Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion
暂无分享,去创建一个
Yaohua Yi | Wuyang Shan | Junying Qiu | Aiguo Yin | Y. Yi | Wuyang Shan | Junying Qiu | Aiguo Yin
[1] Jessica J. Fridrich,et al. On detection of median filtering in digital images , 2010, Electronic Imaging.
[2] Shaziya .P.S. Khan,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .
[3] Jiwu Huang,et al. Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach , 2013, IEEE Transactions on Image Processing.
[4] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[5] Belhassen Bayar,et al. Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[6] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[7] Hai-Dong Yuan,et al. Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.
[8] James F. O'Brien,et al. Exposing Photo Manipulation from Shading and Shadows , 2014, ACM Trans. Graph..
[9] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[10] Jiwu Huang,et al. Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.
[11] Wen Gao,et al. Reducing Image Compression Artifacts by Structural Sparse Representation and Quantization Constraint Prior , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Jiwu Huang,et al. Detecting median filtering via two-dimensional AR models of multiple filtered residuals , 2018, Multimedia Tools and Applications.
[13] K. J. Ray Liu,et al. Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.
[14] Deqing Sun,et al. Postprocessing of Low Bit-Rate Block DCT Coded Images Based on a Fields of Experts Prior , 2007, IEEE Transactions on Image Processing.
[15] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[16] Fusheng Yang,et al. A forensic algorithm against median filtering based on coefficients of image blocks in frequency domain , 2018, Multimedia Tools and Applications.
[17] Anderson Rocha,et al. Illuminant-Based Transformed Spaces for Image Forensics , 2016, IEEE Transactions on Information Forensics and Security.
[18] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[19] Jiwu Huang,et al. Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.
[20] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[21] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[22] Z. Jane Wang,et al. Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.
[23] Paolo Bestagini,et al. First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.
[24] Ming Xu,et al. Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network , 2018, IEEE Access.
[25] Seop Hyeong Park,et al. Theory of projection onto the narrow quantization constraint set and its application , 1999, IEEE Trans. Image Process..
[26] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[27] Yao Zhao,et al. Forensic detection of median filtering in digital images , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[28] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[29] Hany Farid,et al. Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[30] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[31] A. Venetsanopoulos,et al. Order statistics in digital image processing , 1992, Proc. IEEE.
[32] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[33] Jie Ren,et al. Image Blocking Artifacts Reduction via Patch Clustering and Low-Rank Minimization , 2013, 2013 Data Compression Conference.
[34] Yao Zhao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.
[35] Jie Ren,et al. Patch-based image deblocking using geodesic distance weighted low-rank approximation , 2014, 2014 IEEE Visual Communications and Image Processing Conference.
[36] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[37] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[38] Mauro Barni,et al. Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.
[39] James F. O'Brien,et al. Exposing photo manipulation with inconsistent shadows , 2013, TOGS.
[40] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[41] Yao Zhao,et al. Robust median filtering detection based on local difference descriptor , 2017, Signal Process. Image Commun..
[42] Yun Q. Shi,et al. Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns , 2014, IEEE Signal Processing Letters.
[43] Mingwei Lin,et al. SOMDNCD: Image Change Detection Based on Self-Organizing Maps and Deep Neural Networks , 2018, IEEE Access.
[44] Wen Gao,et al. CONCOLOR: Constrained Non-Convex Low-Rank Model for Image Deblocking , 2016, IEEE Transactions on Image Processing.
[45] Xiao Jin,et al. AMFNet: An Adversarial Network for Median Filtering Detection , 2018, IEEE Access.
[46] Ronggang Huang,et al. Robust contrast enhancement forensics based on convolutional neural networks , 2019, Signal Process. Image Commun..
[47] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[48] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[49] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[50] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[51] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[52] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[53] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1992 .
[54] Lawrence D. Jackel,et al. Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.
[55] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.