-
1
-
-
69149100549
-
Seeing is not believing
-
August
-
H. Farid, "Seeing is not believing," IEEE Spectrum, vol. 46, no. 8, pp. 44-51, August 2009.
-
(2009)
IEEE Spectrum
, vol.46
, Issue.8
, pp. 44-51
-
-
Farid, H.1
-
2
-
-
80155180685
-
Vision of the unseen: Current trends and challenges in digital image and video forensics
-
October
-
A. Rocha, W. Scheirer, T. Boult, and S. Goldenstein, "Vision of the unseen: Current trends and challenges in digital image and video forensics," ACM Computing Surveys, vol. 43, no. 4, pp. 26:1-26:42, October 2011.
-
(2011)
ACM Computing Surveys
, vol.43
, Issue.4
, pp. 261-2642
-
-
Rocha, A.1
Scheirer, W.2
Boult, T.3
Goldenstein, S.4
-
3
-
-
84890463165
-
An overview on image forensics
-
January
-
A. Piva, "An overview on image forensics," ISRN Signal Processing, vol. 2013, pp. 22, January 2013.
-
(2013)
ISRN Signal Processing
, vol.2013
, pp. 22
-
-
Piva, A.1
-
4
-
-
84888386204
-
Information forensics: An overview of the first decade
-
M. C. Stamm, Min Wu, and K. J. R. Liu, "Information Forensics: An Overview of the First Decade," IEEE Access, vol. 1, pp. 167-200, 2013.
-
(2013)
IEEE Access
, vol.1
, pp. 167-200
-
-
Stamm, M.C.1
Wu, M.2
Liu, K.J.R.3
-
5
-
-
20444438052
-
Blind source camera identification
-
October Singapore
-
M. Kharrazi, H. T. Sencar, and N. Memon, "Blind source camera identification," Proceedings of the IEEE International Conference on Image Processing, pp. 709-712, October 2004, Singapore.
-
(2004)
Proceedings of the IEEE International Conference on Image Processing
, pp. 709-712
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.3
-
6
-
-
69949138613
-
Using sensor pattern noise for camera model identification
-
October San Diego, CA
-
T. Filler, J. Fridrich, and M. Goljan, "Using sensor pattern noise for camera model identification," Proccedings of the IEEE International Conference on Image Processing, pp. 1296-1299, October 2008, San Diego, CA.
-
(2008)
Proccedings of the IEEE International Conference on Image Processing
, pp. 1296-1299
-
-
Filler, T.1
Fridrich, J.2
Goljan, M.3
-
7
-
-
84944701899
-
Forensic camera model identification
-
John Wiley & Sons, Ltd, Chichester, UK
-
M. Kirchner and T. Gloe, "Forensic camera model identification," in Handbook of Digital Forensics of Multimedia Data and Devices, pp. 329-374. John Wiley & Sons, Ltd, Chichester, UK, 2015.
-
(2015)
Handbook of Digital Forensics of Multimedia Data and Devices
, pp. 329-374
-
-
Kirchner, M.1
Gloe, T.2
-
8
-
-
39449103666
-
Digital image forensics via intrinsic fingerprints
-
March
-
A. Swaminathan, M. Wu, and K. J. R. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101-117, March 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 101-117
-
-
Swaminathan, A.1
Wu, M.2
Liu, K.J.R.3
-
9
-
-
37849029111
-
Automatic source camera identification using the intrinsic lens radial distortion
-
November
-
K.S. Choi, E.Y. Lam, and K.K.Y. Wong, "Automatic source camera identification using the intrinsic lens radial distortion," Optics Express, vol. 14, no. 24, pp. 11551-11565, November 2006.
-
(2006)
Optics Express
, vol.14
, Issue.24
, pp. 11551-11565
-
-
Choi, K.S.1
Lam, E.Y.2
Wong, K.K.Y.3
-
10
-
-
33749254274
-
Source camera identification based on CFA interpolation
-
September Genova, Italy
-
S. Bayram, H. Sencar, N. Memon, and I. Avcibas, "Source camera identification based on CFA interpolation," Proceedings of the IEEE International Conference on Image Processing, pp. III-69-72, September 2005, Genova, Italy.
