-
2
-
-
0036647193
-
Multiresolution gray-scale and rotation invariant texture classification with local binary patterns
-
(july)
-
Ojala, T., Pietikäinen, M., and Mäenpää, T., "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns," IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 971-987 (july 2002).
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, pp. 971-987
-
-
Ojala, T.1
Pietikäinen, M.2
Mäenpää, T.3
-
3
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
Biggio, B., Corona, I., Maiorca, D., Nelson, B., Srndić, N., Laskov, P., Giacinto, G., and Roli, F., "Evasion attacks against machine learning at test time," H. Blockeel et al. (ed.) European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III, Lecture Notes in artificial Intelligence 8190, 387-402 (2013).
-
(2013)
H. Blockeel et Al. (Ed.) European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Part III, Lecture Notes in Artificial Intelligence
, vol.8190
, pp. 387-402
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Srndić, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
4
-
-
84873623957
-
Counter-forensics: Attacking image forensics
-
Springer, New York, husrev taha sencar and nasir memon, eds. ed
-
Böhme, R. and Kirchner, M., "Counter-forensics: attacking image forensics," in [Digital Image Forensics (Chapter 10)], Springer, New York, husrev taha sencar and nasir memon, eds. ed. (2012).
-
(2012)
Digital Image Forensics (Chapter 10)
-
-
Böhme, R.1
Kirchner, M.2
-
7
-
-
84872328080
-
Revealing the traces of jpeg compression anti-forensics
-
(february)
-
Valenzise, G., Tagliasacchi, M., and Tubaro, S., "Revealing the traces of jpeg compression anti-forensics," IEEE Transactions on Information Forensics and Security 8, 335-349 (february 2013).
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, pp. 335-349
-
-
Valenzise, G.1
Tagliasacchi, M.2
Tubaro, S.3
-
8
-
-
80053033238
-
Countering counter-forensics: The case of jpeg compression
-
Lai, S. and Böhme, R., "Countering counter-forensics: The case of jpeg compression," Information Hiding, 285-298 (2011).
-
(2011)
Information Hiding
, pp. 285-298
-
-
Lai, S.1
Böhme, R.2
-
9
-
-
37849032097
-
Can we trust digital image forensics?
-
T. Gloe, M. Kirchner, A. W. and Böhme, R., "Can we trust digital image forensics?," ACM 15th Int. Conf. Multimedia, 78-86 (2007).
-
(2007)
ACM 15th Int. Conf. Multimedia
, pp. 78-86
-
-
Gloe, T.1
Kirchner, A.W.M.2
Böhme, R.3
-
10
-
-
79951834941
-
Defending against fingerprint-copy attack in sensor-based camera Identification
-
(march)
-
Goljan, M., Fridrich, J., and Chen, M., "Defending against fingerprint-copy attack in sensor-based camera Identification," IEEE Transactions on Information Forensics and Security 6, 227-236 (march 2011).
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, pp. 227-236
-
-
Goljan, M.1
Fridrich, J.2
Chen, M.3
-
11
-
-
84931044559
-
Attacking the triangle test in sensorbased camera Identification
-
Marra, F., Roli, F., Cozzolino, D., Sansone, C., and Verdoliva, L., "Attacking the triangle test in sensorbased camera Identification," IEEE International Conference on Image Processing, 5242-5246 (2014).
-
(2014)
IEEE International Conference on Image Processing
, pp. 5242-5246
-
-
Marra, F.1
Roli, F.2
Cozzolino, D.3
Sansone, C.4
Verdoliva, L.5
-
12
-
-
84864034865
-
Forensics vs. Anti-forensics: A decision and game theoretic framework
-
Stamm, M., Lin, S., and Liu, K., "Forensics vs. anti-forensics: A decision and game theoretic framework," IEEE International Conference on Acoustics, Speech and Signal Processing, 1749-1752 (2012).
-
(2012)
IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 1749-1752
-
-
Stamm, M.1
Lin, S.2
Liu, K.3
-
13
-
-
84890463324
-
Coping with the enemy: Advances in adversary-aware signal processing
-
Barni, M. and Pèrez-Gonzàlez, F., "Coping with the enemy: advances in adversary-aware signal processing," IEEE International Conference on Acoustics, Speech and Signal Processing, 8682-8686 (2013).
