Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (3): 29-40.doi: 10.11959/j.issn.2096-109x.2022035
• Topic: Multimedia Content Security • Previous Articles Next Articles
Yuxin WANG, Boqiang ZHANG, Hongtao XIE, Yongdong ZHANG
Revised:
2022-04-17
Online:
2022-06-15
Published:
2022-06-01
Supported by:
CLC Number:
Yuxin WANG, Boqiang ZHANG, Hongtao XIE, Yongdong ZHANG. Tampered text detection via RGB and frequency relationship modeling[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 29-40.
[1] | WANG Y , XIE H , ZHA Z J ,et al. Contournet:taking a further step toward accurate arbitrary-shaped scene text detection[C]// CVPR. 2020: 11753-11762. |
[2] | WANG Y , XIE H , FANG S ,et al. From two to one:a new scene text recognizer with visual language modeling network[C]// ICCV. 2021: 14194-14203. |
[3] | FANG S , XIE H , WANG Y ,et al. Read like humans:autonomous,bidirectional and iterative language modeling for scene text recognition[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2021: 7098-7107. |
[4] | WU L , ZHANG C , LIU J ,et al. Editing text in the wild[C]// ACM MM. 2019: 1500-1508. |
[5] | YANG Q , HUANG J , LIN W . Swaptext:image based texts transfer in scenes[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020: 14700-14709. |
[6] | ROY P , BHATTACHARYA S , GHOSH S ,et al. Stefann:scene text editor using font adaptive neural network[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020: 13228-13237. |
[7] | 王志红, 黄惠芬, 常玉红 . 基于SVD分解和Hadamard变换的图像半脆弱水印技术[J]. 网络与信息安全学报, 2017,3(5): 26-31. |
WANG Z H , HUANG H F , CHANG Y H . Semi-fragile watermarking technology based on SVD decomposition and Hadamard transform[J]. Chinese Journal of Network and Information Security, 2017,3(5): 26-31. | |
[8] | 常玉红, 黄惠芬, 王志红 . 检测图像篡改的脆弱水印技术[J]. 网络与信息安全学报, 2017,3(7): 47-52. |
CHANG Y H , HUANG H F , WANG Z H . Fragile watermarking technique for detecting image[J]. Chinese Journal of Network and Information Security, 2017,3(7): 47-52. | |
[9] | FRIDRICH J , SOUKAL D , LUKAS J . Detection of copymove forgery in digital images[C]// Proceedings of Digital Forensic Research Workshop. 2003: 55-61. |
[10] | RYU S J , KIRCHNER ,et al. Rotation invariant localization of duplicated image regions based on Zernike moments[J]. IEEE Transactions on Information Forensics and Security, 2013,8(8): 1355-1370. |
[11] | HUANG H , GUO W , ZHANG Y . Detection of copy-move forgery in digital images using SIFT algorithm[C]// IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. 2009: 272-276. |
[12] | FARID H . Exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics and Security, 2009,4(1): 154-160. |
[13] | MIKKILINENI A K , CHIANG P J , ALI G N ,et al. Printer identification based on texture features[C]// NIP & Digital Fabrication Conference.Society for Imaging Science and Technology. 2004: 306-311. |
[14] | LAMPERT C H , MEI L , BREUEL T M . Printing technique classification for document counterfeit detection[C]// 2006 International Conference on Computational Intelligence and Security. 2006: 639-644. |
[15] | SCHULZE C , SCHREYER M , STAHL A ,et al. Using DCT features for printing technique and copy detection[C]// IFIP International Conference on Digital Forensics. 2009: 95-106. |
[16] | AHMED A G H , SHAFAIT F . Forgery detection based on intrinsic document contents[C]// 2014 11th IAPR International Workshop on Document Analysis Systems. 2014: 252-256. |
[17] | BATAINEH B , ABDULLAH S N H S , OMAR K . A statistical global feature extraction method for optical font recognition[C]// Asian Conference on Intelligent Information and Database Systems. 2011: 257-267. |
[18] | ZRAMDINI A , INGOLD R . Optical font recognition using typographical features[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998,20(8): 877-882. |
[19] | BERTRAND R , TERRADES O R , GOMEZ-KR?MER P ,et al. A conditional random field model for font forgery detection[C]// 2015 13th Inter-national Conference on Document Analysis and Recognition (ICDAR). 2015: 576-580. |
[20] | VAN-BEUSEKOM J , SHAFAIT F , BREUEL T M . Text-line examination for document forgery detection[J]. International Journal on Document Analysis and Recognition (IJDAR), 2013,16(2): 189-207. |
[21] | CRUZ F , SIDERE N , COUSTATY M ,et al. Local binary patterns for document forgery detection[C]// 2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR). 2017: 1223-1228. |
[22] | ABRAMOVA S . Detecting copy–move forgeries in scanned text documents[J]. Electronic Imaging, 2016,2016(8): 1-9. |
[23] | JAMES H , GUPTA O , RAVIV D . Learning document graphs with attention for image manipulation detection[R]. |
[24] | DANG H , LIU F , STEHOUWER J ,et al. On the detection of digital face manipulation[C]// CVPR. 2020: 5780-5789. |
[25] | QI H , GUO Q , XU J F ,et al. DeepRhythm:exposing deepfakes with attentional visual heartbeat rhythms[C]// ACM Multimedia. 2020: 4318-4327. |
[26] | IACOPO MASI , ADITYA KILLEKAR , ROYSTON MARIAN MASCARENHAS ,et al. Two-branch recurrent network for isolating deepfakes in videos[C]// ECCV. 2020: 667-684. |
[27] | QIAN Y Y , YIN G J , SHENG L ,et al. Thinking in frequency:face forgery detection by mining fre-quency-aware clues[C]// ECCV. 2020: 86-103. |
[28] | LI J M , XIE H T , LI J H ,et al. Frequency-aware discriminative feature learning supervised by single-center loss for face forgery detection[C]// CVPR. 2021: 6458-6467. |
[29] | HE K , GKIOXARI G , DOLLAR P . Mask r-CNN[C]// Proceedings of the IEEE International Conference on Computer Vision. 2017: 2961-2969. |
[30] | HUANG Z , CHEN K , HE J ,et al. Icdar2019 competition on scanned receipt ocr and information extraction[C]// 2019 International Conference on Document Analysis and Recognition (ICDAR). 2019: 1516-1520. |
[31] | WU L , ZHANG C , LIU J ,et al. Editing text in the wild[C]// ACM MM. 2019: 1500-1508. |
[32] | ZHOU X , YAO C , WEN H ,et al. East:an efficient and accurate scene text detector[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2017: 5551-5560. |
[33] | WANG X , JIANG Y , LUO Z ,et al. Arbitrary shape scene text detection with adaptive text region representation[C]// CVPR. 2019: 6449-6458. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|