Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230700125-5.doi: 10.11896/jsjkx.230700125
• Image Processing & Multimedia Technolog • Previous Articles Next Articles
HUANG Yuanhang1,2, BIAN Shan1,2,3, WANG Chuntao1,2
CLC Number:
[1]FILLER T,FRIDRICH J,GOLJAN M.Using sensor patternnoise for camera model identification[C]//2008 15th IEEE International Conference on Image Processing.IEEE,2008:1296-1299. [2]SAN CHOI K,LAM E Y,WONG K K Y.Automatic source camera identification using the intrinsic lens radial distortion[J].Optics Express,2006,14(24):11551-11565. [3]MILANI S,BESTAGINI P,TAGLIASACCHIM,et al.Demo-saicing strategy identification via eigenalgorithms[C]//2014 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).IEEE,2014:2659-2663. [4]ALLES E J,GERADTS Z J M H,VEENMANC J.Source ca-mera identification for low resolution heavily compressed images[C]//2008 International Conference on Computational Sciences and Its Applications.IEEE,2008:557-567. [5]TUAMA A,COMBY F,CHAUMONTM.Camera model identification with the use of deep convolutional neural networks[C]//2016 IEEE International Workshop on Information Forensics and Security(WIFS).IEEE,2016:1-6. [6]YAO H,QIAO T,XU M,et al.Robust multi-classifier for ca-mera model identification based on convolution neural network[J].IEEE Access,2018,6:24973-24982. [7]BAYAR B,STAMM M C.Augmented convolutional featuremaps for robust cnn-based camera model identification[C]//2017 IEEE International Conference on Image Processing(ICIP).IEEE,2017:4098-4102. [8]QIAN Y,DONG J,WANG W,et al.Deep learning for stegana-lysis via convolutional neural networks[C]//Media Watermar-king,Security,and Forensics 2015.SPIE,2015,9409:171-180. [9]GLOE T,BÖHME R.The ‘Dresden Image Database’ forbenchmarking digital image forensics[C]//Proceedings of the 2010 ACM Symposium on Applied Computing.2010:1584-1590. [10]BAYAR B,STAMM M C.Constrained convolutional neural networks:A new approach towards general purpose image manipulation detection[J].IEEE Transactions on Information Forensics and Security,2018,13(11):2691-2706. [11]BAYAR B,STAMM M C.A deep learning approach to universal image manipulation detection using a new convolutional layer[C]//Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security.2016:5-10. [12]CHEN Y,HUANG Y,DING X.Camera model identificationwith residual neural network[C]//2017 IEEE International Conference on Image Processing(ICIP).IEEE,2017:4337-4341. [13]HE K,ZHANG X,REN S,et al.Deep residual learning for image recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:770-778. [14]DING X,CHEN Y,TANG Z,et al.Camera identification based on domain knowledge-driven deep multi-task learning[J].IEEE Access,2019,7:25878-25890. [15]KUZIN A,FATTAKHOV A,KIBARDIN I,et al.Camera model identification using convolutional neural networks[C]//2018 IEEE International Conference on Big Data(Big Data).IEEE,2018:3107-3110. [16]RAFI A M,KAMAL U,HOQUE R,et al.Application ofDenseNet in Camera Model Identification and Post-processing Detection[C]//CVPR Workshops.2019:19-28. [17]HUANG G,LIU Z,VAN DER MAATEN L,et al.Densely connected convolutional networks[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:4700-4708. [18]FERREIRA A,CHEN H,LI B,et al.An inception-based data-driven ensemble approach to camera model identification[C]//2018 IEEE International Workshop on Information Forensics and Security(WIFS).IEEE,2018:1-7. [19]YANG P,NI R,ZHAO Y.Recapture image forensics based on Laplacian convolutional neural networks[C]//Digital Forensics and Watermarking:15th International Workshop(IWDW 2016).Revised Selected Papers 15.Springer International Publishing,2017:119-128. [20]LUO Y,ZHANG Y,YAN J,et al.Generalizing face forgery detection with high-frequency features[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:16317-16326. [21]ZHOU P,HAN X,MORARIU V V I,et al.Learning rich features for image manipulation detection[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:1053-1061. [22]KAREN S,ZISSERMAN A.Very Deep Convolutional Net-works for Large-Scale Image Recognition[J].arXiv:1409.1556,2014. [23]SZEGEDY C,VANHOUCKE V,IOFFE S,et al.Rethinkingthe inception architecture for computer