Automatic source scanner identification using 1D convolutional neural network
暂无分享,去创建一个
Riadh Abdelfattah | Gouenou Coatrieux | Chaima Ben Rabah | G. Coatrieux | R. Abdelfattah | Chaima Ben Rabah
[1] Jianfeng Zhao,et al. Speech emotion recognition using deep 1D & 2D CNN LSTM networks , 2019, Biomed. Signal Process. Control..
[2] Mauro Barni,et al. Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[3] Gouenou Coatrieux,et al. Boosting up Source Scanner Identification Using Wavelets and Convolutional Neural Networks , 2020, Traitement du Signal.
[4] Jong-Uk Hou,et al. Learning deep features for source color laser printer identification based on cascaded learning , 2017, Neurocomputing.
[5] S. Mallat. A wavelet tour of signal processing , 1998 .
[6] Jean-Christophe Burie,et al. Watermarking for Security Issue of Handwritten Documents with Fully Convolutional Networks , 2018, 2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR).
[7] Yuehui Chen,et al. Camera Model Identification Based on Residual Extraction Module and SqueezeNet , 2019, ICBDT.
[8] Onur Avci,et al. 1-D Convolutional Neural Networks for Signal Processing Applications , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[9] Laith Alzubaidi,et al. Digital Color Documents Authentication Using QR Code Based on Digital Watermarking , 2018, ISDA.
[10] Cik Feresa Mohd Foozy,et al. Source Camera Identification for Online Social Network Images Using Texture Feature , 2020, SCDM.
[11] Edward J. Delp,et al. Scanner Identification Using Feature-Based Processing and Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[12] Gerald C. Holst,et al. CCD arrays, cameras, and displays , 1996 .
[13] Ayu Purwarianti,et al. Experiments on Character and Word Level Features for Text Classification Using Deep Neural Network , 2018, 2018 Third International Conference on Informatics and Computing (ICIC).
[14] Yuting Su,et al. Smooth filtering identification based on convolutional neural networks , 2019, Multimedia Tools and Applications.
[15] Xinghao Ding,et al. Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning , 2019, IEEE Access.
[16] Venkata Udaya Sameer,et al. Deep siamese network for limited labels classification in source camera identification , 2020, Multimedia Tools and Applications.
[17] Prabin Kumar Bora,et al. Detection of Image Manipulations Using Siamese Convolutional Neural Networks , 2019, PReMI.
[18] M. Krasnyanskiy. THE ALGORITHM OF DOCUMENT ROUTING IN THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM USING MACHINE LEARNING METHODS , 2018 .
[19] Ali Dehghantanha,et al. A Survey on Digital Forensics Trends , 2014 .
[20] Nitin Khanna,et al. Source Classification Using Document Images from Smartphones and Flatbed Scanners , 2017, NCVPRIPG.
[21] Anirban Sarkar,et al. Source camera identification model: Classifier learning, role of learning curves and their interpretation , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[22] J. E. Fowler,et al. The redundant discrete wavelet transform and additive noise , 2005, IEEE Signal Processing Letters.
[23] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[24] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[25] Modesto Castrillón Santana,et al. Deep learning for source camera identification on mobile devices , 2017, Pattern Recognit. Lett..
[26] Gouenou Coatrieux,et al. Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains , 2020, IEEE Transactions on Information Forensics and Security.
[27] Xuchong Liu,et al. Real-time detecting one specific tampering operation in multiple operator chains , 2019, Journal of Real-Time Image Processing.
[28] Gouenou Coatrieux,et al. Semi-Blind Source Scanner Identification , 2019, 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC).
[29] Jan P. Allebach,et al. Scanner identification using sensor pattern noise , 2007, Electronic Imaging.
[30] Yichuan Tang,et al. Deep Learning using Linear Support Vector Machines , 2013, 1306.0239.
[31] Xin Liao,et al. Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform , 2017, Multimedia Tools and Applications.
[32] Manpreet Singh,et al. Digital signature verification scheme for image authentication , 2015, 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS).
[33] Shigeru Sugawara. Identification of scanner models by comparison of scanned hologram images. , 2014, Forensic science international.
[34] K. A. Taher,et al. Camera Model Identification using Deep CNN and Transfer Learning Approach , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).
[35] Yoshua Bengio,et al. Understanding intermediate layers using linear classifier probes , 2016, ICLR.
[36] Onur Avci,et al. 1D Convolutional Neural Networks and Applications: A Survey , 2019, Mechanical Systems and Signal Processing.
[37] Yulan Li,et al. Speech Emotion Recognition Using 1D CNN with No Attention , 2019, 2019 23rd International Computer Science and Engineering Conference (ICSEC).
[38] Min-Jen Tsai,et al. Deep learning for printed document source identification , 2019, Signal Process. Image Commun..
[39] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[40] R. A. Leibler,et al. On Information and Sufficiency , 1951 .
[41] Ayodeji Olalekan Salau,et al. Accent Classification of the Three Major Nigerian Indigenous Languages Using 1D CNN LSTM Network Model , 2020 .
[42] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[43] Thomas Gloe,et al. Forensics for flatbed scanners , 2007, Electronic Imaging.