-
1
-
-
84882957962
-
Robust median filtering forensics using an autoregressive model
-
Sep.
-
X. Kang, M. C. Stamm, A. Peng, and K. J. Ray Liu, "Robust median filtering forensics using an autoregressive model," IEEE Trans. Inf. Forensics Security, vol. 8, no. 9, pp. 1456-1468, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.9
, pp. 1456-1468
-
-
Kang, X.1
Stamm, M.C.2
Peng, A.3
Ray Liu, K.J.4
-
2
-
-
82055176931
-
Blind forensics of median filtering in digital images
-
Dec.
-
H. Yuan, "Blind forensics of median filtering in digital images," IEEE Trans. Inf. Forensics Security, vol. 6, no. 4, pp. 1335-1345, Dec. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.4
, pp. 1335-1345
-
-
Yuan, H.1
-
3
-
-
77951863205
-
On detection of median filtering in digital images
-
M. Kirchner and J. Fridrich, "On detection of median filtering in digital images," in Proc. SPIE, Electron. Imaging, Media Forensics, Security II, 2010, vol. 7541, pp. 1-12.
-
Proc. SPIE, Electron. Imaging, Media Forensics, Security II, 2010
, vol.7541
, pp. 1-12
-
-
Kirchner, M.1
Fridrich, J.2
-
4
-
-
84885127873
-
Blind median filtering detection using statistics in difference domain
-
C. Chen, J. Ni, R. Huang, and J. Huang, "Blind median filtering detection using statistics in difference domain," in Proc. Inf. Hiding, Berkeley, CA, USA, May 2012.
-
Proc. Inf. Hiding, Berkeley, CA, USA, May 2012
-
-
Chen, C.1
Ni, J.2
Huang, R.3
Huang, J.4
-
5
-
-
78349262619
-
Forensic detection of median filtering in digital images
-
G. Cao, Y. Zhao, R. Ni, L. Yu, and H. Tian, "Forensic detection of median filtering in digital images," in Proc. IEEE Int. Conf. Multimedia Expo, 2010, pp. 89-94.
-
Proc. IEEE Int. Conf. Multimedia Expo, 2010
, pp. 89-94
-
-
Cao, G.1
Zhao, Y.2
Ni, R.3
Yu, L.4
Tian, H.5
-
6
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
Feb.
-
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of resampling," IEEE Trans. Signal Process., vol. 53, no. 2, pp. 758-767, Feb. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
7
-
-
77955676537
-
JPEG error analysis and its applications to digital image forensics
-
Sep.
-
W. Q. Luo, J. W. Huang, and G. P. Qiu, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 480-491, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.Q.1
Huang, J.W.2
Qiu, G.P.3
-
8
-
-
78049407658
-
Forensic estimation and reconstruction of a contrast enhancement mapping
-
M. C. Stamm and K. J. R. Liu, "Forensic estimation and reconstruction of a contrast enhancement mapping," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Dallas, TX, USA, 2010, pp. 1698-1701.
-
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Dallas, TX, USA, 2010
, pp. 1698-1701
-
-
Stamm, M.C.1
Liu, K.J.R.2
-
9
-
-
80051605162
-
Anti-forensics of digital image compression
-
Sep.
-
M. C. Stamm and K. J. Ray Liu, "Anti-forensics of digital image compression," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1050-1065, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 1050-1065
-
-
Stamm, M.C.1
Ray Liu, K.J.2
-
10
-
-
56749180518
-
Hiding traces of resampling in digital images
-
Dec.
-
M. Kirchner and R. Bohme, "Hiding traces of resampling in digital images," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 582-592, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 582-592
-
-
Kirchner, M.1
Bohme, R.2
-
12
-
-
59449087310
-
Exploring strategies for training deep neural networks
-
H. Larochelle, Y. Bengio, J. Louradour, and P. Lamblin, "Exploring strategies for training deep neural networks," J. Mach. Learn. Res., vol. 10, pp. 1-40, 2009.