-
(2005)
Proceedings of the IEEE International Conference on Image Processing
, pp. III69-III72
-
-
Bayram, S.1
Sencar, H.2
Memon, N.3
Avcibas, I.4
-
11
-
-
70450271108
-
Accurate detection of demosaicing regularity for digital image forensics
-
December
-
H. Cao and A. C. Kot, "Accurate detection of demosaicing regularity for digital image forensics," IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 899-910, December 2009.
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.4
, pp. 899-910
-
-
Cao, H.1
Kot, A.C.2
-
12
-
-
84905283556
-
Demosaicing strategy identification via eigenalgorithms
-
Speech and Signal Processing May
-
S. Milani, P. Bestagini, M. Tagliasacchi, and S. Tubaro, "Demosaicing strategy identification via eigenalgorithms," Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2659-2663, May 2014.
-
(2014)
Proceedings of the IEEE International Conference on Acoustics
, pp. 2659-2663
-
-
Milani, S.1
Bestagini, P.2
Tagliasacchi, M.3
Tubaro, S.4
-
13
-
-
49549122403
-
Digital single lens reflex camera identification from traces of sensor dust
-
September
-
A.E. Dirik, H.T. Sencar, and N. Memon, "Digital single lens reflex camera identification from traces of sensor dust," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 539-552, September 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 539-552
-
-
Dirik, A.E.1
Sencar, H.T.2
Memon, N.3
-
14
-
-
84868151871
-
Camera model identification using local binary patterns
-
July Melbourne, Australia
-
G. Xu and Y. Q. Shi, "Camera model identification using local binary patterns," Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 392-397, July 2012, Melbourne, Australia.
-
(2012)
Proceedings of the IEEE International Conference on Multimedia and Expo
, pp. 392-397
-
-
Xu, G.1
Shi, Y.Q.2
-
15
-
-
84964767150
-
Camera model identification framework using an ensemble of demosaicing features
-
November Rome, Italy
-
C. Chen and M. C. Stamm, "Camera model identification framework using an ensemble of demosaicing features," Proceedings of the IEEE International Workshop on Information Forensics and Security, pp. 1-6, November 2015, Rome, Italy.
-
(2015)
Proceedings of the IEEE International Workshop on Information Forensics and Security
, pp. 1-6
-
-
Chen, C.1
Stamm, M.C.2
-
16
-
-
84944703879
-
Evaluation of residual-based local features for camera model identification
-
Vittorio Murino, Enrico Puppo, Diego Sona, Marco Cristani, and Carlo Sansone, Eds. Springer International Publishing, Cham, Switzerland
-
F. Marra, G. Poggi, C. Sansone, and L. Verdoliva, "Evaluation of residual-based local features for camera model identification," in New Trends in Image Analysis and Processing - ICIAP 2015 Workshops, Vittorio Murino, Enrico Puppo, Diego Sona, Marco Cristani, and Carlo Sansone, Eds., pp. 11-18. Springer International Publishing, Cham, Switzerland, 2015.
-
(2015)
New Trends in Image Analysis and Processing - ICIAP 2015 Workshops
, pp. 11-18
-
-
Marra, F.1
Poggi, G.2
Sansone, C.3
Verdoliva, L.4
-
17
-
-
85006066498
-
Camera model identification based on machine learning approach with high order statistics features
-
August Budapest, Hungary
-
A. Tuama, F. Comby, and M. Chaumont, "Camera model identification based on machine learning approach with high order statistics features," Proceedings of the IEEE European Signal Processing Conference, pp. 1183-1187, August 2016, Budapest, Hungary.
