UM

Browse/Search Results:  1-6 of 6 Help

Selected(0)Clear Items/Page:    Sort:
Robust Image Forgery Detection over Online Social Network Shared Images Conference paper
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022, New Orleans, Louisiana, 2022-07-19
Authors:  Haiwei Wu;  Jiantao Zhou;  Jinyu Tian;  Jun Liu
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:0 | Submit date:2022/07/07
Robust Image Forgery Detection Against Transmission over Online Social Networks Journal article
IEEE Transactions on Information Forensics and Security, 2022,Volume: 17,Page: 443-456
Authors:  Wu, Haiwei;  Zhou, Jiantao;  Tian, Jinyu;  Liu, Jun;  Qiao, Yu
Adobe PDF | Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2022/05/17
Deep Neural Networks  Image Forgery Detection  Robustness  Social Networks  
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 12,Issue: 2,Page: 377-391
Authors:  Chi-Man Pun;  Caiping Yan;  Xiao-Chen Yuan
Favorite |  | TC[WOS]:16 TC[Scopus]:18 | Submit date:2019/02/14
Image Alignment  Image Hashing  Multi-region Matching  Object-level Tampering Detection  
Quaternion-Based Image Hashing for Adaptive Tampering Localization Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 12,Page: 2664-2677
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite |  | TC[WOS]:50 TC[Scopus]:56 | Submit date:2019/02/14
Adaptive Tampering Localization  Image Hashing  Quaternion Fourier Transform (Qft)  Quaternion Fourier-mellin Transform (Qmmt)  
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Adobe PDF | Favorite |  | TC[WOS]:130 TC[Scopus]:142 | Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics  
SIFT Keypoint Removal and Injection via Convex Relaxation Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 8,Page: 1722-1735
Authors:  Yuanman Li;  Jiantao Zhou;  An Cheng;  Xianming Liu;  Yuan Yan Tang
Adobe PDF | Favorite |  | TC[WOS]:15 TC[Scopus]:21 | Submit date:2018/12/22
Convex Optimization  Keypoint Injection  Keypoint Removal  Sift