vision[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:2818-2826. [24]BAYAR B,STAMM M C.Design principles of convolutionalneural networks for multimedia forensics[J].Electronic Imaging,2017,29:77-86. [25]CHEN X,DONG C,JI J,et al.Image manipulation detection by multi-view multi-scale supervision[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2021:14185-14193. [26]DONG C,CHEN X,HU R,et al.Mvss-net:Multi-view multi-scale supervised networks for image manipulation detection[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(3):3539-3553. [27]HU X,ZHANG Z,JIANG Z,et al.SPAN:Spatial pyramid attention network for image manipulation localization[C]//Computer Vision-ECCV 2020:16th European Conference,Glasgow,UK,Part XXI 16.Springer International Publishing,2020:312-328. [28]WU Y,ABDALMAGEED W,NATARAJAN P.Mantra-net:Manipulation tracing network for detection and localization of image forgeries with anomalous features[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:9543-9552. [29]HUANG Y,BIAN S,LI H,et al.DS-UNet:A dual streamsUNet for refined image forgery localization[J].Information Sciences,2022,610:73-89. [30]SHULLANI D,FONTANI M,IULIANI M,et al.Vision:a vi-deo and image dataset for source identification[J].EURASIP Journal on Information Security,2017,2017(1):1-16. [31]SELVARAJU R R,COGSWELL M,DAS A,et al.Grad-cam:Visual explanations from deep networks via gradient-based localization[C]//Proceedings of the IEEE International Confe-rence on Computer Vision.2017:618-626. |
[1] | WANG Yingjie, ZHANG Chengye, BAI Fengbo, WANG Zumin. Named Entity Recognition Approach of Judicial Documents Based on Transformer [J]. Computer Science, 2024, 51(6A): 230500164-9. |
[2] | LIANG Fang, XU Xuyao, ZHAO Kailong, ZHAO Xuanfeng, ZHANG Guijun. Remote Template Detection Algorithm and Its Application in Protein Structure Prediction [J]. Computer Science, 2024, 51(6A): 230600225-7. |
[3] | PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5. |
[4] | ZHANG Tianchi, LIU Yuxuan. Research Progress of Underwater Image Processing Based on Deep Learning [J]. Computer Science, 2024, 51(6A): 230400107-12. |
[5] | WANG Guogang, DONG Zhihao. Lightweight Image Semantic Segmentation Based on Attention Mechanism and Densely AdjacentPrediction [J]. Computer Science, 2024, 51(6A): 230300204-8. |
[6] | MENG Xiangfu, REN Quanying, YANG Dongshen, LI Keqian, YAO Keyu, ZHU Yan. Literature Classification of Individual Reports of Adverse Drug Reactions Based on BERT and CNN [J]. Computer Science, 2024, 51(6A): 230400049-6. |
[7] | JIAO Ruodan, GAO Donghui, HUANG Yanhua, LIU Shuo, DUAN Xuanfei, WANG Rui, LIU Weidong. Study and Verification on Few-shot Evaluation Methods for AI-based Quality Inspection in Production Lines [J]. Computer Science, 2024, 51(6A): 230700086-8. |
[8] | HUANG Haixin, CAI Mingqi, WANG Yuyao. Review of Point Cloud Semantic Segmentation Based on Graph Convolutional Neural Networks [J]. Computer Science, 2024, 51(6A): 230400196-7. |
[9] | LYU Yiming, WANG Jiyang. Iron Ore Image Classification Method Based on Improved Efficientnetv2 [J]. Computer Science, 2024, 51(6A): 230600212-6. |
[10] | YANG Xiuzhang, WU Shuai, REN Tianshu, LIAO Wenjing, XIANG Meiyu, YU Xiaomin, LIU Jianyi, CHEN Dengjian. Complex Environment License Plate Recognition Algorithm Based on Improved Image Enhancement and CNN [J]. Computer Science, 2024, 51(6A): 220200162-7. |
[11] | SONG Zhen, WANG Jiqiang, HOU Moyu, ZHAO Lin. Conveyor Belt Defect Detection Network Combining Attention Mechanism with Line Laser Assistance [J]. Computer Science, 2024, 51(6A): 230800115-6. |
[12] | WU Chunming, LIU Yali. Method for Lung Nodule Detection on CT Images Using Improved YOLOv5 [J]. Computer Science, 2024, 51(6A): 230500019-6. |
[13] | YIN Xudong, CHEN Junyang, ZHOU Bo. Study on Industrial Defect Augmentation Data Filtering Based on OOD Scores [J]. Computer Science, 2024, 51(6A): 230700111-7. |
[14] | QIAO Hong, XING Hongjie. Attention-based Multi-scale Distillation Anomaly Detection [J]. Computer Science, 2024, 51(6A): 230300223-11. |
[15] | SI Jia, LIANG Jianfeng, XIE Shuo, DENG Yingjun. Research Progress of Anomaly Detection in IaaS Cloud Operation Driven by Deep Learning [J]. Computer Science, 2024, 51(6A): 230400016-8. |
|