Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 43-50.doi: 10.11896/jsjkx.200800020
• Image Processing & Multimedia Technology • Previous Articles Next Articles
TIAN Yang1, BI Xiu-li1, XIAO Bin1, LI Wei-sheng1, MA Jian-feng2
CLC Number:
[1] AVIDAN S,SHAMIR A.Seam carving for content-aware image resizing [C]//ACM SIGGRAPH.2007:10-es. [2] WATTANACHOTE K,SHIH T K,CHANG W L,et al.Tamper detection of JPEG image due to seam modifications [J].IEEE Transactions on Information Forensics,2015(10):2477-2491. [3] SARKAR A,NATARAJ L,MANJUNATH B S.Detection ofseam carving and localization of seam insertions in digital images[C]//Proceedings of the Proceedings of the 11th ACM Workshop on Multimedia and Security.2009. [4] GUO J C,WANG Q Z,ZHAO J,et al.A Method of Seam Carving Forensics Based on LBP and Markov Features [J].Journal of University ofElectronic Science,2018,47:481-485. [5] ZHANG D,YANG G,LI F,et al.Detecting seam carved images using uniform local binary patterns [J].Multimedia Tools and Applications,2020,79(13):8415-8430. [6] WEI J D,LIN Y J,WU Y J.A patch analysis method to detect seam carved images [J].Pattern Recognition Letters,2014,36:100-106. [7] SCHAEFER G,STICH M.UCID:An uncompressed color image database[C]//Proceedings of the Storage and RetrievalMe-thods and Applications for Multimedia 2004.International Society for Optics and Photonics,2003. [8] RYU S J,LEE H Y,LEE H K,et al.Detecting trace of seam carving for forensic analysis [J].Ice Transactions on Information and Systems,2014,97:1304-1311. [9] YIN T,YANG G,LI L,et al.Detecting seam carving basedimage resizing using local binary patterns [J].Computer and Security.2015,55:130-141. [10] LU W,WU M.Seam carving estimation using forensic hash[C]//Proceedings of the Proceedings of the thirteenth ACM multimedia workshop on Multimedia and Security.2011. [11] LIU Q.An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics [J].Pattern Recognition,2017,6:35-46. [12] LIU Q.Exposing seam carving forgery under recompression attacks by hybrid large feature mining[C]//Proceedings of the 2016 23rd International Conference on Pattern Recognition (ICPR).2016. [13] LIU Q,CHEN Z J.Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detectionin JPEG images [C]//ACM Transactions on Intelligent Systems and Technology (TIST).2014:1-30. [14] LU M,NIU S Z.Detection of Image Seam Carving Using a Novel Pattern[J].Computational Intelligence and Neuroscience,2019,2019:9492358. [15] MUKUNDAN R,ONG S,LEE P A.Image analysis by Tche-bichef moments [J].IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society,2001,10:1357-1364. [16] NAM S H,AHN W,YU J,et al.Deep Convolutional Neural Network for Identifying Seam-Carving Forgery [J].IEEE Transactions on Circuits and Systems for Video Technology,2020(99):1-1. [17] WEI J D,CHENG H J,CHANG C W.Hopfield network-based approach to detect seam-carved images and identify tampered regions [J].Neural Computing and Applications,2019,31(10):6479-6492. [18] YE J,SHI Y,XU G,et al.A Convolutional Neural NetworkBased Seam Carving Detection Scheme for Uncompressed Digital Images[C]//Proceedings of the International Workshop on Digi-tal Watermarking.2018. |
[1] | DAN Zhou-yang, LIU Fen-lin, GONG Dao-fu. Smoothing Filter Detection Algorithm Based on Middle and Tail Information of Differential Histogram [J]. Computer Science, 2021, 48(11): 234-241. |
[2] | ZHENG Qiu-mei, LIU Nan, WANG Feng-hua. Complex Attack Based Fragile Watermarking for Image Integrity Authentication Algorithm [J]. Computer Science, 2020, 47(10): 332-338. |
[3] | XING Wen-bo, DU Zhi-chun. Digital Image Forensics for Copy and Paste Tampering [J]. Computer Science, 2019, 46(6A): 380-384. |
[4] | WANG Zhi-feng, ZHU Lin, ZENG Chun-yan, MIN Qiu-sha, XIA Dan. Survey on Recompression Detection for Digital Images [J]. Computer Science, 2018, 45(9): 20-29. |
[5] | LUO Xiao-yang, HUO Hong-tao, WANG Meng-si and CHEN Ya-fei. Passive Image-splicing Detection Based on Multi-residual Markov Model [J]. Computer Science, 2018, 45(4): 173-177. |
[6] | CUI Wen-cheng, LIANG Shuang-shuang, SHAO Hong and WANG Hai-yu. Research on Detection of Image Region-duplication Forgery Affected by Intrinsically Identical Objects [J]. Computer Science, 2015, 42(Z6): 226-230. |
[7] | LIN Xiao, ZHANG Xiao-yu and MA Li-zhuang. Image Resizing Based on Seam Carving and Warping [J]. Computer Science, 2015, 42(9): 289-292. |
[8] | LIU Li-juan and LIN Xiao-zhu. Image Forgery Detection Using Characteristics of Background Noise [J]. Computer Science, 2014, 41(Z11): 136-138. |
[9] | LE De-guang,JIANG Nan,ZHENG Li-xin and LI Xiao-chao. Image Region Cloning Authentication Algorithm Based on Local Invariant Feature and Outlier Detection [J]. Computer Science, 2014, 41(12): 118-124. |
[10] | LIN Xiao,SHEN Yang,MA Li-zhuang and ZOU Pan-pan. Image Resizing Based on Shape and Structure-preserving of Salient Objects [J]. Computer Science, 2014, 41(12): 288-292. |
[11] | KANG Xiao-bing,WEI Sheng-min. Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery [J]. Computer Science, 2011, 38(3): 295-299. |
[12] | WANG Xin,LU Zhi-bo. Locate Tampered Image Region Automatically Based on Inconsistency of ,JPEG Blocking Artifacts [J]. Computer Science, 2010, 37(2): 269-273. |
[13] | XIAO Lei. Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types [J]. Computer Science, 2010, 37(2): 286-289. |
|