-
1
-
-
84954462362
-
Higher-order wavelet statistics and their application to digital forensics
-
Madison, Wisconsin, USA
-
H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics, " in Computer Vision and Pattern Recognition Workshop, 2003. CVPRW 03. Conference on, Madison, Wisconsin, USA, 2003, pp. 94-94.
-
(2003)
Computer Vision and Pattern Recognition Workshop 2003 CVPRW 03. Conference on
, pp. 94
-
-
Farid, H.1
Lyu, S.2
-
2
-
-
0742272656
-
Fast fingerprint verification using subregions of fingerprint images
-
Jan
-
K. C. Chan, Y. S. Moon, and P. S. Cheng, "Fast fingerprint verification using subregions of fingerprint images, " IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 95-101, Jan. 2004.
-
(2004)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 95-101
-
-
Chan, K.C.1
Moon, Y.S.2
Cheng, P.S.3
-
3
-
-
38849209052
-
A natural image model approach to splicing detection
-
(MM & Sec), Dallas, TX, USA
-
Y. Q. Shi, C. Chen, and W. Chen, "A natural image model approach to splicing detection, " in Proceedings of the 9th workshop on Multimedia & security. (MM & Sec), Dallas, TX, USA, 2007, pp. 51-62.
-
(2007)
Proceedings of the 9th Workshop on Multimedia & Security
, pp. 51-62
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
4
-
-
84864277926
-
Digital image splicing detection based on Markov features in DCT and DWT domain
-
Dec
-
Z. He, W. Lu, W. Sun, and J. Huang, "Digital image splicing detection based on Markov features in DCT and DWT domain, " Pattern Recognit., vol. 45, no. 12, pp. 4292-4299, Dec. 2012.
-
(2012)
Pattern Recognit
, vol.45
, Issue.12
, pp. 4292-4299
-
-
He, Z.1
Lu, W.2
Sun, W.3
Huang, J.4
-
5
-
-
84923928810
-
Passive image-splicing detection by a 2-d noncausal markov model
-
Feb
-
X. Zhao, S. Wang, S. Li and J. Li, "Passive Image-Splicing Detection by a 2-D Noncausal Markov Model, " in IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 2, pp. 185-199, Feb. 2015.
-
(2015)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.25
, Issue.2
, pp. 185-199
-
-
Zhao, X.1
Wang, S.2
Li, S.3
Li, J.4
-
6
-
-
84920258985
-
Exposing region splicing forgeries with blind local noise estimation
-
S. Lyu, X. Pan, and X. Zhang, "Exposing Region Splicing Forgeries with Blind Local Noise Estimation, " International Journal of Computer Vision, vol. 110, no. 2, pp. 202-221, 2014.
-
(2014)
International Journal of Computer Vision
, vol.110
, Issue.2
, pp. 202-221
-
-
Lyu, S.1
Pan, X.2
Zhang, X.3
-
7
-
-
84997558821
-
Image forgery detection using steerable pyramid transform and local binary pattern
-
G. Muhammad, M. Al-Hammadi, M. Hussain, G. Bebis, "Image forgery detection using steerable pyramid transform and local binary pattern, " Machine Vision and Applications, pp. 1-11, 2013.
-
(2013)
Machine Vision and Applications
, pp. 1-11
-
-
Muhammad, G.1
Al-Hammadi, M.2
Hussain, M.3
Bebis, G.4
-
9
-
-
85161980001
-
Sparse deep belief net model for visual area V2
-
H. Lee, C. Ekanadham, and A.Y. Ng., "Sparse deep belief net model for visual area V2", in Advances in Neural Information Processing Systems (NIPS) 20, 2008.
-
Advances in Neural Information Processing Systems (NIPS)
, vol.20
, pp. 2008
-
-
Lee, H.1
Ekanadham, C.2
Ng, A.Y.3
-
10
-
-
59449087310
-
Exploring strategies for training deep neural networks
-
Larochelle, Hugo, et al. "Exploring Strategies for Training Deep Neural Networks." Journal of Machine Learning Research 10.10(2009):1-40.
-
(2009)
Journal of Machine Learning Research
, vol.10
, Issue.10
, pp. 1-40
-
-
Hugo, L.1
-
11
-
-
0032203257
-
Gradient-based learning applied to document recognition
-
IEEE Nov
-
Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, "Gradient-based learning applied to document recognition, " in Proceedings of the IEEE, vol. 86, no. 11, pp. 2278-2324, Nov. 1998.
-
(1998)
Proceedings of the
, vol.86
, Issue.11
, pp. 2278-2324
-
-
Lecun, Y.1
Bottou, L.2
Bengio, Y.3
Haffner, P.4
-
12
-
-
84876231242
-
Imagenet classification with deep convolutional neural networks
-
A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks, " in Advances in Neural Information Processing Systems (NIPS), 2012, pp. 1097-1105.
