-
1
-
-
84944410438
-
A review on methods for image authentication and visual cryptography in digital image watermarking
-
[1] Vyas, C., Lunagaria, M., A review on methods for image authentication and visual cryptography in digital image watermarking. IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Coimbatore, India, 2014, 1–6.
-
(2014)
IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Coimbatore, India
, pp. 1-6
-
-
Vyas, C.1
Lunagaria, M.2
-
2
-
-
84946944489
-
A comprehensive survey on digital image watermarking techniques
-
[2] Panchal, U.H., Srivastava, R., A comprehensive survey on digital image watermarking techniques. International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, 2015, 591–595.
-
(2015)
International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India
, pp. 591-595
-
-
Panchal, U.H.1
Srivastava, R.2
-
3
-
-
84888386204
-
Information forensics an overview of the first decade
-
[3] Liu, M.C.S.W., Information forensics an overview of the first decade. IEEE Access 1 (2013), 167–200.
-
(2013)
IEEE Access
, vol.1
, pp. 167-200
-
-
Liu, M.C.S.W.1
-
4
-
-
34250330047
-
A survey of passive technology for digital image forensics
-
[4] Luo, W., Qu, Z., Pan, F., Huang, J., A survey of passive technology for digital image forensics. Front. Comput. Sci. China 1:2 (2007), 166–179.
-
(2007)
Front. Comput. Sci. China
, vol.1
, Issue.2
, pp. 166-179
-
-
Luo, W.1
Qu, Z.2
Pan, F.3
Huang, J.4
-
5
-
-
79954620294
-
Survey on passive methods of image tampering detection
-
[5] Elwin, J.G.R., Aditya, T.S., Shankar, S.M., Survey on passive methods of image tampering detection. International Conference on Communication and Computational Intelligence (INCOCCI), Erode, India, vol. 7, 2010, 431–436.
-
(2010)
International Conference on Communication and Computational Intelligence (INCOCCI), Erode, India
, vol.7
, pp. 431-436
-
-
Elwin, J.G.R.1
Aditya, T.S.2
Shankar, S.M.3
-
6
-
-
84884593770
-
Digital image forgery detection using passive techniques: a survey
-
[6] Birajdar, G.K., Mankar, V.H., Digital image forgery detection using passive techniques: a survey. Digital Invest. 10:3 (2013), 226–245.
-
(2013)
Digital Invest.
, vol.10
, Issue.3
, pp. 226-245
-
-
Birajdar, G.K.1
Mankar, V.H.2
-
7
-
-
84864277926
-
Digital image splicing detection based on Markov features in DCT and DWT domain
-
[7] He, Z., Lu, W., Sun, W., Huang, J., Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn. 45:12 (2012), 4292–4299.
-
(2012)
Pattern Recogn.
, vol.45
, Issue.12
, pp. 4292-4299
-
-
He, Z.1
Lu, W.2
Sun, W.3
Huang, J.4
-
8
-
-
38849209052
-
A natural image model approach to splicing detection
-
ACM Dallas, Texas, USA
-
[8] Shi, Y.Q., Chen, C., Chen, W., A natural image model approach to splicing detection. The 9th ACM Workshop on Multimedia and Security, 2007, ACM, Dallas, Texas, USA, 51–62.
-
(2007)
The 9th ACM Workshop on Multimedia and Security
, pp. 51-62
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
9
-
-
20444471753
-
A data set of authentic and spliced image blocks, Tech. Rep. 203-2004-3
-
Columbia University
-
[9] Ng, T.-T., Chang, S.-F., A data set of authentic and spliced image blocks, Tech. Rep. 203-2004-3. 2004, Columbia University.
-
(2004)
-
-
Ng, T.-T.1
Chang, S.-F.2
-
10
-
-
84923928810
-
Passive image-splicing detection by a 2-D noncausal Markov model
-
[10] Zhao, X., Wang, S., Li, S., Li, J., Passive image-splicing detection by a 2-D noncausal Markov model. IEEE Trans. Circ. Syst. Video Technol. 25:2 (2015), 185–199.
-
(2015)
IEEE Trans. Circ. Syst. Video Technol.
, vol.25
, Issue.2
, pp. 185-199
-
-
Zhao, X.1
Wang, S.2
Li, S.3
Li, J.4
-
11
-
-
84916896785
-
Efficient parallel framework for HEVC motion estimation on many-core processors
-
[11] Yan, C., Zhang, Y., Xu, J., Dai, F., Zhang, J., Dai, Q., Wu, F., Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trans. Circ. Syst. Video Technol. 24:12 (2014), 2077–2089.
-
(2014)
IEEE Trans. Circ. Syst. Video Technol.