-
(2013)
IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 8682-8686
-
-
Barni, M.1
Pèrez-Gonzàlez, F.2
-
14
-
-
84867466942
-
A universal technique to hide traces of histogram-based image manipulations
-
Barni, M., Fontani, M., and Tondi, B., "A universal technique to hide traces of histogram-based image manipulations," ACM Multimedia and Security Workshop, 97-104 (2012).
-
(2012)
ACM Multimedia and Security Workshop
, pp. 97-104
-
-
Barni, M.1
Fontani, M.2
Tondi, B.3
-
15
-
-
84890475706
-
Optimal counterforensics for histogram-based forensics
-
Comesàna, P. and Pèrez-Gonzàlez, F., "Optimal counterforensics for histogram-based forensics," IEEE International Conference on Acoustics, Speech and Signal Processing, 3048-3052 (2013).
-
(2013)
IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 3048-3052
-
-
Comesàna, P.1
Pèrez-Gonzàlez, F.2
-
16
-
-
84900444491
-
Image counter-forensics based on feature injection
-
Loew, M. H., ed., Proc. SPIE
-
Iuliani, M., Rossetto, S., Bianchi, T., Rosa, A. D., Piva, A., and Barni, M., "Image counter-forensics based on feature injection," in [Media Watermarking, Security, and Forensics], Loew, M. H., ed., Proc. SPIE 9028, 1-15 (2014).
-
(2014)
Media Watermarking, Security, and Forensics
, vol.9028
, pp. 1-15
-
-
Iuliani, M.1
Rossetto, S.2
Bianchi, T.3
Rosa, A.D.4
Piva, A.5
Barni, M.6
-
17
-
-
58349116041
-
Steganalysis versus splicing detection
-
Shi, Y., Chen, C., and Xuan, G., "Steganalysis versus splicing detection," International Workshop on Digital Watermarking 5041, 158-172 (2008).
-
(2008)
International Workshop on Digital Watermarking
, vol.5041
, pp. 158-172
-
-
Shi, Y.1
Chen, C.2
Xuan, G.3
-
18
-
-
84864277926
-
Digital image splicing detection based on markov features in dct and dwt domain
-
He, Z., Lu, W., Sun, W., and Huang, J., "Digital image splicing detection based on markov features in dct and dwt domain," Pattern Recognition 45, 4292-4299 (2012).
-
(2012)
Pattern Recognition
, vol.45
, pp. 4292-4299
-
-
He, Z.1
Lu, W.2
Sun, W.3
Huang, J.4
-
19
-
-
84897811383
-
Image splicing detection based on noncausal markov model
-
Zhao, X., Wang, S., Li, S., Li, J., and Yuan, Q., "Image splicing detection based on noncausal markov model," IEEE International Conference on Image Processing, 4462-4466 (2013).
-
(2013)
IEEE International Conference on Image Processing
, pp. 4462-4466
-
-
Zhao, X.1
Wang, S.2
Li, S.3
Li, J.4
Yuan, Q.5
-
20
-
-
84931062199
-
Image forgery detection through residual-based local descriptors and block-matching
-
(October)
-
Cozzolino, D., Gragnaniello, D., and L. Verdoliva, "Image forgery detection through residual-based local descriptors and block-matching," IEEE Conference on Image Processing (ICIP), 5297-5301 (October 2014).
-
(2014)
IEEE Conference on Image Processing (ICIP)
, pp. 5297-5301
-
-
Cozzolino, D.1
Gragnaniello, D.2
Verdoliva, L.3
-
21
-
-
84929254527
-
A feature-based approach for image tampering detection and localization
-
Verdoliva, L., Cozzolino, D., and Poggi, G., "A feature-based approach for image tampering detection and localization," IEEE Workshop on Information Forensic and Security, 1755-1760 (2014).
-
(2014)
IEEE Workshop on Information Forensic and Security
, pp. 1755-1760
-
-
Verdoliva, L.1
Cozzolino, D.2
Poggi, G.3
-
23
-
-
33749589438
-
Statistical restoration for robust and secure steganography
-
Solanki, K., Sullivan, K., Madhow, U., Manjunath, B., and Chandrasekaran, S., "Statistical restoration for robust and secure steganography," IEEE International Conference on Image Processing, 1118-1121 (2005).