-
(2009)
J. Mach. Learn. Res.
, vol.10
, pp. 1-40
-
-
Larochelle, H.1
Bengio, Y.2
Louradour, J.3
Lamblin, P.4
-
13
-
-
0032203257
-
Gradient-based learning applied to document recognition
-
Nov.
-
Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, "Gradient-based learning applied to document recognition, in," Proc. IEEE, vol. 86, no. 11, pp. 2278-2324, Nov. 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.11
, pp. 2278-2324
-
-
LeCun, Y.1
Bottou, L.2
Bengio, Y.3
Haffner, P.4
-
14
-
-
56449095373
-
A unified architecture for natural language processing: Deep neural networks with multitask learning
-
R. Collobert and J. Weston, "A unified architecture for natural language processing: Deep neural networks with multitask learning," in Proc. 25th Int. Conf. Mach. Learn., 2008, pp. 160-167.
-
Proc. 25th Int. Conf. Mach. Learn., 2008
, pp. 160-167
-
-
Collobert, R.1
Weston, J.2
-
15
-
-
0029710033
-
Evolutionary design of artificial neural networks with different nodes
-
Y. Liu and X. Yao, "Evolutionary design of artificial neural networks with different nodes," in Proc. IEEE Int. Conf. Evol. Comput., 1996, pp. 670-675.
-
Proc. IEEE Int. Conf. Evol. Comput., 1996
, pp. 670-675
-
-
Liu, Y.1
Yao, X.2
-
17
-
-
77955993281
-
Learning mid-level features for recognition
-
Y. Boureau, F. Bach, Y. LeCun, and j. Ponce, "Learning mid-level features for recognition," in Proc. IEEE Conf. Comput. Vis. Pattern Recogn. (CVPR), 2010, pp. 2559-2566.
-
Proc. IEEE Conf. Comput. Vis. Pattern Recogn. (CVPR), 2010
, pp. 2559-2566
-
-
Boureau, Y.1
Bach, F.2
LeCun, Y.3
Ponce, J.4
-
18
-
-
0346325932
-
Convolutional neural networks for image processing: An application in robot vision
-
M. Browne and S. S. Ghidary, "Convolutional neural networks for image processing: An application in robot vision," in Proc. AI 2003: Advances in Artif. Intell., 2003, pp. 641-652.
-
Proc. AI 2003: Advances in Artif. Intell., 2003
, pp. 641-652
-
-
Browne, M.1
Ghidary, S.S.2
-
19
-
-
84876231242
-
Imagenet classification with deep convolutional neural networks
-
A. Krizhevsky, I. Sutskever, and G. Hinton, "Imagenet classification with deep convolutional neural networks," Adv. Neural Inf. Process. Syst., pp. 1097-1105, 2012.
-
(2012)
Adv. Neural Inf. Process. Syst
, pp. 1097-1105
-
-
Krizhevsky, A.1
Sutskever, I.2
Hinton, G.3
-
20
-
-
80053005547
-
Break our steganographic system:The ins and outs of organizing boss
-
P. Bas, T. Filler, and T. Pevny, "Break our steganographic system:The ins and outs of organizing boss," Inf. Hiding, pp. 59-70, 2011.
-
(2011)
Inf. Hiding
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevny, T.3
-
21
-
-
8844280843
-
UCID-An uncompressed color image database
-
G. Schaefer and M. Stich, "UCID-An uncompressed color image database," in Proc. SPIE, Storage Retrieval Meth. Applicat. Multimedia, 2004, pp. 472-480.
-
Proc. SPIE, Storage Retrieval Meth. Applicat. Multimedia, 2004
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
22
-
-
84933061491
-
-
[Online]. Available
-
[Online]. Available: http://exile.felk.cvut.cz/boss/BOSSFinal/index.php?mode=VIEW&tmpl=materials
-
-
-
|