, vol.24
, Issue.12
, pp. 2077-2089
-
-
Yan, C.1
Zhang, Y.2
Xu, J.3
Dai, F.4
Zhang, J.5
Dai, Q.6
Wu, F.7
-
12
-
-
84897141718
-
A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors
-
[12] Yan, C., Zhang, Y., Xu, J., Dai, F., Li, L., Dai, Q., Wu, F., A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process. Lett. 21:5 (2014), 573–576.
-
(2014)
IEEE Signal Process. Lett.
, vol.21
, Issue.5
, pp. 573-576
-
-
Yan, C.1
Zhang, Y.2
Xu, J.3
Dai, F.4
Li, L.5
Dai, Q.6
Wu, F.7
-
13
-
-
84881079714
-
Highly parallel framework for HEVC motion estimation on many-core platform
-
[13] Yan, C., Zhang, Y., Dai, F., Li, L., Highly parallel framework for HEVC motion estimation on many-core platform. Data Compression Conf. (DCC) 6:3 (2013), 63–72.
-
(2013)
Data Compression Conf. (DCC)
, vol.6
, Issue.3
, pp. 63-72
-
-
Yan, C.1
Zhang, Y.2
Dai, F.3
Li, L.4
-
14
-
-
84896986550
-
Parallel deblocking filter for HEVC on many-core processor
-
[14] Yan, C., Zhang, Y., Dai, F., Wang, X., Li, L., Dai, Q., Parallel deblocking filter for HEVC on many-core processor. Electron. Lett. 50:5 (2014), 367–368.
-
(2014)
Electron. Lett.
, vol.50
, Issue.5
, pp. 367-368
-
-
Yan, C.1
Zhang, Y.2
Dai, F.3
Wang, X.4
Li, L.5
Dai, Q.6
-
15
-
-
78650323484
-
Run-length and edge statistics based approach for image splicing detection
-
[15] Dong, J., Wang, W., Tan, T., Shi, Y.Q., Run-length and edge statistics based approach for image splicing detection. International Workshop on Digital Watermarking (IWDW), Berlin, Heidelberg, 2009, 76–87.
-
(2009)
International Workshop on Digital Watermarking (IWDW), Berlin, Heidelberg
, pp. 76-87
-
-
Dong, J.1
Wang, W.2
Tan, T.3
Shi, Y.Q.4
-
16
-
-
79959193080
-
Digital image splicing detection based on approximate run length
-
[16] He, Z., Sun, W., Lu, W., Lu, H., Digital image splicing detection based on approximate run length. Pattern Recogn. Lett. 32:12 (2011), 1591–1597.
-
(2011)
Pattern Recogn. Lett.
, vol.32
, Issue.12
, pp. 1591-1597
-
-
He, Z.1
Sun, W.2
Lu, W.3
Lu, H.4
-
17
-
-
84931070072
-
Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques
-
[17] Cozzolino, D., Gragnaniello, D., Verdoliva, L., Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques. IEEE International Conference on Image Processing (ICIP), Paris, France, 2014, 5302–5306.
-
(2014)
IEEE International Conference on Image Processing (ICIP), Paris, France
, pp. 5302-5306
-
-
Cozzolino, D.1
Gragnaniello, D.2
Verdoliva, L.3
-
18
-
-
84942540267
-
A universal image forensic strategy based on steganalytic model
-
[18] Qiu, X., Li, H., Luo, W., Huang, J., A universal image forensic strategy based on steganalytic model. Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, New York, USA, 2014, 165–170.
-
(2014)
Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, New York, USA
, pp. 165-170
-
-
Qiu, X.1
Li, H.2
Luo, W.3
Huang, J.4
-
19
-
-
84860434682
-
Rich models for steganalysis of digital images
-
[19] Fridrich, J., Kodovský, J., Rich models for steganalysis of digital images. IEEE Trans. Inform. Forensics Security 7:3 (2012), 868–882.
-
(2012)
IEEE Trans. Inform. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
20
-
-
84894123907
-
Splicing detection in out-of-focus blurred images
-
[20] Bahrami, K., Kot, A.C., Fan, J., Splicing detection in out-of-focus blurred images. IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013, 144–149.
-
(2013)
IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China
, pp. 144-149
-
-
Bahrami, K.1
Kot, A.C.2
Fan, J.3
-
21
-
-
84896468034
-
Harnessing motion blur to unveil splicing
-
[21] Rao, M.P., Rajagopalan, A.N., Seetharaman, G., Harnessing motion blur to unveil splicing. IEEE Trans. Inform. Forensics Security 9:4 (2014), 583–595.
-
(2014)
IEEE Trans. Inform. Forensics Security
, vol.9
, Issue.4
, pp. 583-595
-
-
Rao, M.P.1
Rajagopalan, A.N.2
Seetharaman, G.3
-
22
-
-
84927732158
-
Blurred image splicing localization by exposing blur type inconsistency
-
[22] Bahrami, K., Kot, A.C., Li, L., Li, H., Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans. Inform. Forensics Security 10:5 (2015), 999–1009.
