-
1
-
-
84873336380
-
Lazy Snapping
-
Y.Li, J.Sun, C.K.Tang, and H.Y.Shum, Lazy Snapping, Proceedings of ACM Siggraph 2004, pp.303-308.
-
(2004)
Proceedings of ACM Siggraph
, pp. 303-308
-
-
Li, Y.1
Sun, J.2
Tang, C.K.3
Shum, H.Y.4
-
2
-
-
37349090743
-
Changing history: Doctored photographs affect memory for past public events
-
D.L.M.Sacchi, F.Agnoli, and E.F.Loftus, Changing history: Doctored photographs affect memory for past public events, Applied Cognitive Psychology, 21(8): 1005-1022, 2007.
-
(2007)
Applied Cognitive Psychology
, vol.21
, Issue.8
, pp. 1005-1022
-
-
Sacchi, D.L.M.1
Agnoli, F.2
Loftus, E.F.3
-
3
-
-
46449095467
-
A survey on digital camera image forensic methods
-
T.V.Lanh, K.S.Chong, S.Emmanuel, and M.S.Kankanhalli, A survey on digital camera image forensic methods, Proceedings of IEEE International Conference on Multimedia and Expo 2007, pp.16-19.
-
(2007)
Proceedings of IEEE International Conference on Multimedia and Expo
, pp. 16-19
-
-
Lanh, T.V.1
Chong, K.S.2
Emmanuel, S.3
Kankanhalli, M.S.4
-
4
-
-
0035686725
-
-
P.Nillius, and J.O.Eklundh, Automatic estimation of the projected light source direction, Proceedings of CVPR 2001, pp.1076-1083.
-
P.Nillius, and J.O.Eklundh, Automatic estimation of the projected light source direction, Proceedings of CVPR 2001, pp.1076-1083.
-
-
-
-
6
-
-
49549105094
-
Blind identification of source cell-phone model
-
O.Celiktutan, B.Sankur, and I.Avcibas, Blind identification of source cell-phone model, IEEE Transactions on Information Forensics and Security, 3(3): 553-566, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 553-566
-
-
Celiktutan, O.1
Sankur, B.2
Avcibas, I.3
-
7
-
-
51449093025
-
Image acquisition forensics: Forensic analysis to identify imaging source
-
C.McKay, A.Swaminathan, H.Gou, and M.Wu, Image acquisition forensics: Forensic analysis to identify imaging source, Proceedings of IEEE International Conference on Acoustic, Speech and Signal Processing 2008, pp. 1657-1660.
-
(2008)
Proceedings of IEEE International Conference on Acoustic, Speech and Signal Processing
, pp. 1657-1660
-
-
McKay, C.1
Swaminathan, A.2
Gou, H.3
Wu, M.4
-
8
-
-
51849151851
-
Image authentication by detecting traces of demosaicing
-
A.Gallagher, and T.Chen, Image authentication by detecting traces of demosaicing, Proceedings of CVPRW 2008.
-
(2008)
Proceedings of CVPRW
-
-
Gallagher, A.1
Chen, T.2
-
9
-
-
51949101599
-
-
Y.Z.Huang, and Y.J.Long, Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model, Proceedings of CVPR 2008, pp.1-8.
-
Y.Z.Huang, and Y.J.Long, Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model, Proceedings of CVPR 2008, pp.1-8.
-
-
-
-
10
-
-
33847748167
-
Non-intrusive component forensics of visual sensors using output images
-
A.Swaminathan, M.Wu, and K.J.Ray Liu, Non-intrusive component forensics of visual sensors using output images, IEEE Transactions on Information Forensics and Security, 2(1): 91-106, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 91-106
-
-
Swaminathan, A.1
Wu, M.2
Ray Liu, K.J.3
-
11
-
-
0033701078
-
The watermark copy attack, SPIE
-
Security and Watermarking of Multimedia Contents II
-
M.Kutter, S.Voloshynovskiy, and A.Herrigel, The watermark copy attack, SPIE vol. 3971, Security and Watermarking of Multimedia Contents II 2000, pp.371-380.
-
(2000)
, vol.3971
, pp. 371-380
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
12
-
-
0027205884
-
A scaled conjugate gradient algorithm for fast supervised learning
-
A.F.Moller, A scaled conjugate gradient algorithm for fast supervised learning, Neural Networks, 6(4): 525-533, 1993.
-
(1993)
Neural Networks
, vol.6
, Issue.4
, pp. 525-533
-
-
Moller, A.F.1
-
13
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
C.W.Hsu, and C.J.Lin, A comparison of methods for multiclass support vector machines. IEEE Transactions on Neural Networks, 13: 415-425, 2002.
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, pp. 415-425
-
-
Hsu, C.W.1
Lin, C.J.2
-
14
-
-
0031238275
-
Application of majority voting to pattern recognition: An analysis of its behavior and performance
-
L.Lam, and C.Y.Suen, Application of majority voting to pattern recognition: An analysis of its behavior and performance, IEEE Transactions on Systems, Man and Cybernetics, 27(5): 553-568, 1997.
-
(1997)
IEEE Transactions on Systems, Man and Cybernetics
, vol.27
, Issue.5
, pp. 553-568
-
-
Lam, L.1
Suen, C.Y.2
-
15
-
-
32544433269
-
-
Y.Z.Huang, Can digital image forgery detection unevadable? A case study: Color filter array interpolation statistical feature recovery, SPIE 5960, Visual Communications and Image Processing 2005, pp.980-991.
-
Y.Z.Huang, Can digital image forgery detection unevadable? A case study: Color filter array interpolation statistical feature recovery, SPIE vol. 5960, Visual Communications and Image Processing 2005, pp.980-991.
-
-
-
|