] Chuan Qin,et al. Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.
[61] Timo Aila,et al. A Style-Based Generator Architecture for Generative Adversarial Networks , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[62] David Duvenaud,et al. Invertible Residual Networks , 2018, ICML.
[63] David Duvenaud,et al. FFJORD: Free-form Continuous Dynamics for Scalable Reversible Generative Models , 2018, ICLR.
[64] Ullrich Köthe,et al. Analyzing Inverse Problems with Invertible Neural Networks , 2018, ICLR.
[65] Ashutosh Kumar Singh,et al. Survey of robust and imperceptible watermarking , 2019, Multimedia Tools and Applications.
[66] Shiqi Wang,et al. When Deep Fool Meets Deep Prior: Adversarial Attack on Super-Resolution Network , 2018, ACM Multimedia.
[67] Mark R. Pickering,et al. An Overview of Digital Video Watermarking , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[68] Yu Qiao,et al. ESRGAN: Enhanced Super-Resolution Generative Adversarial Networks , 2018, ECCV Workshops.
[69] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[70] Prafulla Dhariwal,et al. Glow: Generative Flow with Invertible 1x1 Convolutions , 2018, NeurIPS.
[71] Yang Yang,et al. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network , 2018, Future Internet.
[72] Bolei Zhou,et al. Places: A 10 Million Image Database for Scene Recognition , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[73] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[74] Belhassen Bayar,et al. Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[75] Yuichi Yoshida,et al. Spectral Normalization for Generative Adversarial Networks , 2018, ICLR.
[76] Thomas S. Huang,et al. Generative Image Inpainting with Contextual Attention , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[77] Andrea Vedaldi,et al. Deep Image Prior , 2017, International Journal of Computer Vision.
[78] Rafia Rahim,et al. End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.
[79] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[80] Hongyi Zhang,et al. mixup: Beyond Empirical Risk Minimization , 2017, ICLR.
[81] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[82] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[83] Eirikur Agustsson,et al. NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[84] Hiroshi Ishikawa,et al. Globally and locally consistent image completion , 2017, ACM Trans. Graph..
[85] Gorthi R. K. Sai Subrahmanyam,et al. Exploring the learning capabilities of convolutional neural networks for robust image watermarking , 2017, Comput. Secur..
[86] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[87] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[88] Raymond Y. K. Lau,et al. Least Squares Generative Adversarial Networks , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[89] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[90] Samy Bengio,et al. Density estimation using Real NVP , 2016, ICLR.
[91] Richard Shin. JPEG-resistant Adversarial Images , 2017 .
[92] Fan Chen,et al. Self-embedding watermarking scheme against JPEG compression with superior imperceptibility , 2017, Multimedia Tools and Applications.
[93] Bin Ma,et al. Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.
[94] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[95] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[96] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[97] Vladlen Koltun,et al. Multi-Scale Context Aggregation by Dilated Convolutions , 2015, ICLR.
[98] Sepp Hochreiter,et al. Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs) , 2015, ICLR.
[99] D. N. Vizireanu,et al. Watermarking-based image authentication robust to JPEG compression , 2015 .
[100] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[101] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[102] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[103] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[104] Yoshua Bengio,et al. NICE: Non-linear Independent Components Estimation , 2014, ICLR.
[105] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[106] Yoshua Bengio,et al. Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation , 2013, ArXiv.
[107] Pawel Korus,et al. Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.
[108] Gerardo Pineda Betancourth,et al. Fragile Watermarking Scheme for Image Authentication , 2012, 2012 5th International Conference on Human System Interactions.
[109] Matthias Kirchner,et al. Spectral methods to determine the exact scaling factor of resampled digital images , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.
[110] Zhenxing Qian,et al. Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.
[111] Sebastiano Battiato,et al. Crop Detection through Blocking Artefacts Analysis , 2011, ICIAP.
[112] Zhenxing Qian,et al. Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.
[113] Zhenxing Qian,et al. Self-embedding watermark with flexible restoration quality , 2011, Multimedia Tools and Applications.
[114] Hagit Hel-Or,et al. Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.
[115] Chih-Chin Lai,et al. Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition , 2010, IEEE Transactions on Instrumentation and Measurement.
[116] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[117] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[118] Nenghai Yu,et al. Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..
[119] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[120] Xinpeng Zhang,et al. Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..
[121] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[122] Xinpeng Zhang,et al. Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.
[123] Min-Jen Tsai,et al. Authentication and recovery for wavelet-based semifragile watermarking , 2008 .
[124] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[125] Ning Liu,et al. Security and Robustness Enhancement for Image Data Hiding , 2007, IEEE Transactions on Multimedia.
[126] Heng-Ming Tai,et al. A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication , 2006, IWDW.
[127] Yulin Wang,et al. Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain , 2006, IEEE Transactions on Image Processing.
[128] Joachim Weickert,et al. Lucas/Kanade Meets Horn/Schunck: Combining Local and Global Optic Flow Methods , 2005, International Journal of Computer Vision.
[129] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[130] H. D. Cheng,et al. A simple and effective histogram equalization approach to image enhancement , 2004, Digit. Signal Process..
[131] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[132] Thomas S. Huang,et al. Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..
[133] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[134] Tieniu Tan,et al. An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..
[135] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[136] L. Rudin,et al. Nonlinear total variation based noise removal algorithms , 1992 .
[137] John D. Austin,et al. Adaptive histogram equalization and its variations , 1987 .
[138] N. Otsu. A threshold selection method from gray level histograms , 1979 .