-
(2016)
Proceedings of the IEEE European Signal Processing Conference
, pp. 1183-1187
-
-
Tuama, A.1
Comby, F.2
Chaumont, M.3
-
18
-
-
69349090197
-
Learning deep architectures for AI
-
January
-
Y. Bengio, "Learning Deep Architectures for AI," Foundations and Trends in Machine Learning, vol. 2, no. 1, pp. 1-127, January 2009.
-
(2009)
Foundations and Trends in Machine Learning
, vol.2
, Issue.1
, pp. 1-127
-
-
Bengio, Y.1
-
19
-
-
84988240454
-
Unsupervised feature learning for bootleg detection using deep learning architectures
-
December Atlanta, GA
-
M. Buccoli, P. Bestagini, M. Zanoni, A. Sarti, and S. Tubaro, "Unsupervised feature learning for bootleg detection using deep learning architectures," Proceedings of the IEEE International Workshop on Information Forensics and Security, pp. 131-136, December 2014, Atlanta, GA.
-
(2014)
Proceedings of the IEEE International Workshop on Information Forensics and Security
, pp. 131-136
-
-
Buccoli, M.1
Bestagini, P.2
Zanoni, M.3
Sarti, A.4
Tubaro, S.5
-
20
-
-
84933053045
-
Median filtering forensics based on convolutional neural networks
-
November
-
C. Jiansheng, K. Xiangui, L. Ye, and Z. J. Wang, "Median filtering forensics based on convolutional neural networks," IEEE Signal Processing Letters, vol. 22, no. 11, pp. 1849-1853, November 2015.
-
(2015)
IEEE Signal Processing Letters
, vol.22
, Issue.11
, pp. 1849-1853
-
-
Jiansheng, C.1
Xiangui, K.2
Ye, L.3
Wang, Z.J.4
-
21
-
-
85015106454
-
A deep learning approach to universal image manipulation detection using a new convolutional layer
-
June Vigo, Spain
-
B. Bayar and M. C. Stamm, "A deep learning approach to universal image manipulation detection using a new convolutional layer," Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 5-10, June 2016, Vigo, Spain.
-
(2016)
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security
, pp. 5-10
-
-
Bayar, B.1
Stamm, M.C.2
-
22
-
-
84964992861
-
Structural design of convolutional neural networks for steganalysis
-
May
-
G. Xu, H. Z. Wu, and Y. Q. Shi, "Structural design of convolutional neural networks for steganalysis," IEEE Signal Processing Letters, vol. 23, no. 5, pp. 708-712, May 2016.
-
(2016)
IEEE Signal Processing Letters
, vol.23
, Issue.5
, pp. 708-712
-
-
Xu, G.1
Wu, H.Z.2
Shi, Y.Q.3
-
23
-
-
85025642782
-
-
March
-
L. Baroffio, L. Bondi, P. Bestagini, and S. Tubaro, "Camera identification with deep convolutional networks," arXiv:1603.01068, March 2016.
-
(2016)
Camera Identification with Deep Convolutional Networks
-
-
Baroffio, L.1
Bondi, L.2
Bestagini, P.3
Tubaro, S.4
-
24
-
-
85041506885
-
First steps towards camera model identification with convolutional neural networks
-
L. Bondi, L. Baroffio, D. Guera, P. Bestagini, E. J. Delp, and S. Tubaro, "First steps towards camera model identification with convolutional neural networks," IEEE Signal Processing Letters (SPL), vol. PP, no. 99, pp. 1-1, 2016.
-
(2016)
IEEE Signal Processing Letters (SPL)
, Issue.99
, pp. 1
-
-
Bondi, L.1
Baroffio, L.2
Guera, D.3
Bestagini, P.4
Delp, E.J.5
Tubaro, S.6
-
25
-
-
0002263996
-
Convolutional networks for images, speech, and time-series
-
M. A. Arbib, Ed. MIT Press, Cambridge, MA
-
Y. LeCun and Y. Bengio, "Convolutional networks for images, speech, and time-series," in The Handbook of Brain Theory and Neural Networks, M. A. Arbib, Ed., pp. 255-258. MIT Press, Cambridge, MA, 1995.
