Computer Science ›› 2021, Vol. 48 ›› Issue (11): 234-241.doi: 10.11896/jsjkx.200900121
• Computer Graphics & Multimedia • Previous Articles Next Articles
DAN Zhou-yang, LIU Fen-lin, GONG Dao-fu
CLC Number:
[1]BAI Z W,YI T T,ZHOU M L,et al.Face Image InpaintingMethod Based on Multi-Scale Feature Fusion[J].Computer Engineering,2021,47(5):213-220,228. [2]BAISHYA N,BORA P.Luminance Channel Based CameraModel Identification[C]//2020 International Conference on Signal Processing and Communications (SPCOM).Bangalore:IEEE,2020:1-5. [3]LI Y,ZHOU J.Fast and Effective Image Copy-Move ForgeryDetection via Hierarchical Feature Point Matching[J].IEEE Transactions on Information Forensics and Security,2019,14(5):1307-1322. [4]XIAO B,WEI Y,BI X,et al.Image splicing forgery detectioncombining coarse to refined convolutional neural network and adaptive clustering[J].Information Sciences,2020,511:172-191. [5]PANG R L,LIN J,ZHANG L.Grid-driven Bi-directional Image Stitching Algorithm[J].Computer Science,2020,47(3):130-136. [6]BOROUMAND M,FRIDRICH J.Deep Learning for Detecting Processing History of Images[J].Electronic Imaging,2018,2018(7):213-1-213-9. [7]WANG P,LIU F,YANG C.Thresholding binary codingfor image forensics of weak sharpening[J].Signal Processing Image Communication,2020,88:115956. [8]ZHANG Q,LU W,HUANG T,et al.On the Robustness of JPEG Post-Compression to Resampling Factor Estimation[J].Signal Processing,2019,168:107371. [9]LIU R H,XIE T.Image Decomposition Based on Improved Total Variation Method[J].Journal of Chongqing Technology and Business University:Natural Science Edition,2020,34(7):156-161. [10]KIRCHNER M,FRIDRICH J.On detection of median filtering in digital images[C]//Media Forensics & Security II.San Jose:International Society for Optics and Photonics,2010:10-1-10-12. [11]CAO G,ZHAO Y,NI R,et al.Forensic detection of median filtering in digital images[C]//IEEE International Conference on Multimedia & Expo.Singapore:IEEE,2010:89-94. [12]BOVIK A.Streaking in median filtered images[J].IEEE Tran-sactions on Acoustics Speech and Signal Processing,1987,35(4):493-503. [13]YUAN H.Blind Forensics of Median Filtering in Digital Images[J].IEEE Transactions on Information Forensics and Security,2011,6(4):1335-1345. [14]CHEN C,NI J,HUANG J.Blind Detection of Median Filtering in Digital Images:A Difference Domain Based Approach[J].IEEE Transactions on Image Processing,2013,22(12):4699-4710. [15]KANG X,STAMM M,PENG A,et al.Robust Median Filtering Forensics Using an Autoregressive Model[J].IEEE Transactions on Information Forensics and Security,2013,8(9):1456-1468. [16]LAI Y,GAO T,LI J,et al.Forensic Detection of Median Filtering in Digital Images Using the Coefficient-Pair Histogram of DCT Value and LBP Pattern[C]//International Conference on Intelligent Computing.Cairo:Springer,2015:421-432. [17]GAO H,GAO T,CHENG R.Robust detection of median filtering based on data-pair histogram feature and local configuration pattern[J].Journal of Information Security and Applications,2020,53:102506. [18]DING F,SHI Y,ZHU G,et al.Smoothing identification for di-gital image forensics[J].Multimedia Tools and Applications,2019,78(7):8225-8245. [19]LI M F,WANG C,PENG A J,et al.A Blind Forensics Algorithm for Digital Image Smoothing Filtering[J].Semiconductor Optoelectronics,2017,38(3):430-434. [20]BAYAR B,STAMM M.Constrained Convolutional Neural Networks:A New Approach Towards General Purpose Image Manipulation Detection[J].IEEE Transactions on Information Forensics and Security,2018,13(11):2691-2706. [21]YANG B,SUN X,CAO E,et al.Convolutional neural network for smooth filtering detection[J].IET Image Processing,2018,12(8):1432-1438. [22]LIU A,ZHAO Z,ZHANG C,et al.Smooth filtering identifica-tion based on convolutional neural networks[J].Multimedia Tools and Applications,2019,78(19):26851-26865. [23]WANG X L,LI X.Target Tracking Algorithm Based on Correlated Filters and Convolutional Neural Network[J].Journal of Chongqing Technology and Business University:Natural Science Edition,2020,37(1):19-24. [24]ZENG J,TAN S,LI B,et al.Large-scale JPEG steganalysisusing hybrid deep-learning framework[J].IEEE Transactions on Information Forensics & Security,2016,13(5):1200-1214. |
[1] | XING Wen-bo, DU Zhi-chun. Digital Image Forensics for Copy and Paste Tampering [J]. Computer Science, 2019, 46(6A): 380-384. |
[2] | . Reversible Data Hiding Based on Reference Pixel of Block [J]. Computer Science, 2012, 39(2): 47-51. |
[3] | KANG Xiao-bing,WEI Sheng-min. Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery [J]. Computer Science, 2011, 38(3): 295-299. |
[4] | . [J]. Computer Science, 2009, 36(6): 53-56. |
|