1 |
吴晶辉, 严彩萍, 李红, 等. 边缘引导的双注意力图像拼接检测网络[J]. 中国图象图形学报, 2024, 29(2): 430-443.
|
|
WU J H, YAN C P, LI H, et al. BDA-Net: boundary-guided dual attention network for image splicing detection[J]. Journal of Image and Graphics, 2024, 29(2): 430-443.
|
2 |
VIJAYALAKSHMI K N V S K, SASIKALA J, SHANMUGANATHAN C. Copy-paste forgery detection using deep learning with error level analysis[J]. Multimedia Tools and Applications, 2024, 83(2): 3425-3449.
|
3 |
李莉, 曾伟良, 黄永慧, 等. 基于半监督学习的人脸识别反欺骗方法研究[J]. 智能科学与技术学报, 2021, 3(3): 370-380.
|
|
LI L, ZENG W L, HUANG Y H, et al. Research on anti-spoofing method of face recognition based on semi-supervised learning[J]. Chinese Journal of Intelligent Science and Technology, 2021, 3(3): 370-380.
|
4 |
GHOSH A, REDDY N D, MERTZ C, et al. Learned two-plane perspective prior based image resampling for efficient object detection[C]//Proceedings of the 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway: IEEE Press, 2023: 13364-13373.
|
5 |
赵俊杰, 王金伟, 吴俊凤. 基于多质量因子压缩误差的对抗样本攻击方法识别[J]. 中国图象图形学报, 2023, 28(3): 850-863.
|
|
ZHAO J J, WANG J W, WU J F. Adversarial attack method identification model based on multi-factor compression error[J]. Journal of Image and Graphics, 2023, 28(3): 850-863.
|
6 |
AGARWAL S, JUNG K H. Median filtering detection using optimal multi-direction threshold on higher-order difference pixels[J]. Multimedia Tools and Applications, 2023, 82(20): 30875-30893.
|
7 |
PENG Y F, LIU X X, WANG G, et al. Irregular shape image retargeting based on seam carving[C]//Proceedings of the 2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI). Piscataway: IEEE Press, 2023: 1845-1848.
|
8 |
LI L, XUE J R, TIAN Z Q, et al. Moment feature based forensic detection of resampled digital images[C]//Proceedings of the 21st ACM International Conference on Multimedia. New York: ACM, 2013: 569-572.
|
9 |
SHAMIR A, AVIDAN S. Seam carving for media retargeting[J]. Communications of the ACM, 2009, 52(1): 77-85.
|
10 |
SARKAR A, NATARAJ L, MANJUNATH B S. Detection of seam carving and localization of seam insertions in digital images[C]//Proceedings of the 11th ACM Workshop on Multimedia and Security. New York: ACM, 2009: 107-116.
|
11 |
WATTANACHOTE K, SHIH T K, CHANG W L, et al. Tamper detection of JPEG image due to seam modifications[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2477-2491.
|
12 |
YIN T, YANG G B, LI L D, et al. Detecting seam carving based image resizing using local binary patterns[J]. Computers & Security, 2015, 55: 130-141.
|
13 |
KARAPINAR SENTURK Z, AKGUN D. A machine learning method for detecting the trace of seam carving[J]. Elektronika Ir Elektrotechnika, 2021, 27(5): 59-66.
|
14 |
FERNANDODA SILVA CIESLAK L, AUGUSTOPONTARA DA COSTA K, PAULOPAPA J. Seam carving detection using convolutional neural networks[C]//Proceedings of the 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI). Piscataway: IEEE Press, 2018: 195-200.
|
15 |
YE J Y, SHI Y X, XU G S, et al. A convolutional neural network based seam carving detection scheme for uncompressed digital images[C]//Proceedings of International Workshop on Digital Watermarking. Cham: Springer, 2019: 3-13.
|
16 |
BOROUMAND M, CHEN M, FRIDRICH J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(5): 1181-1193.
|
17 |
NAM S H, AHN W, YU I J, et al. Deep convolutional neural network for identifying seam-carving forgery[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(8): 3308-3326.
|
18 |
NATARAJ L, GUDAVALLI C, MANHAR MOHAMMED T, et al. Seam carving detection and localization using two-stage deep neural networks[C]//Proceedings of Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication. Singapore: Springer, 2021: 381-394.
|
19 |
MOREIRA T P, SANTANA M C S, PASSOS L A, et al. An end-to-end approach for seam carving detection using deep neural networks[C]//Proceedings of Iberian Conference on Pattern Recognition and Image Analysis. Cham: Springer, 2022: 447-457.
|
20 |
XIA M, CHEN J Y, YANG G B, et al. Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning[J]. Journal of Information Security and Applications, 2023, 75: 103522.
|
21 |
BAYAR B, STAMM M C. Constrained convolutional neural networks: a new approach towards general purpose image manipulation detection[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(11): 2691-2706.
|
29 |
SCHAEFER G, STICH M. UCID: an uncompressed color image database[C]//Proceedings of Storage and Retrieval Methods and Applications for Multimedia 2004. [S.l.:s.n.], 2003: 472-480.
|
22 |
ZHANG R Y, NI J Q. A dense U-net with cross-layer intersection for detection and localization of image forgery[C]//Proceedings of the ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Piscataway: IEEE Press, 2020: 2982-2986.
|
23 |
HE K M, ZHANG X Y, REN S Q, et al. Deep residual learning for image recognition[C]//Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway: IEEE Press, 2016: 770-778.
|
24 |
ZHANG D Y, ZHU W J, DING X L, et al. SRTNet: a spatial and residual based two-stream neural network for deepfakes detection[J]. Multimedia Tools and Applications, 2023, 82(10): 14859-14877.
|
25 |
CELEBI N H, HSU T L, LIU Q Z. A comparison study to detect seam carving forgery in JPEG images with deep learning models[J]. Journal of Surveillance, Security and Safety, 2022, 3(3): 88-100.
|
26 |
GUDAVALLI C, ROSTEN E, NATARAJ L, et al. SeeTheSeams: localized detection of seam carving based image forgery in satellite imagery[C]//Proceedings of the 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). Piscataway: IEEE Press, 2022: 1-11.
|
27 |
WOO S, PARK J, LEE J Y, et al. CBAM: convolutional block attention module[C]//Proceedings of European Conference on Computer Vision. Cham: Springer, 2018: 3-19.
|
28 |
BAS P, FILLER T, PEVNY T. "Break our steganographic system": the ins and outs of organizing BOSS[C]//Proceedings of International Workshop on Information Hiding. Heidelberg: Springer, 2011: 59-70.
|