-
(2015)
IEEE Trans. Inform. Forensics Security
, vol.10
, Issue.5
, pp. 999-1009
-
-
Bahrami, K.1
Kot, A.C.2
Li, L.3
Li, H.4
-
23
-
-
84905265664
-
Image tampering detection by exposing blur type inconsistency
-
[23] Do, M.N., Vetterl, M., Image tampering detection by exposing blur type inconsistency. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, 2014, 2654–2658.
-
(2014)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy
, pp. 2654-2658
-
-
Do, M.N.1
Vetterl, M.2
-
24
-
-
0035167528
-
Pyramidal directional filter banks and curvelets
-
[24] Do, M.N., Vetterl, M., Pyramidal directional filter banks and curvelets. IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece, vol. 3, 2001, 158–161.
-
(2001)
IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece
, vol.3
, pp. 158-161
-
-
Do, M.N.1
Vetterl, M.2
-
25
-
-
28944432472
-
The contourlet transform: an efficient directional multiresolution image representation
-
[25] Do, M.N., Vetterli, M., The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans. Image Process. 14:12 (2005), 2091–2106.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.12
, pp. 2091-2106
-
-
Do, M.N.1
Vetterli, M.2
-
26
-
-
33646883645
-
Directional multiscale modeling of images using the contourlet transform
-
[26] Po, D.D.-Y., Do, M.N., Directional multiscale modeling of images using the contourlet transform. IEEE Trans. Image Process. 15:6 (2006), 1610–1620.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.6
, pp. 1610-1620
-
-
Po, D.D.-Y.1
Do, M.N.2
-
27
-
-
0036161259
-
Gene selection for cancer classification using support vector machines
-
[27] Guyon, I., Weston, J., Barnhill, S., Vapnik, V., Gene selection for cancer classification using support vector machines. Machine Learn. 46 (2002), 389–422.
-
(2002)
Machine Learn.
, vol.46
, pp. 389-422
-
-
Guyon, I.1
Weston, J.2
Barnhill, S.3
Vapnik, V.4
-
28
-
-
77951953873
-
Effective image splicing detection based on image chroma
-
[28] Wang, W., Dong, J., Tan, T., Effective image splicing detection based on image chroma. IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009, 1257–1260.
-
(2009)
IEEE International Conference on Image Processing (ICIP), Cairo, Egypt
, pp. 1257-1260
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
29
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
[29] Kodovský, J., Fridrich, J., Holub, V., Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inform. Forensics Security 7:2 (2012), 432–444.
-
(2012)
IEEE Trans. Inform. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
30
-
-
79954474492
-
Steganalysis in high dimensions: fusing classifiers built on random subspaces
-
[30] Kodovský, J., Fridrich, J., Steganalysis in high dimensions: fusing classifiers built on random subspaces. Proceedings of SPIE: Media Watermarking, Security, and Forensics III, California, USA, vol. 7880, 2011, 181–197.
-
(2011)
Proceedings of SPIE: Media Watermarking, Security, and Forensics III, California, USA
, vol.7880
, pp. 181-197
-
-
Kodovský, J.1
Fridrich, J.2
-
31
-
-
84929254527
-
A feature-based approach for image tampering detection and localization
-
[31] Verdoliva, L., Cozzolino, D., Poggi, G., A feature-based approach for image tampering detection and localization. IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, USA, 2014, 149–154.
-
(2014)
IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, USA
, pp. 149-154
-
-
Verdoliva, L.1
Cozzolino, D.2
Poggi, G.3
-
33
-
-
79953662386
-
Revealing digital fakery using multiresolution decomposition and higher order statistics
-
[33] Lu, W., Sun, W., Chung, F.-L., Lu, H., Revealing digital fakery using multiresolution decomposition and higher order statistics. Eng. Appl. Artif. Intell. 24:4 (2011), 666–672.
-
(2011)
Eng. Appl. Artif. Intell.
, vol.24
, Issue.4
, pp. 666-672
-
-
Lu, W.1
Sun, W.2
Chung, F.-L.3
Lu, H.4
-
34
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
[34] Pevný, T., Bas, P., Fridrich, J., Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inform. Forensics Security 5:2 (2010), 215–224.
-
(2010)
IEEE Trans. Inform. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
35
-
-
58349116041
-
Steganalysis versus splicing detection
-
[35] Shi, Y.Q., Chen, C., Xuan, G., Su, W., Steganalysis versus splicing detection. International Workshop on Digital Watermarking (IWDW), Busan, Korea, 2008, 158–172.
-
(2008)
International Workshop on Digital Watermarking (IWDW), Busan, Korea
, pp. 158-172
-
-
Shi, Y.Q.1
Chen, C.2
Xuan, G.3
Su, W.4
|