-
(2012)
Advances in Neural Information Processing Systems (NIPS)
, pp. 1097-1105
-
-
Krizhevsky, A.1
Sutskever, I.2
Hinton, G.E.3
-
13
-
-
84901999583
-
Convolutional neural networks for distant speech recognition
-
Sept
-
P. Swietojanski, A. Ghoshal, and S. Renals, "Convolutional neural networks for distant speech recognition, " in IEEE Signal Processing Letters. , vol. 21, no. 9, pp. 1120-1124, Sept. 2014.
-
(2014)
IEEE Signal Processing Letters
, vol.21
, Issue.9
, pp. 1120-1124
-
-
Swietojanski, P.1
Ghoshal, A.2
Renals, S.3
-
14
-
-
84933053045
-
Median filtering forensics based on convolutional neural networks
-
Nov
-
J. Chen, X. Kang, Y. Liu and Z. J. Wang, "Median Filtering Forensics Based on Convolutional Neural Networks, " in IEEE Signal Processing Letters, vol. 22, no. 11, pp. 1849-1853, Nov. 2015.
-
(2015)
IEEE Signal Processing Letters
, vol.22
, Issue.11
, pp. 1849-1853
-
-
Chen, J.1
Kang, X.2
Liu, Y.3
Wang, Z.J.4
-
15
-
-
85015023532
-
Image region forgery detection: A deep learning approach
-
Z. Ying, J. Goha, L. Wina and V. Thinga, "Image Region Forgery Detection: A Deep Learning Approach, " in Proceedings of the Singapore Cyber-Security Conference (SG-CRC), 2016, vol. 14, p. 1-11.
-
(2016)
Proceedings of the Singapore Cyber-Security Conference (SG-CRC)
, vol.14
, pp. 1-11
-
-
Ying, Z.1
Goha, J.2
Wina, L.3
Thinga, V.4
-
17
-
-
84860434682
-
Rich models for steganalysis of digital images
-
June
-
J. Fridrich, and J. Kodovsḱy, "Rich models for steganalysis of digital images, " IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, June 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovsḱy, J.2
-
19
-
-
77955993281
-
Learning mid-level features for recognition
-
San Francisco, CA
-
Boureau, Ylan, et al. "Learning mid-level features for recognition." in Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, San Francisco, CA, 2010, pp. 2559-2566.
-
(2010)
Computer Vision and Pattern Recognition (CVPR) 2010 IEEE Conference on
, pp. 2559-2566
-
-
Ylan, B.1
-
20
-
-
84929254527
-
A feature-based approach for image tampering detection and localization
-
L. Verdoliva, D. Cozzolino, and G. Poggi, "A feature-based approach for image tampering detection and localization, " in IEEE Workshop on Information Forensics and Security, 2014, pp. 149-154.
-
(2014)
IEEE Workshop on Information Forensics and Security
, pp. 149-154
-
-
Verdoliva, L.1
Cozzolino, D.2
Poggi, G.3
-
21
-
-
84964714764
-
Splicebuster: A new blind image splicing detector
-
Rome
-
D. Cozzolino, G. Poggi and L. Verdoliva, "Splicebuster: A new blind image splicing detector, " in IEEE Workshop on Information Forensics and Security (WIFS), 2015, Rome, 2015, pp. 1-6.
-
(2015)
IEEE Workshop on Information Forensics and Security (WIFS) 2015
, pp. 1-6
-
-
Cozzolino, D.1
Poggi, G.2
Verdoliva, L.3
-
24
-
-
84913580146
-
Caffe: Convolutional architecture for fast feature embedding
-
ACM
-
Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell, "Caffe: Convolutional architecture for fast feature embedding, " in Proceedings of the 22nd ACM international conference on Multimedia. ACM, 2014, pp. 675-678.
-
(2014)
Proceedings of the 22nd ACM International Conference on Multimedia
, pp. 675-678
-
-
Jia, Y.1
Shelhamer, E.2
Donahue, J.3
Karayev, S.4
Long, J.5
Girshick, R.6
Guadarrama, S.7
Darrell, T.8
-
25
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
C.-C. Chang and C.-J. Lin, "LIBSVM: A library for support vector machines, " ACM Trans. Intell. Syst. Technol., vol. 2, no. 3, pp. 1-27, 2011.
-
(2011)
ACM Trans. Intell. Syst. Technol
, vol.2
, Issue.3
, pp. 1-27
-
-
Chang, C.-C.1
Lin, C.-J.2
|