The Video Authentication and Camera Identification Database: A New Database for Video Forensics
暂无分享,去创建一个
Matthew C. Stamm | Chen Chen | Xinwei Zhao | Owen Mayer | James A. Shackleford | Brian C. Hosler | Brian C. Hosler | J. Shackleford | Xinwei Zhao | Chen Chen | O. Mayer
[1] Matthew C. Stamm,et al. Learned Forensic Source Similarity for Unknown Camera Models , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[2] Mauro Barni,et al. Improving the security of image manipulation detection through one-and-a-half-class multiple classification , 2019, Multimedia Tools and Applications.
[3] Min Wu,et al. Exploring compression effects for improved source camera identification using strongly compressed video , 2011, 2011 18th IEEE International Conference on Image Processing.
[4] Matthias Kirchner,et al. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.
[5] Mauro Barni,et al. A video forensic technique for detecting frame deletion and insertion , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] A. Piva. An Overview on Image Forensics , 2013 .
[7] Ahmet Emir Dirik,et al. PRNU-based source device attribution for YouTube videos , 2019, Digit. Investig..
[8] Belhassen Bayar,et al. Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[9] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[10] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[11] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[12] Kenji Kurosawa,et al. CCD fingerprint method-identification of a video camera from videotaped images , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[13] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[14] Mo Chen,et al. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries , 2007, Information Hiding.
[15] Jiwu Huang,et al. Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise , 2012, IEEE Transactions on Information Forensics and Security.
[16] K. J. Ray Liu,et al. Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.
[17] Jessica J. Fridrich,et al. Deep Learning for Detecting Processing History of Images , 2018, Media Watermarking, Security, and Forensics.
[18] Belhassen Bayar,et al. Towards Order of Processing Operations Detection in JPEG-compressed Images with Convolutional Neural Networks , 2018, Media Watermarking, Security, and Forensics.
[19] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Matthew C. Stamm,et al. Accurate and Efficient Image Forgery Detection Using Lateral Chromatic Aberration , 2018, IEEE Transactions on Information Forensics and Security.
[21] Matthew C. Stamm,et al. Camera model identification framework using an ensemble of demosaicing features , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[22] Amit K. Roy-Chowdhury,et al. Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries , 2019, IEEE Transactions on Image Processing.
[23] Mauro Barni,et al. Cnn-Based Detection of Generic Contrast Adjustment with Jpeg Post-Processing , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[24] Luisa Verdoliva,et al. A study of co-occurrence based local features for camera model identification , 2016, Multimedia Tools and Applications.
[25] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[26] Paolo Bestagini,et al. Video codec identification , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] A. De Rosa,et al. Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[28] Marco Fontani,et al. VISION: a video and image dataset for source identification , 2017, EURASIP Journal on Information Security.
[29] Min Wu,et al. Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.
[30] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[31] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[32] A. Piva,et al. overview paper An overview on video forensics , 2012 .
[33] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[34] Giulia Boato,et al. Tracking Multiple Image Sharing on Social Networks , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[35] Matthew C. Stamm,et al. Computationally efficient demosaicing filter estimation for forensic camera model identification , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[36] Xinghao Ding,et al. Camera Identification Based on Domain Knowledge-Driven Deep Multi-Task Learning , 2019, IEEE Access.
[37] Chang-Tsun Li. Source camera identification using enhanced sensor pattern noise , 2010, IEEE Trans. Inf. Forensics Secur..
[38] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[39] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[40] Marc Chaumont,et al. Camera model identification with the use of deep convolutional neural networks , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[41] Belhassen Bayar,et al. A Video Camera Model Identification System Using Deep Learning and Fusion , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[42] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[43] Jonathan G. Fiscus,et al. MFC Datasets: Large-Scale Benchmark Datasets for Media Forensic Challenge Evaluation , 2019, 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW).
[44] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[45] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[46] K. J. Ray Liu,et al. Temporal Forensics and Anti-Forensics for Motion Compensated Video , 2012, IEEE Transactions on Information Forensics and Security.
[47] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[48] Belhassen Bayar,et al. Design Principles of Convolutional Neural Networks for Multimedia Forensics , 2017, Media Watermarking, Security, and Forensics.
[49] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[50] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[51] Paolo Bestagini,et al. First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.
[52] Matthew Brand,et al. Understanding manipulation in video , 1996, Proceedings of the Second International Conference on Automatic Face and Gesture Recognition.
[53] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[54] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.