Deep Matching and Validation Network: An End-to-End Solution to Constrained Image Splicing Localization and Detection
暂无分享,去创建一个
[1] Anderson Rocha,et al. Large-Scale Image Phylogeny: Tracing Image Ancestral Relationships , 2013, IEEE MultiMedia.
[2] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[3] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[4] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Krista A. Ehinger,et al. SUN database: Large-scale scene recognition from abbey to zoo , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[6] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[7] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[8] Qingzhong Liu,et al. Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images , 2014, ACM Trans. Intell. Syst. Technol..
[9] Davide Cozzolino,et al. Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection , 2017, IH&MMSec.
[10] Jiwu Huang,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[11] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[12] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[13] Ye Zhu,et al. Copy-move forgery detection based on scaled ORB , 2015, Multimedia Tools and Applications.
[14] Alexei A. Efros,et al. Learning a Discriminative Model for the Perception of Realism in Composite Images , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[15] Zulfiqar Habib,et al. Copy-move and splicing image forgery detection and localization techniques: a review , 2017 .
[16] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[17] Jiwu Huang,et al. Image Forgery Localization via Integrating Tampering Possibility Maps , 2017, IEEE Transactions on Information Forensics and Security.
[18] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[19] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[20] Shih-Fu Chang,et al. Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[21] Tieniu Tan,et al. Image tampering detection based on stationary distribution of Markov chain , 2010, 2010 IEEE International Conference on Image Processing.
[22] Ainuddin Wahid Abdul Wahab,et al. Copy-move forgery detection: Survey, challenges and future directions , 2016, J. Netw. Comput. Appl..
[23] Yiannis Kompatsiaris,et al. Web and Social Media Image Forensics for News Professionals , 2021, SMN@ICWSM.
[24] Jiwu Huang,et al. Detect Digital Image Splicing with Visual Cues , 2009, Information Hiding.
[25] Anderson Rocha,et al. Image Phylogeny by Minimal Spanning Trees , 2012, IEEE Transactions on Information Forensics and Security.
[26] Xinpeng Zhang,et al. Image Splicing Detection Using Color Edge Inconsistency , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[27] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[28] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[29] Xing Zhang,et al. Exposing image forgery with blind noise estimation , 2011, MM&Sec '11.
[30] Ying Zhang,et al. Image Region Forgery Detection: A Deep Learning Approach , 2016, SG-CRC.
[31] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[32] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[33] Ming Li,et al. Image splicing detection based on Markov features in QDCT domain , 2015, Neurocomputing.
[34] Roberto Caldelli,et al. Splicing forgeries localization through the use of first digit features , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[35] Davide Cozzolino,et al. Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[36] Jing Dong,et al. Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[37] Mauro Barni,et al. A universal technique to hide traces of histogram-based image manipulations , 2012, MM&Sec '12.
[38] Jianhua Li,et al. Optimal chroma-like channel design for passive color image splicing detection , 2012, EURASIP J. Adv. Signal Process..
[39] Mauro Barni,et al. Multiple Parenting Phylogeny Relationships in Digital Images , 2016, IEEE Transactions on Information Forensics and Security.
[40] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[41] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[42] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[43] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.