Copy Move Source-Target Disambiguation Through Multi-Branch CNNs
暂无分享,去创建一个
[1] Larry S. Davis,et al. Generate, Segment, and Refine: Towards Generic Manipulation Segmentation , 2018, AAAI.
[2] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[3] Xianfeng Zhao,et al. Copy-move forgery detection based on convolutional kernel network , 2017, Multimedia Tools and Applications.
[4] H. Hotelling. Analysis of a complex of statistical variables into principal components. , 1933 .
[5] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[6] Gurpreet Kaur,et al. DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES , 2020 .
[7] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[8] Patrick Pérez,et al. Poisson image editing , 2003, ACM Trans. Graph..
[9] Krista A. Ehinger,et al. SUN database: Large-scale scene recognition from abbey to zoo , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[10] H.M. Wechsler,et al. Digital image processing, 2nd ed. , 1981, Proceedings of the IEEE.
[11] Yann LeCun,et al. Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[12] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[14] Michio Sugeno,et al. Fuzzy systems theory and its applications , 1991 .
[15] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[16] Gregory R. Koch,et al. Siamese Neural Networks for One-Shot Image Recognition , 2015 .
[17] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[18] Davide Cozzolino,et al. Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[19] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[20] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[21] Weijin Tan,et al. A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques , 2019 .
[22] Sung-Bae Cho,et al. Multiple network fusion using fuzzy logic , 1995, IEEE Trans. Neural Networks.
[23] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[24] Marco Fontani,et al. VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.
[25] Pietro Perona,et al. Microsoft COCO: Common Objects in Context , 2014, ECCV.
[26] Wael Abd-Almageed,et al. Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).
[27] C.-C. Jay Kuo,et al. Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN) , 2017, J. Vis. Commun. Image Represent..
[28] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[29] Wael Abd-Almageed,et al. BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.
[30] Matthias Kirchner,et al. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.
[31] Andrew Owens,et al. Fighting Fake News: Image Splice Detection via Learned Self-Consistency , 2018, ECCV.
[32] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[33] Jiantao Zhou,et al. Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching , 2019, IEEE Transactions on Information Forensics and Security.
[34] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[35] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[36] Matthew C. Stamm,et al. Learned Forensic Source Similarity for Unknown Camera Models , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[37] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[38] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[39] David Vazquez-Padin,et al. Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces , 2011, IWDW.
[40] Jing Dong,et al. CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[41] Davide Cozzolino,et al. Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.