标题
A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection
作者
关键词
-
出版物
IEEE Transactions on Information Forensics and Security
Volume 9, Issue 4, Pages 554-567
出版商
Institute of Electrical and Electronics Engineers (IEEE)
发表日期
2014-02-01
DOI
10.1109/tifs.2014.2302078
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- An Evaluation of Popular Copy-Move Forgery Detection Approaches
- (2012) Vincent Christlein et al. IEEE Transactions on Information Forensics and Security
- Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
- (2012) Sevinç Bayram et al. IEEE Transactions on Information Forensics and Security
- Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features
- (2012) Pravin Kakar et al. IEEE Transactions on Information Forensics and Security
- Robust Image Alignment for Tampering Detection
- (2012) Sebastiano Battiato et al. IEEE Transactions on Information Forensics and Security
- Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts
- (2012) Tiziano Bianchi et al. IEEE Transactions on Information Forensics and Security
- Forgery Authentication in Extreme Wide-Angle Lens Using Distortion Cue and Fake Saliency Map
- (2012) Huazhu Fu et al. IEEE Transactions on Information Forensics and Security
- Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts
- (2012) Pasquale Ferrara et al. IEEE Transactions on Information Forensics and Security
- Robust Hashing for Image Authentication Using Zernike Moments and Local Features
- (2012) Yan Zhao et al. IEEE Transactions on Information Forensics and Security
- Empirical investigation into the correlation between vignetting effect and the quality of sensor pattern noise
- (2012) C.-T. Li et al. IET Computer Vision
- A Primal–Dual Splitting Method for Convex Optimization Involving Lipschitzian, Proximable and Linear Composite Terms
- (2012) Laurent Condat JOURNAL OF OPTIMIZATION THEORY AND APPLICATIONS
- A splitting algorithm for dual monotone inclusions involving cocoercive operators
- (2011) Bằng Công Vũ ADVANCES IN COMPUTATIONAL MATHEMATICS
- Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics
- (2011) Chang-Tsun Li et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
- A Nonlocal SAR Image Denoising Algorithm Based on LLMMSE Wavelet Shrinkage
- (2011) Sara Parrilli et al. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING
- Identifying Image Composites Through Shadow Matte Consistency
- (2011) Qiguang Liu et al. IEEE Transactions on Information Forensics and Security
- A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
- (2011) I. Amerini et al. IEEE Transactions on Information Forensics and Security
- Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection
- (2011) Yi-Lei Chen et al. IEEE Transactions on Information Forensics and Security
- Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise
- (2011) Xiangui Kang et al. IEEE Transactions on Information Forensics and Security
- Primal-Dual Splitting Algorithm for Solving Inclusions with Mixtures of Composite, Lipschitzian, and Parallel-Sum Type Monotone Operators
- (2011) Patrick L. Combettes et al. Set-Valued and Variational Analysis
- Source Camera Identification Using Enhanced Sensor Pattern Noise
- (2010) Chang-Tsun Li IEEE Transactions on Information Forensics and Security
- Digital Image Forgery Detection Based on Lens and Sensor Aberration
- (2010) Ido Yerushalmy et al. INTERNATIONAL JOURNAL OF COMPUTER VISION
- A First-Order Primal-Dual Algorithm for Convex Problems with Applications to Imaging
- (2010) Antonin Chambolle et al. JOURNAL OF MATHEMATICAL IMAGING AND VISION
- Global Solutions of Variational Models with Convex Regularization
- (2010) Thomas Pock et al. SIAM Journal on Imaging Sciences
- Accurate Detection of Demosaicing Regularity for Digital Image Forensics
- (2009) Hong Cao et al. IEEE Transactions on Information Forensics and Security
- Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis
- (2009) Zhouchen Lin et al. PATTERN RECOGNITION
- Determining Image Origin and Integrity Using Sensor Noise
- (2008) Mo Chen et al. IEEE Transactions on Information Forensics and Security
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started