Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries
暂无分享,去创建一个
Amit K. Roy-Chowdhury | Jawadul H. Bappy | Cody Simons | Lakshmanan Nataraj | B. S. Manjunath | B. S. Manjunath | A. Roy-Chowdhury | Cody Simons | L. Nataraj
[1] D. Voorhies. SPACE-FILLING CURVES AND A MEASURE OF COHERENCE , 1991 .
[2] Christoph Schierz,et al. Algorithm 781: generating Hilbert's space-filling curve by recursion , 1998, TOMS.
[3] Christos Faloutsos,et al. Analysis of the Clustering Properties of the Hilbert Space-Filling Curve , 2001, IEEE Trans. Knowl. Data Eng..
[4] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[5] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[6] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[7] Luo Wei,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .
[8] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[9] Qiong Wu,et al. Detection of digital doctoring in exemplar-based inpainted images , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[10] Nenghai Yu,et al. Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..
[11] Anindya Sarkar,et al. Adding Gaussian noise to “denoise” JPEG for detecting image resizing , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[12] Anindya Sarkar,et al. Detection of seam carving and localization of seam insertions in digital images , 2009, MM&Sec '09.
[13] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[14] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[15] Babak Mahdian,et al. Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..
[16] Gaurav Sharma,et al. Detecting content adaptive scaling of images for forensic applications , 2010, Electronic Imaging.
[17] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[18] Anindya Sarkar,et al. Improving re-sampling detection by adding noise , 2010, Electronic Imaging.
[19] Geoffrey E. Hinton,et al. Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.
[20] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[21] Alessandro Piva,et al. Improved DCT coefficient analysis for forgery localization in JPEG images , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[23] Ingemar J. Cox,et al. An energy-based method for the forensic detection of Re-sampled images , 2011, 2011 IEEE International Conference on Multimedia and Expo.
[24] Tiegang Gao,et al. A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.
[25] Alessandro Piva,et al. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[26] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[27] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[28] Pravin Kakar,et al. Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.
[29] Ingemar J. Cox,et al. Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.
[30] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[31] Muhammad Ghulam,et al. Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..
[32] Osamah M. Al-Qershi,et al. Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.
[33] Muhammad Ghulam,et al. Accurate and robust localization of duplicated region in copy–move image forgery , 2014, Machine Vision and Applications.
[34] I-Cheng Chang,et al. A forgery detection algorithm for exemplar-based inpainting images using multi-region relation , 2013, Image Vis. Comput..
[35] Sonja Grgic,et al. CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.
[36] Muhammad Ghulam,et al. Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.
[37] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[38] Heung-Kyu Lee,et al. Estimation of linear transformation by analyzing the periodicity of interpolation , 2014, Pattern Recognit. Lett..
[39] Ronan Collobert,et al. Recurrent Convolutional Neural Networks for Scene Labeling , 2014, ICML.
[40] Qingzhong Liu,et al. Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images , 2014, ACM Trans. Intell. Syst. Technol..
[41] Christine Guillemot,et al. Image Inpainting : Overview and Recent Advances , 2014, IEEE Signal Processing Magazine.
[42] Jing Dong,et al. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.
[43] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[44] Augusto Sarti,et al. Unsupervised feature learning for bootleg detection using deep learning architectures , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[45] Davide Cozzolino,et al. A feature-based approach for image tampering detection and localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[46] Bolei Zhou,et al. Learning Deep Features for Scene Recognition using Places Database , 2014, NIPS.
[47] Damon M. Chandler,et al. Algorithm for JPEG artifact reduction via local edge regeneration , 2014, J. Electronic Imaging.
[48] Mohammad Farukh Hashmi,et al. Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform , 2014 .
[49] S. P. Ghrera,et al. Pixel-Based Image Forgery Detection: A Review , 2014 .
[50] Z. Jane Wang,et al. Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.
[51] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[52] Jin Hyung Kim,et al. Efficient Learning of Image Super-Resolution and Compression Artifact Removal with Semi-Local Gaussian Processes , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[53] V. T. Manu,et al. Visual artifacts based image splicing detection in uncompressed images , 2015, 2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS).
[54] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[55] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[56] Kai Wang,et al. General-purpose image forensics using patch likelihood under image statistical models , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[57] Ross B. Girshick,et al. Fast R-CNN , 2015, 1504.08083.
[58] Zaoshan Liang,et al. An efficient forgery detection algorithm for object removal by exemplar-based image inpainting , 2015, J. Vis. Commun. Image Represent..
[59] Trevor Darrell,et al. Fully convolutional networks for semantic segmentation , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[60] Marcus Liwicki,et al. Scene labeling with LSTM recurrent neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[61] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[62] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[63] R. M. Joseph,et al. Literature Survey on Image Manipulation Detection , 2015 .
[64] Vibhav Vineet,et al. Conditional Random Fields as Recurrent Neural Networks , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[65] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[66] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[67] Ronan Collobert,et al. Learning to Refine Object Segments , 2016, ECCV.
[68] Ying Zhang,et al. Image Region Forgery Detection: A Deep Learning Approach , 2016, SG-CRC.
[69] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[70] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[71] Stefan Winkler,et al. COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[72] Yoshua Bengio,et al. ReSeg: A Recurrent Neural Network-Based Model for Semantic Segmentation , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[73] Richa Singh,et al. Detecting Facial Retouching Using Supervised Deep Learning , 2016, IEEE Transactions on Information Forensics and Security.
[74] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[75] Roberto Cipolla,et al. Bayesian SegNet: Model Uncertainty in Deep Convolutional Encoder-Decoder Architectures for Scene Understanding , 2015, BMVC.
[76] B. S. Manjunath,et al. Exploiting Spatial Structure for Localizing Manipulated Image Regions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[77] Belhassen Bayar,et al. On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[78] Roberto Cipolla,et al. SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[79] Junichi Yamagishi,et al. Distinguishing computer graphics from natural images using convolution neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[80] B. S. Manjunath,et al. Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[81] Belhassen Bayar,et al. Design Principles of Convolutional Neural Networks for Multimedia Forensics , 2017, Media Watermarking, Security, and Forensics.
[82] Jiwu Huang,et al. Image Forgery Localization via Integrating Tampering Possibility Maps , 2017, IEEE Transactions on Information Forensics and Security.
[83] B. S. Manjunath,et al. Boosting Image Forgery Detection using Resampling Features and Copy-move analysis , 2018, Media Watermarking, Security, and Forensics.
[84] Xianfeng Zhao,et al. Image Forgery Localization based on Multi-Scale Convolutional Neural Networks , 2018, IH&MMSec.
[85] Junichi Yamagishi,et al. Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images , 2018, ARES.
[86] Larry S. Davis,et al. Learning Rich Features for Image Manipulation Detection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[87] Iasonas Kokkinos,et al. DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.