-
(1995)
The Handbook of Brain Theory and Neural Networks
, pp. 255-258
-
-
LeCun, Y.1
Bengio, Y.2
-
26
-
-
77956509090
-
Rectified linear units improve restricted boltzmann machines
-
June Haifa, Israel
-
V. Nair and G. Hinton, "Rectified linear units improve restricted boltzmann machines," Proceedings of the International Conference on Machine Learning, pp. 807-814, June 2010, Haifa, Israel.
-
(2010)
Proceedings of the International Conference on Machine Learning
, pp. 807-814
-
-
Nair, V.1
Hinton, G.2
-
27
-
-
84904163933
-
Dropout: A simple way to prevent neural networks from overfitting
-
January
-
N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, "Dropout: A simple way to prevent neural networks from overfitting," Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929-1958, January 2014.
-
(2014)
Journal of Machine Learning Research
, vol.15
, Issue.1
, pp. 1929-1958
-
-
Srivastava, N.1
Hinton, G.2
Krizhevsky, A.3
Sutskever, I.4
Salakhutdinov, R.5
-
28
-
-
84990032289
-
-
December
-
C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, "Rethinking the inception architecture for computer vision," arXiv:1512.00567v3, December 2015.
-
(2015)
Rethinking the Inception Architecture for Computer Vision
-
-
Szegedy, C.1
Vanhoucke, V.2
Ioffe, S.3
Shlens, J.4
Wojna, Z.5
-
29
-
-
85072028231
-
Return of the devil in the details: Delving deep into convolutional nets
-
September Nottingham, UK
-
K. Chatfield, K. Simonyan, Andrea Vedaldi, and Andrew Zisserman, "Return of the devil in the details: Delving deep into convolutional nets," Proceedings of the British Machine Vision Conference, September 2014, Nottingham, UK.
-
(2014)
Proceedings of the British Machine Vision Conference
-
-
Chatfield, K.1
Simonyan, K.2
Vedaldi, A.3
Zisserman, A.4
-
31
-
-
84937522268
-
Going deeper with convolutions
-
June Boston, MA
-
C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, "Going deeper with convolutions," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-9, June 2015, Boston, MA.
-
(2015)
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition
, pp. 1-9
-
-
Szegedy, C.1
Liu, W.2
Jia, Y.3
Sermanet, P.4
Reed, S.5
Anguelov, D.6
Erhan, D.7
Vanhoucke, V.8
Rabinovich, A.9
-
32
-
-
84958589374
-
-
December
-
K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," arXiv:1512.03385, December 2015.
-
(2015)
Deep Residual Learning for Image Recognition
-
-
He, K.1
Zhang, X.2
Ren, S.3
Sun, J.4
-
33
-
-
84947041871
-
Imagenet large scale visual recognition challenge
-
December
-
O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei, "Imagenet large scale visual recognition challenge," International Journal of Computer Vision, vol. 115, no. 3, pp. 211-252, December 2015.
-
(2015)
International Journal of Computer Vision
, vol.115
, Issue.3
, pp. 211-252
-
-
Russakovsky, O.1
Deng, J.2
Su, H.3
Krause, J.4
Satheesh, S.5
Ma, S.6
Huang, Z.7
Karpathy, A.8
Khosla, A.9
Bernstein, M.10
Berg, A.C.11
Fei-Fei, L.12
-
34
-
-
79955401108
-
The dresden image database for benchmarking digital image forensics
-
December
-
T. Gloe and R. Böhme, "The Dresden image database for benchmarking digital image forensics," Journal of Digital Forensic Practice, vol. 3, no. 2-4, pp. 150-159, December 2010.
-
(2010)
Journal of Digital Forensic Practice
, vol.3
, Issue.2-4
, pp. 150-159
-
-
Gloe, T.1
Böhme, R.2
|