|
基于像素缩放残差的块效应的图像局部变形检测方法
|
Abstract:
[1] | Kee, E. and Farid, H. (2011) A Perceptual Metric for Photo Retouching. Proceedings of the National Academy of Sciences of the United States of America, 108, 19907-19912. https://doi.org/10.1073/pnas.1110747108 |
[2] | Bharati, A., Singh, R., Vatsa, M. and Bow-yer, K.W. (2016) Detecting Facial Retouching Using Supervised Deep Learning. IEEE Transactions on Information Forensics and Security, 11, 1903-1913.
https://doi.org/10.1109/TIFS.2016.2561898 |
[3] | Hwang, M.G., Kim, S.M. and Har, D.H. (2017) A Method of Identifying Digi-tal Images with Geometric Distortion. Australian Journal of Forensic Sciences, 49, 93-105. https://doi.org/10.1080/00450618.2015.1128970 |
[4] | Fu, D., Shi, Y.Q. and Su, W. (2007) A Generalized Benford’s Law for JPEG Coefficients and Its Applications in Image Forensics. Conference on Security Steganography and Watermarking of Multimedia Contents, 65051L.
https://doi.org/10.1117/12.704723 |
[5] | Yang, J., Xie, J., Zhu, G., Kwong, S. and Shi, Y. (2014) An Effective Method for De-tecting Double JPEG Compression With the Same Quantization Matrix. IEEE Transactions on Information Forensics and Security, 9, 1933-1942.
https://doi.org/10.1109/TIFS.2014.2359368 |
[6] | Bianchi, T. and Piva, A. (2012) Detection of Nonaligned Double JPEG Com-pression Based on Integer Periodicity Maps. IEEE Transactions on Information Forensics and Security, 7, 842-848.
https://doi.org/10.1109/TIFS.2011.2170836 |
[7] | Pasquini, C., Boato, G. and Perezgonzalez, F. (2014) Multiple JPEG Compres-sion Detection by Means of Benford-Fourier Coefficients. International Workshop on Information Forensics and Security, Atlanta, 3-5 December 2014, 113-118. https://doi.org/10.1109/WIFS.2014.7084313 |
[8] | Fan, Z. and De Queiroz, R.L. (2003) Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation. IEEE Transactions on Image Processing, 12, 230-235. https://doi.org/10.1109/TIP.2002.807361 |
[9] | Li, W., Yuan, Y. and Yu, N. (2009) Passive Detection of Doctored JPEG Image via Block Artifact Grid Extraction. Signal Processing, 89, 1821-1829. https://doi.org/10.1016/j.sigpro.2009.03.025 |
[10] | Christlein, V., Riess, C., Jordan, J. and Angelopoulou, E. (2012) An Evaluation of Popular Copy-Move Forgery Detection Approaches. IEEE Transactions on Information Forensics and Security, 7, 1841-1854.
https://doi.org/10.1109/TIFS.2012.2218597 |