Mitigate DoS and DDoS Attack in Ad Hoc Networks
暂无分享,去创建一个
Hefei Ling | Jin Liu | Fuhao Zou | Zhengding Lu | Wei Qi Yan
[1] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[2] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[3] Min Wu,et al. Noise Features for Image Tampering Detection and Steganalysis , 2007, 2007 IEEE International Conference on Image Processing.
[4] Nasir D. Memon,et al. Tamper Detection Based on Regularity of Wavelet Transform Coefficients , 2007, 2007 IEEE International Conference on Image Processing.
[5] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[6] Chih-Jen Lin,et al. A tutorial on?-support vector machines , 2005 .
[7] Shree K. Nayar,et al. Multiresolution histograms and their use for recognition , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[9] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[10] Shree K. Nayar,et al. Spatial information in multiresolution histograms , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[11] Zhen Zhang,et al. An Effective Algorithm of Image Splicing Detection , 2008, 2008 International Conference on Computer Science and Software Engineering.
[12] Min Wu,et al. Image Tampering Identification using Blind Deconvolution , 2006, 2006 International Conference on Image Processing.
[13] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[14] Andrew C. Gallagher. Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).
[15] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[16] Shih-Fu Chang,et al. Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.
[17] Siwei Lyu,et al. How realistic is photorealistic , 2005 .
[18] Wei Lu,et al. Digital image forensics using statistical features and neural network classifier , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[19] Matthias Kirchner,et al. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.
[20] Shih-Fu Chang,et al. Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[21] Bernhard Schölkopf,et al. A tutorial on v-support vector machines , 2005 .
[22] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[23] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[24] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[25] Soo-Chang Pei,et al. Detecting digital tampering by blur estimation , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).
[26] S. Prasad,et al. On Resampling Detection and its Application to Detect Image Tampering , 2006, 2006 IEEE International Conference on Multimedia and Expo.