• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    公众号

yannadani/image_tampering_detection_references: A list of papers, codes and othe ...

原作者: [db:作者] 来自: 网络 收藏 邀请

开源软件名称(OpenSource Name):

yannadani/image_tampering_detection_references

开源软件地址(OpenSource Url):

https://github.com/yannadani/image_tampering_detection_references

开源编程语言(OpenSource Language):


开源软件介绍(OpenSource Introduction):

Image Tampering Detection and Localization

A list of papers, codes and other interesting collections pertaining to image tampering detection and localization.

Classical Filter Based Methods

  1. Wang, Wei, Jing Dong, and Tieniu Tan. "Image tampering detection based on stationary distribution of Markov chain." In ICIP, 2010. pdf
  2. Hsu, Yu-Feng, and Shih-Fu Chang. "Statistical fusion of multiple cues for image tampering detection." 42nd Asilomar Conference on Signals, Systems and Computers, 2008. pdf
  3. Tong, Xiaojun, et al. "A novel chaos-based fragile watermarking for image tampering detection and self-recovery." Signal Processing: Image Communication 28.3 (2013). pdf
  4. Goh, Jonathan, and Vrizlynn LL Thing. "A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection." International Journal of Electronic Security and Digital Forensics 7.1 (2015). pdf
  5. Dong, Jing, Wei Wang, and Tieniu Tan. "Casia image tampering detection evaluation database." IEEE China Summit & International Conference on Signal and Information Processing, 2013. pdf
  6. Fan, Jiayuan, Tao Chen, and Jiuwen Cao. "Image tampering detection using noise histogram features." IEEE International Conference on Digital Signal Processing, 2015. pdf
  7. Gaborini, Lorenzo, et al. "Multi-clue image tampering localization." IEEE International Workshop on Information Forensics and Security, 2014. pdf
  8. Birajdar, Gajanan K., and Vijay H. Mankar. "Digital image forgery detection using passive techniques: A survey." Digital Investigation 10.3, 2013. pdf
  9. Muhammad, Ghulam, et al. "Image forgery detection using steerable pyramid transform and local binary pattern." Machine Vision and Applications 25.4, 2014. pdf
  10. Pun, Chi-Man, Xiao-Chen Yuan, and Xiu-Li Bi. "Image forgery detection using adaptive oversegmentation and feature point matching." IEEE Transactions on Information Forensics and Security, 2015. pdf
  11. Cozzolino, Davide, Diego Gragnaniello, and Luisa Verdoliva. "Image forgery detection through residual-based local descriptors and block-matching." IEEE International Conference on Image Processing (ICIP), 2014. pdf
  12. Jaberi, Maryam, et al. "Accurate and robust localization of duplicated region in copy–move image forgery." Machine vision and applications, 2014. pdf
  13. Qazi, Tanzeela, et al. "Survey on blind image forgery detection." IET Image Processing, 2013. pdf
  14. Lynch, Gavin, Frank Y. Shih, and Hong-Yuan Mark Liao. "An efficient expanding block algorithm for image copy-move forgery detection." Information Sciences, 2013. pdf
  15. Zhao, Jie, and Jichang Guo. "Passive forensics for copy-move image forgery using a method based on DCT and SVD." Forensic science international, 2013. pdf
  16. Kashyap, Abhishek, et al. "An Evaluation of Digital Image Forgery Detection Approaches." arXiv preprint arXiv:1703.09968, 2017. pdf
  17. Li, Haodong, et al. "Image Forgery Localization via Integrating Tampering Possibility Maps." IEEE Transactions on Information Forensics and Security, 2017. pdf
  18. Hashmi, Mohammad Farukh, Vijay Anand, and Avinash G. Keskar. "A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms." International Conference on Computer and Communication Technology (ICCCT), 2014. pdf
  19. Farid, Hany. "Image forgery detection." IEEE Signal processing magazine, 2009. pdf
  20. Bianchi, Tiziano, and Alessandro Piva. "Image forgery localization via block-grained analysis of JPEG artifacts." IEEE Transactions on Information Forensics and Security, 2012. pdf
  21. Muhammad, Ghulam, Muhammad Hussain, and George Bebis. "Passive copy move image forgery detection using undecimated dyadic wavelet transform." Digital Investigation, 2012. pdf
  22. Chen, Can, Scott McCloskey, and Jingyi Yu. "Image Splicing Detection via Camera Response Function Analysis." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2017. pdf

Deep Learning based Methods

  1. Chen, Jiansheng, et al. "Median filtering forensics based on convolutional neural networks." IEEE Signal Processing Letters, 2015. pdf
  2. Bayar, Belhassen, and Matthew C. Stamm. "A deep learning approach to universal image manipulation detection using a new convolutional layer." Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016. pdf
  3. Liu, Yaqi, et al. "Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks." arXiv preprint arXiv:1706.07842 (2017). pdf
  4. Rao, Yuan, and Jiangqun Ni. "A deep learning approach to detection of splicing and copy-move forgeries in images." IEEE International Workshop on Information Forensics and Security (WIFS), 2016. pdf
  5. Bayar, Belhassen, and Matthew C. Stamm. "On the robustness of constrained convolutional neural networks to jpeg post-compression for image resampling detection." IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017. pdf
  6. Zhou, Jianghong, Jiangqun Ni, and Yuan Rao. "Block-Based Convolutional Neural Network for Image Forgery Detection." International Workshop on Digital Watermarking. Springer, 2017.
  7. Choi, Hak-Yeol, et al. "Detecting composite image manipulation based on deep neural networks." 2017 International Conference on Systems, Signals and Image Processing (IWSSIP), 2017. pdf
  8. Bondi, Luca, et al. "Tampering Detection and Localization through Clustering of Camera-Based CNN Features." 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017. pdf
  9. Bappy, Jawadul H., et al. "Exploiting Spatial Structure for Localizing Manipulated Image Regions." Proceedings of the IEEE International Conference on Computer Vision (ICCV). 2017. pdf
  10. Bunk, Jason, et al. "Detection and Localization of Image Forgeries using Resampling Features and Deep Learning." IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017. pdf
  11. Wang, Qing, and Rong Zhang. "Double JPEG compression forensics based on a convolutional neural network." EURASIP Journal on Information Security, 2016. pdf
  12. Salloum, Ronald, Yuzhuo Ren, and C-C. Jay Kuo. "Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)." arXiv preprint arXiv:1709.02016 (2017). pdf
  13. Rota, Paolo, et al. "Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis?." 23rd International Conference on Pattern Recognition (ICPR), 2016. pdf
  14. Böhme, Rainer, and Matthias Kirchner. "Counter-forensics: Attacking image forensics." Digital Image Forensics. Springer New York, 2013. pdf
  15. Raghavendra, R., et al. "Transferable Deep-CNN features for detecting digital and print-scanned morphed face images." 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017. pdf
  16. Bondi, Luca, et al. "Tampering Detection and Localization through Clustering of Camera-Based CNN Features." IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017. pdf



鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap