-
1
-
-
84873344889
-
Efficient method for content reconstruction with self-embedding
-
Mar.
-
P. Korus and A. Dziech, "Efficient method for content reconstruction with self-embedding, " IEEE Trans. Image Process., vol. 22, no. 3, pp. 1134-1147, Mar. 2013.
-
(2013)
IEEE Trans. Image Process
, vol.22
, Issue.3
, pp. 1134-1147
-
-
Korus, P.1
Dziech, A.2
-
2
-
-
84921498365
-
Towards practical self-embedding for JPEG-compressed digital images
-
Feb.
-
P. Korus, J. Bialas, and A. Dziech, "Towards practical self-embedding for JPEG-compressed digital images, " IEEE Trans. Multimedia, vol. 17, no. 2, pp. 157-170, Feb. 2015.
-
(2015)
IEEE Trans. Multimedia
, vol.17
, Issue.2
, pp. 157-170
-
-
Korus, P.1
Bialas, J.2
Dziech, A.3
-
3
-
-
84928137994
-
A source-channel coding approach to digital image protection and self-recovery
-
Jul.
-
S. Sarreshtedari and M. A. Akhaee, "A source-channel coding approach to digital image protection and self-recovery, " IEEE Trans. Image Process., vol. 24, no. 7, pp. 2266-2277, Jul. 2015.
-
(2015)
IEEE Trans. Image Process
, vol.24
, Issue.7
, pp. 2266-2277
-
-
Sarreshtedari, S.1
Akhaee, M.A.2
-
4
-
-
85032768213
-
Image forgery detection
-
Mar.
-
H. Farid, "Image forgery detection, " IEEE Signal Process. Mag., vol. 26, no. 2, pp. 16-25, Mar. 2009.
-
(2009)
IEEE Signal Process. Mag
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
5
-
-
84888386204
-
Information forensics: An overview of the first decade
-
May
-
M. C. Stamm, M. Wu, and K. J. R. Liu, "Information forensics: An overview of the first decade, " IEEE Access, vol. 1, pp. 167-200, May 2013.
-
(2013)
IEEE Access
, vol.1
, pp. 167-200
-
-
Stamm, M.C.1
Wu, M.2
Liu, K.J.R.3
-
6
-
-
84929260895
-
Splicing forgeries localization through the use of first digit features
-
Dec.
-
I. Amerini, R. Becarelli, R. Caldelli, and A. Del Mastio, "Splicing forgeries localization through the use of first digit features, " in Proc. IEEE Int. Workshop Inf. Forensics Secur., Dec. 2014, pp. 143-148.
-
(2014)
Proc. IEEE Int. Workshop Inf. Forensics Secur.
, pp. 143-148
-
-
Amerini, I.1
Becarelli, R.2
Caldelli, R.3
Del Mastio, A.4
-
7
-
-
84896478610
-
A Bayesian-MRF approach for PRNU-based image forgery detection
-
Apr.
-
G. Chierchia, G. Poggi, C. Sansone, and L. Verdoliva, "A Bayesian-MRF approach for PRNU-based image forgery detection, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 554-567, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.4
, pp. 554-567
-
-
Chierchia, G.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
9
-
-
84922819070
-
Revealing the trace of highquality JPEG compression through quantization noise analysis
-
Mar.
-
B. Li, T.-T. Ng, X. Li, S. Tan, and J. Huang, "Revealing the trace of highquality JPEG compression through quantization noise analysis, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 558-573, Mar. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.3
, pp. 558-573
-
-
Li, B.1
Ng, T.-T.2
Li, X.3
Tan, S.4
Huang, J.5
-
10
-
-
67649410199
-
Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
-
Z. Lin, J. He, X. Tang, and C.-K. Tang, "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis, " Pattern Recognit., vol. 42, no. 11, pp. 2492-2501, 2009.
-
(2009)
Pattern Recognit
, vol.42
, Issue.11
, pp. 2492-2501
-
-
Lin, Z.1
He, J.2
Tang, X.3
Tang, C.-K.4
-
11
-
-
84861122288
-
Image forgery localization via block-grained analysis of JPEG artifacts
-
Jun.
-
T. Bianchi and A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1003-1017, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 1003-1017
-
-
Bianchi, T.1
Piva, A.2
-
12
-
-
84907466175
-
Exploring DCT coefficient quantization effects for local tampering detection
-
Oct.
-
W. Wang, J. Dong, and T. Tan, "Exploring DCT coefficient quantization effects for local tampering detection, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1653-1666, Oct. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.10
, pp. 1653-1666
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
13
-
-
33750838172
-
Approaches to multisensor data fusion in target tracking: A survey
-
Dec.
-
S. Duncan and S. Sameer, "Approaches to multisensor data fusion in target tracking: A survey, " IEEE Trans. Knowl. Data Eng., vol. 18, no. 12, pp. 1696-1710, Dec. 2006.
-
(2006)
IEEE Trans. Knowl. Data Eng
, vol.18
, Issue.12
, pp. 1696-1710
-
-
Duncan, S.1
Sameer, S.2
-
14
-
-
34548629412
-
Information fusion for wireless sensor networks: Methods, models, and classifications
-
Sep.
-
E. F. Nakamura, A. A. F. Loureiro, and A. C. Frery, "Information fusion for wireless sensor networks: Methods, models, and classifications, " ACM Comput. Surv., vol. 39, no. 3, Sep. 2007, Art. ID 9.
-
(2007)
ACM Comput. Surv
, vol.39
, Issue.3
-
-
Nakamura, E.F.1
Loureiro, A.A.F.2
Frery, A.C.3
-
15
-
-
84881530095
-
Trust and independence aware decision fusion in distributed networks
-
Mar.
-
X. Wang, J.-H. Cho, K. Chan, M. Chang, A. Swami, and P. Mohapatra, "Trust and independence aware decision fusion in distributed networks, " in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, Mar. 2013, pp. 481-486.
-
(2013)
Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops
, pp. 481-486
-
-
Wang, X.1
Cho, J.-H.2
Chan, K.3
Chang, M.4
Swami, A.5
Mohapatra, P.6
-
16
-
-
0022604939
-
Optimal data fusion in multiple sensor detection systems
-
Jan.
-
Z. Chair and P. K. Varshney, "Optimal data fusion in multiple sensor detection systems, " IEEE Trans. Aerosp. Electron. Syst., vol. AES-22, no. 1, pp. 98-101, Jan. 1986.
-
(1986)
IEEE Trans. Aerosp. Electron. Syst
, vol.AES-22
, Issue.1
, pp. 98-101
-
-
Chair, Z.1
Varshney, P.K.2
-
17
-
-
33748611921
-
Ensemble based systems in decision making
-
Sep.
-
R. Polikar, "Ensemble based systems in decision making, " IEEE Circuits Syst. Mag., vol. 6, no. 3, pp. 21-45, Sep. 2006.
-
(2006)
IEEE Circuits Syst. Mag
, vol.6
, Issue.3
, pp. 21-45
-
-
Polikar, R.1
-
18
-
-
75149176174
-
Ensemble-based classifiers
-
L. Rokach, "Ensemble-based classifiers, " Artif. Intell. Rev., vol. 33, nos. 1-2, pp. 1-39, 2010.
-
(2010)
Artif. Intell. Rev
, vol.33
, Issue.1-2
, pp. 1-39
-
-
Rokach, L.1
-
19
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Apr.
-
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
20
-
-
84929245888
-
Multi-clue image tampering localization
-
Dec.
-
L. Gaborini, P. Bestagini, S. Milani, M. Tagliasacchi, and S. Tubaro, "Multi-clue image tampering localization, " in Proc. IEEE Int. Workshop Inf. Forensics Secur., Dec. 2014, pp. 125-130.
-
(2014)
Proc. IEEE Int. Workshop Inf. Forensics Secur.
, pp. 125-130
-
-
Gaborini, L.1
Bestagini, P.2
Milani, S.3
Tagliasacchi, M.4
Tubaro, S.5
-
21
-
-
84874819920
-
A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence
-
Apr.
-
M. Fontani, T. Bianchi, A. De Rosa, A. Piva, and M. Barni, "A framework for decision fusion in image forensics based on Dempster-Shafer theory of evidence, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 593-607, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 593-607
-
-
Fontani, M.1
Bianchi, T.2
De Rosa, A.3
Piva, A.4
Barni, M.5
-
23
-
-
84884706379
-
Multiple classifier systems for image forgery detection
-
Naples, Italy: Springer, Sep.
-
D. Cozzolino, F. Gargiulo, C. Sansone, and L. Verdoliva, "Multiple classifier systems for image forgery detection, " in Image Analysis and Processing (Lecture Notes in Computer Science), vol. 8157. Naples, Italy: Springer, Sep. 2013, pp. 259-268.
-
(2013)
Image Analysis and Processing (Lecture Notes in Computer Science)
, vol.8157
, pp. 259-268
-
-
Cozzolino, D.1
Gargiulo, F.2
Sansone, C.3
Verdoliva, L.4
-
24
-
-
84945576160
-
Unsupervised fusion for forgery localization exploiting background information
-
Jun. /Jul.
-
P. Ferrara, M. Fontani, T. Bianchi, A. De Rosa, A. Piva, and M. Barni, "Unsupervised fusion for forgery localization exploiting background information, " in Proc. IEEE Int. Conf. Multimedia & Expo Workshops, Jun. /Jul. 2015, pp. 1-6.
-
(2015)
Proc. IEEE Int. Conf. Multimedia & Expo Workshops
, pp. 1-6
-
-
Ferrara, P.1
Fontani, M.2
Bianchi, T.3
De Rosa, A.4
Piva, A.5
Barni, M.6
-
25
-
-
2142812371
-
Robust real-time face detection
-
P. Viola and M. J. Jones, "Robust real-time face detection, " Int. J. Comput. Vis., vol. 57, no. 2, pp. 137-154, 2004.
-
(2004)
Int. J. Comput. Vis
, vol.57
, Issue.2
, pp. 137-154
-
-
Viola, P.1
Jones, M.J.2
-
26
-
-
0021523075
-
Pyramid methods in image processing
-
E. H. Adelson, C. H. Anderson, J. R. Bergen, P. J. Burt, and J. M. Ogden, "Pyramid methods in image processing, " RCA Eng., vol. 29, no. 6, pp. 33-41, 1984.
-
(1984)
RCA Eng
, vol.29
, Issue.6
, pp. 33-41
-
-
Adelson, E.H.1
Anderson, C.H.2
Bergen, J.R.3
Burt, P.J.4
Ogden, J.M.5
-
27
-
-
35349023757
-
Depth-of-field rendering by pyramidal image processing
-
M. Kraus and M. Strengert, "Depth-of-field rendering by pyramidal image processing, " Comput. Graph. Forum, vol. 26, no. 3, pp. 645-654, 2007.
-
(2007)
Comput. Graph. Forum
, vol.26
, Issue.3
, pp. 645-654
-
-
Kraus, M.1
Strengert, M.2
-
28
-
-
80053020642
-
Improving denoising algorithms via a multi-scale meta-procedure
-
Berlin, Germany: Springer
-
C. Burger and S. Harmeling, "Improving denoising algorithms via a multi-scale meta-procedure, " in Pattern Recognition (Lecture Notes in Computer Science), vol. 6835. Berlin, Germany: Springer, 2011, pp. 206-215.
-
(2011)
Pattern Recognition (Lecture Notes in Computer Science)
, vol.6835
, pp. 206-215
-
-
Burger, C.1
Harmeling, S.2
-
29
-
-
84949927038
-
Image denoising through multi-scale learnt dictionaries
-
Oct.
-
J. Sulam, B. Ophir, and M. Elad, "Image denoising through multi-scale learnt dictionaries, " in Proc. IEEE Int. Conf. Image Process., Oct. 2014, pp. 808-812.
-
(2014)
Proc. IEEE Int. Conf. Image Process.
, pp. 808-812
-
-
Sulam, J.1
Ophir, B.2
Elad, M.3
-
30
-
-
84947265962
-
A computational approach for obstruction-free photography
-
Jul.
-
T. Xue, M. Rubinstein, C. Liu, and W. T. Freeman, "A computational approach for obstruction-free photography, " ACM Trans. Graph., vol. 34, no. 4, Jul. 2015, Art. ID 79.
-
(2015)
ACM Trans. Graph
, vol.34
, Issue.4
-
-
Xue, T.1
Rubinstein, M.2
Liu, C.3
Freeman, W.T.4
-
31
-
-
79955668981
-
Image and video upscaling from local selfexamples
-
G. Freedman and R. Fattal, "Image and video upscaling from local selfexamples, " ACM Trans. Graph., vol. 30, no. 2, 2011, Art. ID 12.
-
(2011)
ACM Trans. Graph
, vol.30
, Issue.2
-
-
Freedman, G.1
Fattal, R.2
-
32
-
-
34247591912
-
Supervised texture classification by integration of multiple texture methods and evaluation windows
-
M. A. Garcia and D. Puig, "Supervised texture classification by integration of multiple texture methods and evaluation windows, " Image Vis. Comput., vol. 25, no. 7, pp. 1091-1106, 2007.
-
(2007)
Image Vis. Comput
, vol.25
, Issue.7
, pp. 1091-1106
-
-
Garcia, M.A.1
Puig, D.2
-
33
-
-
84908043069
-
Single image defogging by multiscale depth fusion
-
Nov.
-
Y. Wang and C. Fan, "Single image defogging by multiscale depth fusion, " IEEE Trans. Image Process., vol. 23, no. 11, pp. 4826-4837, Nov. 2014.
-
(2014)
IEEE Trans. Image Process
, vol.23
, Issue.11
, pp. 4826-4837
-
-
Wang, Y.1
Fan, C.2
-
34
-
-
78651066490
-
Spatio-temporal combination of saliency maps and eye-tracking assessment of different strategies
-
Sep.
-
C. Chamaret, J. C. Chevet, and O. Le Meur, "Spatio-temporal combination of saliency maps and eye-tracking assessment of different strategies, " in Proc. 17th IEEE Int. Conf. Image Process., Sep. 2010, pp. 1077-1080.
-
(2010)
Proc. 17th IEEE Int. Conf. Image Process.
, pp. 1077-1080
-
-
Chamaret, C.1
Chevet, J.C.2
Le Meur, O.3
-
35
-
-
84897775416
-
A performance evaluation of fusion techniques for spatio-temporal saliency detection in dynamic scenes
-
Sep.
-
S. M. Muddamsetty, D. Sidibe, A. Tremeau, and F. Meriaudeau, "A performance evaluation of fusion techniques for spatio-temporal saliency detection in dynamic scenes, " in Proc. IEEE Int. Conf. Image Process., Sep. 2013, pp. 3924-3928.
-
(2013)
Proc. IEEE Int. Conf. Image Process.
, pp. 3924-3928
-
-
Muddamsetty, S.M.1
Sidibe, D.2
Tremeau, A.3
Meriaudeau, F.4
-
36
-
-
84885613865
-
Saliency map fusion based on rank-one constraint
-
Jul.
-
X. Cao, Z. Tao, B. Zhang, H. Fu, and X. Li, "Saliency map fusion based on rank-one constraint, " in Proc. Int. Conf. Multimedia Expo, Jul. 2013, pp. 1-6.
-
(2013)
Proc. Int. Conf. Multimedia Expo
, pp. 1-6
-
-
Cao, X.1
Tao, Z.2
Zhang, B.3
Fu, H.4
Li, X.5
-
37
-
-
84866641899
-
Boosting bottom-up and top-down visual features for saliency estimation
-
Jun.
-
A. Borji, "Boosting bottom-up and top-down visual features for saliency estimation, " in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2012, pp. 438-445.
-
(2012)
Proc. IEEE Conf. Comput. Vis. Pattern Recognit.
, pp. 438-445
-
-
Borji, A.1
-
38
-
-
58049107658
-
Detecting doubly compressed JPEG images by using mode based first digit features
-
Oct.
-
B. Li, Y. Q. Shi, and J. Huang, "Detecting doubly compressed JPEG images by using mode based first digit features, " in Proc. IEEE 10th Workshop Multimedia Signal Process., Oct. 2008, pp. 730-735.
-
(2008)
Proc. IEEE 10th Workshop Multimedia Signal Process.
, pp. 730-735
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
41
-
-
0041663489
-
Recompression of JPEG images by requantization
-
Jul.
-
H. H. Bauschke, C. Hamilton, M. Macklem, J. McMichael, and N. Swart, "Recompression of JPEG images by requantization, " IEEE Trans. Image Process., vol. 12, no. 7, pp. 843-849, Jul. 2003.
-
(2003)
IEEE Trans. Image Process
, vol.12
, Issue.7
, pp. 843-849
-
-
Bauschke, H.H.1
Hamilton, C.2
Macklem, M.3
McMichael, J.4
Swart, N.5
-
42
-
-
77951959501
-
Toward optimal real-time transcoding using requantization in the DCT domain
-
Nov.
-
O. Gendler and M. Porat, "Toward optimal real-time transcoding using requantization in the DCT domain, " in Proc. 16th IEEE Int. Conf. Image Process., Nov. 2009, pp. 3677-3680.
-
(2009)
Proc. 16th IEEE Int. Conf. Image Process.
, pp. 3677-3680
-
-
Gendler, O.1
Porat, M.2
-
43
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
Mar.
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukás, "Determining image origin and integrity using sensor noise, " IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 74-90, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukás, J.4
-
46
-
-
0035509961
-
Fast approximate energy minimization via graph cuts
-
Nov.
-
Y. Boykov, O. Veksler, and R. Zabih, "Fast approximate energy minimization via graph cuts, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no. 11, pp. 1222-1239, Nov. 2001.
-
(2001)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.23
, Issue.11
, pp. 1222-1239
-
-
Boykov, Y.1
Veksler, O.2
Zabih, R.3
-
47
-
-
4344598245
-
An experimental comparison of mincut/ max-flow algorithms for energy minimization in vision
-
Sep.
-
Y. Boykov and V. Kolmogorov, "An experimental comparison of mincut/ max-flow algorithms for energy minimization in vision, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 26, no. 9, pp. 1124-1137, Sep. 2004.
-
(2004)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.26
, Issue.9
, pp. 1124-1137
-
-
Boykov, Y.1
Kolmogorov, V.2
-
49
-
-
84905259148
-
Guided filtering for PRNU-based localization of small-size image forgeries
-
May
-
G. Chierchia, D. Cozzolino, G. Poggi, C. Sansone, and L. Verdoliva, "Guided filtering for PRNU-based localization of small-size image forgeries, " in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., May 2014, pp. 6231-6235.
-
(2014)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 6231-6235
-
-
Chierchia, G.1
Cozzolino, D.2
Poggi, G.3
Sansone, C.4
Verdoliva, L.5
-
50
-
-
84870264329
-
An evaluation of popular copy-move forgery detection approaches
-
Dec.
-
V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1841-1854, Dec. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.6
, pp. 1841-1854
-
-
Christlein, V.1
Riess, C.2
Jordan, J.3
Riess, C.4
Angelopoulou, E.5
-
51
-
-
0344120654
-
Discriminative random fields: A discriminative framework for contextual interaction in classification
-
Oct.
-
S. Kumar and M. Hebert, "Discriminative random fields: A discriminative framework for contextual interaction in classification, " in Proc. IEEE Int. Conf. Comput. Vis., vol. 2. Oct. 2003, pp. 1150-1157
-
(2003)
Proc. IEEE Int. Conf. Comput. Vis
, vol.2
, pp. 1150-1157
-
-
Kumar, S.1
Hebert, M.2
|