Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems
暂无分享,去创建一个
[1] Hany Farid,et al. Photo Fakery and Forensics , 2009, Adv. Comput..
[2] Gerald Sommer,et al. Phase Based Image Reconstruction in the Monogenic Scale Space , 2004, DAGM-Symposium.
[3] Dani Lischinski,et al. Gradient Domain High Dynamic Range Compression , 2023 .
[4] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[5] Roberto Caldelli,et al. A DFT-Based Analysis to Discern Between Camera and Scanned Images , 2010, Int. J. Digit. Crime Forensics.
[6] Charlie C. L. Wang,et al. Gradient based image completion by solving the Poisson equation , 2007, Comput. Graph..
[7] William H. Press,et al. The Art of Scientific Computing Second Edition , 1998 .
[8] Patrick Pérez,et al. Poisson image editing , 2003, ACM Trans. Graph..
[9] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[10] Jian Sun,et al. Poisson matting , 2004, ACM Trans. Graph..
[11] Siwei Lyu,et al. How realistic is photorealistic , 2005 .
[12] Ramesh Raskar,et al. Removing photography artifacts using gradient projection and flash-exposure sampling , 2005, SIGGRAPH 2005.
[13] Jiaya Jia,et al. Poisson matting , 2004, SIGGRAPH 2004.
[14] David Salesin,et al. Interactive digital photomontage , 2004, SIGGRAPH 2004.
[15] H. Farid. A Survey of Image Forgery Detection , 2008 .
[16] Patrick Pérez,et al. Reconstructing an image from its local descriptors , 2011, CVPR 2011.
[17] F. A. Seiler,et al. Numerical Recipes in C: The Art of Scientific Computing , 1989 .
[18] Jan P. Allebach,et al. Forensic techniques for classifying scanner, computer generated and digital camera images , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[19] Nikos Papamarkos,et al. Exact image reconstruction from a limited number of projections , 2008, J. Vis. Commun. Image Represent..
[20] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[21] S. Leng,et al. Exact fan-beam image reconstruction algorithm for truncated projection data acquired from an asymmetric half-size detector , 2005, Physics in medicine and biology.
[22] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[23] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[24] Ramesh Raskar,et al. Image fusion for context enhancement and video surrealism , 2004, NPAR '04.
[25] Ramesh Raskar,et al. Non-photorealistic camera: depth edge detection and stylized rendering using multi-flash imaging , 2004, SIGGRAPH 2004.
[26] Luc Vincent,et al. Morphological grayscale reconstruction in image analysis: applications and efficient algorithms , 1993, IEEE Trans. Image Process..
[27] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.