A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection
暂无分享,去创建一个
Luisa Verdoliva | Giovanni Chierchia | Giovanni Poggi | Carlo Sansone | G. Poggi | L. Verdoliva | G. Chierchia | Carlo Sansone
[1] Antonin Chambolle,et al. A First-Order Primal-Dual Algorithm for Convex Problems with Applications to Imaging , 2011, Journal of Mathematical Imaging and Vision.
[2] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[3] Dianji Lv,et al. An Overview of Digital Watermarking in Image Forensics , 2011, 2011 Fourth International Joint Conference on Computational Sciences and Optimization.
[4] Nelly Pustelnik,et al. Epigraphical Projection and Proximal Tools for Solving Constrained Convex Optimization Problems: Part I , 2012, ArXiv.
[5] Chuheng Tang,et al. Overview of digital watermarking , 2014 .
[6] Davide Cozzolino,et al. Guided filtering for PRNU-based localization of small-size image forgeries , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[7] Heung-Kyu Lee,et al. Source camera identification from significant noise residual regions , 2010, 2010 IEEE International Conference on Image Processing.
[8] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[9] L. Verdoliva,et al. PRNU-based detection of small-size image forgeries , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[10] Xinpeng Zhang,et al. Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.
[11] Chang-Tsun Li,et al. Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Luisa Verdoliva,et al. PRNU-based forgery detection with regularity constraints and global optimization , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[13] Olga Veksler,et al. Fast approximate energy minimization via graph cuts , 2001, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[14] Micah K. Johnson,et al. Metric Measurements on a Plane from a Single Image , 2006 .
[15] Miroslav Goljan,et al. Digital Camera Identification from Images - Estimating False Acceptance Probability , 2008, IWDW.
[16] Mila Nikolova,et al. Algorithms for Finding Global Minimizers of Image Segmentation and Denoising Models , 2006, SIAM J. Appl. Math..
[17] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[18] Hagit Hel-Or,et al. Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.
[19] Chang-Tsun Li,et al. Fast camera fingerprint search algorithm for source camera identification , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.
[20] Giuseppe Scarpa,et al. A tree-structured Markov random field model for Bayesian image segmentation , 2003, IEEE Trans. Image Process..
[21] Koduvayur P. Subbalakshmi,et al. An Overview of Digital Watermarking , 2006 .
[22] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[23] Daniel Cremers,et al. Global Solutions of Variational Models with Convex Regularization , 2010, SIAM J. Imaging Sci..
[24] Jessica J. Fridrich,et al. Managing a large database of camera fingerprints , 2010, Electronic Imaging.
[25] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[26] Alessandro Foi,et al. Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering , 2007, IEEE Transactions on Image Processing.
[27] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[28] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[29] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[30] Donald Geman,et al. Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images , 1984, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[31] Luisa Verdoliva,et al. On the influence of denoising in PRNU based forgery detection , 2010, MiFor '10.
[32] Glenn Healey,et al. Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[33] Xiaochun Cao,et al. Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.
[34] Matthias Kirchner,et al. Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study , 2012, MM&Sec '12.
[35] Yu Chen. A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS , 2012 .
[36] Giovanni Maria Farinella,et al. Robust Image Alignment for Tampering Detection , 2012, IEEE Transactions on Information Forensics and Security.
[37] Nasir D. Memon,et al. Efficient Sensor Fingerprint Matching Through Fingerprint Binarization , 2012, IEEE Transactions on Information Forensics and Security.
[38] J. Besag. On the Statistical Analysis of Dirty Pictures , 1986 .
[39] Nelly Pustelnik,et al. Epigraphical splitting for solving constrained convex formulations of inverse problems with proximal tools , 2012, 1210.5844.
[40] Laurent Condat,et al. A Primal–Dual Splitting Method for Convex Optimization Involving Lipschitzian, Proximable and Linear Composite Terms , 2012, Journal of Optimization Theory and Applications.
[41] Patrick L. Combettes,et al. Proximal Splitting Methods in Signal Processing , 2009, Fixed-Point Algorithms for Inverse Problems in Science and Engineering.
[42] Alex ChiChung Kot,et al. Accurate Detection of Demosaicing Regularity for Digital Image Forensics , 2009, IEEE Transactions on Information Forensics and Security.
[43] Alessandro Piva,et al. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[44] W. Freeman,et al. Generalized Belief Propagation , 2000, NIPS.
[45] Luisa Verdoliva,et al. A Nonlocal SAR Image Denoising Algorithm Based on LLMMSE Wavelet Shrinkage , 2012, IEEE Transactions on Geoscience and Remote Sensing.
[46] Chang-Tsun Li. Source camera identification using enhanced sensor pattern noise , 2010, IEEE Trans. Inf. Forensics Secur..
[47] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[48] Chang-Tsun Li,et al. Empirical investigation into the correlation between vignetting effect and the quality of sensor pattern noise , 2012 .
[49] Jean-Michel Morel,et al. A Review of Image Denoising Algorithms, with a New One , 2005, Multiscale Model. Simul..
[50] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[51] Jiwu Huang,et al. Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise , 2012, IEEE Transactions on Information Forensics and Security.
[52] Hongbin Zhang,et al. Exposing Digital Image Forgeries by Using Canonical Correlation Analysis , 2010, 2010 20th International Conference on Pattern Recognition.
[53] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[54] Jessica J. Fridrich,et al. Sensor-fingerprint based identification of images corrected for lens distortion , 2012, Other Conferences.
[55] Pravin Kakar,et al. Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.
[56] P. L. Combettes,et al. Primal-Dual Splitting Algorithm for Solving Inclusions with Mixtures of Composite, Lipschitzian, and Parallel-Sum Type Monotone Operators , 2011, Set-Valued and Variational Analysis.
[57] Christian Riess,et al. Automated Image Forgery Detection through Classification of JPEG Ghosts , 2012, DAGM/OAGM Symposium.
[58] Xiaochun Cao,et al. Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map , 2012, IEEE Transactions on Information Forensics and Security.
[59] Bang Công Vu,et al. A splitting algorithm for dual monotone inclusions involving cocoercive operators , 2011, Advances in Computational Mathematics.
[60] Davide Cozzolino,et al. A novel framework for image forgery localization , 2013, ArXiv.
[61] Stan Z. Li,et al. Markov Random Field Modeling in Image Analysis , 2001, Computer Science Workbench.
[62] Jessica Fridrich,et al. Sensor Defects in Digital Image Forensic , 2013 .
[63] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.