-
(2005)
IEEE International Conference on Image Processing
, pp. 1118-1121
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.4
Chandrasekaran, S.5
-
24
-
-
34547514532
-
Secure steganography: Statistical restoration of the second order dependencies for improved security
-
Sarkar, A., Solanki, K., Macdhow, U., Chandrasekaran, S., and Manjunath, B., "Secure steganography: statistical restoration of the second order dependencies for improved security," IEEE International Conference on Acoustics, Speech and Signal Processing, 277-280 (2007).
-
(2007)
IEEE International Conference on Acoustics, Speech and Signal Processing
, pp. 277-280
-
-
Sarkar, A.1
Solanki, K.2
MacDhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
25
-
-
84883194985
-
Countering universal image tampering detection with histogram restoration
-
Chen, L., Wang, S., Li, S., and Li, J., "Countering universal image tampering detection with histogram restoration," Proc. of the 11th international Conference on Digital Forensics and Watermaking, 282-289 (2012).
-
(2012)
Proc. of the 11th International Conference on Digital Forensics and Watermaking
, pp. 282-289
-
-
Chen, L.1
Wang, S.2
Li, S.3
Li, J.4
-
26
-
-
33845989821
-
Can machine learning be secure?
-
Barreno, M., Nelson, B., Sears, R., Joseph, A., and Tygar, J., "Can machine learning be secure?," ACM Symp. on Information, Computer and Comm. Sec., 16-25 (2006).
-
(2006)
ACM Symp. on Information, Computer and Comm. Sec.
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.4
Tygar, J.5
-
27
-
-
80955143573
-
Adversarial machine learning
-
Huang, L., Joseph, A., Nelson, B., Rubinstein, B., and Tygar, J., "Adversarial machine learning," ACM Workshop on artificial Intell. and Security, 43-57 (2011).
-
(2011)
ACM Workshop on Artificial Intell. and Security
, pp. 43-57
-
-
Huang, L.1
Joseph, A.2
Nelson, B.3
Rubinstein, B.4
Tygar, J.5
-
28
-
-
84992268362
-
Security evaluation of pattern classifiers under attack
-
(April)
-
Biggio, B., Fumera, G., and Roli, F., "Security evaluation of pattern classifiers under attack," IEEE Trans-actions on knowledge and data engineering 26, 984-996 (April 2014).
-
(2014)
IEEE Trans-actions on Knowledge and Data Engineering
, vol.26
, pp. 984-996
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
29
-
-
84894173781
-
Attacking image classification based on bag-of-visual-words
-
Melloni, A., Bestagini, P., Costanzo, A., Barni, M., Tagliasacchi, M., and Tubaro, S., "Attacking image classification based on bag-of-visual-words," IEEE Workshop on Information Forensics and Security, 103-108 (2013).
-
(2013)
IEEE Workshop on Information Forensics and Security
, pp. 103-108
-
-
Melloni, A.1
Bestagini, P.2
Costanzo, A.3
Barni, M.4
Tagliasacchi, M.5
Tubaro, S.6
-
30
-
-
84932160299
-
-
arXiv preprint arXiv:1412.1897v2 (december)
-
Nguyen, A., Yosinski, J., and Clune, J., "Deep neural networks are easily fooled: High confidence predictions for unrecognizable images," arXiv preprint arXiv:1412.1897v2 (december 2014).
-
(2014)
Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images
-
-
Nguyen, A.1
Yosinski, J.2
Clune, J.3
-
31
-
-
0000013152
-
On the statistical analysis of dirty pictures
-
Besag, J., "On the statistical analysis of dirty pictures," Journal of the Royal Statistical Society 48(3), 259-302 (1986).
-
(1986)
Journal of the Royal Statistical Society
, vol.48
, Issue.3
, pp. 259-302
-
-
Besag, J.1
-
32
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
(april)
-
Wang, Z., Bovik, A. C., Sheikh, H. R., and Simoncelli, E. P., "Image quality assessment: From error visibility to structural similarity," IEEE Transactions on Image Processing 13, 600-612 (april 2004).
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
|