Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning
Tài liệu tham khảo
Avidan, 2007, Seam carving for content-aware image resizing, 10
Achanta, 2009, Saliency detection for content-aware image resizing, 1005
Battiato, 2014, Saliency-based selection of gradient vector flow paths for content aware image resizing, IEEE Trans Image Process, 23, 2081, 10.1109/TIP.2014.2312649
Cho, 2017, Weakly-and self-supervised learning for content-aware deep image retargeting, 4558
Sarkar, 2009, Detection of seam carving and localization of seam insertions in digital images, 107
Fillion, 2010, Detecting content adaptive scaling of images for forensic applications, 75410
Yin, 2015, Detecting seam carving based image resizing using local binary patterns, Comput Secur, 55, 130, 10.1016/j.cose.2015.09.003
Zhang, 2017, Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies, J Vis Commun Image Represent, 48, 281, 10.1016/j.jvcir.2017.07.006
Liu, 2018, An improved approach to exposing JPEG seam carving under recompression, IEEE Trans Circuits Syst Video Technol, 29, 1907, 10.1109/TCSVT.2018.2859633
Zhang, 2020, Detecting seam carved images using uniform local binary patterns, Multimedia Tools Appl, 79, 8415, 10.1007/s11042-018-6470-y
Cieslak, 2018, Seam carving detection using convolutional neural networks, 195
Ye, 2018, A convolutional neural network based seam carving detection scheme for uncompressed digital images, 3
Nam, 2021, Deep convolutional neural network for identifying seam-carving forgery, IEEE Trans Circuits Syst Video Technol, 31, 3308, 10.1109/TCSVT.2020.3037662
Celebi, 2022, A comparison study to detect seam carving forgery in JPEG images with deep learning models, J Surveill Secur Saf, 3, 88, 10.20517/jsss.2022.02
Boroumand, 2018, Deep residual network for steganalysis of digital images, IEEE Trans Inf Forensics Secur, 14, 1181, 10.1109/TIFS.2018.2871749
Pevny, 2010, Steganalysis by subtractive pixel adjacency matrix, IEEE Trans Inf Forensics Secur, 5, 215, 10.1109/TIFS.2010.2045842
He, 2015, Spatial pyramid pooling in deep convolutional networks for visual recognition, IEEE Trans Pattern Anal Mach Intell, 37, 1904, 10.1109/TPAMI.2015.2389824
Yosinski, 2014, How transferable are features in deep neural networks?
He, 2016, Deep residual learning for image recognition, 770
Glorot, 2010, Understanding the difficulty of training deep feedforward neural networks, 249
Deng, 2013, Recent advances in deep learning for speech research at Microsoft, 8604
Bayar, 2018, Constrained convolutional neural networks: A new approach towards general purpose image manipulation detection, IEEE Trans Inf Forensics Secur, 13, 2691, 10.1109/TIFS.2018.2825953
Yan, 2018, Recolored image detection via a deep discriminative model, IEEE Trans Inf Forensics Secur, 14, 5, 10.1109/TIFS.2018.2834155
Chen, 2019, Attention-based two-stream convolutional networks for face spoofing detection, IEEE Trans Inf Forensics Secur, 15, 578, 10.1109/TIFS.2019.2922241
Frank, 2020, Leveraging frequency analysis for deep fake image recognition, 3247
Guo, 2021, Fake face detection via adaptive manipulation traces extraction network, Comput Vis Image Underst, 204, 10.1016/j.cviu.2021.103170
Bas, 2011, ” Break our steganographic system”: the ins and outs of organizing BOSS, 59
Bas, 2007
Schaefer, 2003, UCID: An uncompressed color image database, 472
Kingma, 2015, Adam: A method for stochastic optimization
Qian, 2016, Learning and transferring representations for image steganalysis using convolutional neural network, 2752
Ryu, 2014, Detecting trace of seam carving for forensic analysis, IEICE Trans Inf Syst, 97, 1304, 10.1587/transinf.E97.D.1304