[1] |
冯玉颖, 王俊平, 马塾亮, 等. COPLIP新模型及其图像增强新算法[J]. 西安电子科技大学学报, 2018,45(1):66-71.
|
|
FENG Yuying, WANG Junping, MA Shuliang, et al. New COPLIP Model and Its Image Enhancement Algorithm[J]. Journal of Xidian University, 2018,45(1):66-71.
|
[2] |
张明, 白松浩. 利用上下边界估计的图像增强方法[J]. 西安电子科技大学学报, 2015,42(1):149-154.
|
|
ZHANG Ming, BAI Songhao. Image Enhancement Based on Estimating the Upper and Lower Boundary[J]. Journal of Xidian University, 2015,42(1):149-154.
|
[3] |
KAMEL M S, GUAN L. Histogram Equalization Utilizing Spatial Correlation for Image Enhancement [C]//Proceedings of SPIE:1199.Bellingham:SPIE, 1989: 712-723.
|
[4] |
WU H T, DUGELAY J L, SHI Y Q. ReversibleImage Data Hiding with Contrast Enhancement[J]. IEEE Signal Processing Letters, 2015,22(1):81-85.
|
[5] |
WU H T, TANG S, HUANG J, et al. A Novel Reversible Data Hiding Method with Image Contrast Enhancement[J]. Signal Processing:Image Communication, 2018,62:64-73.
|
[6] |
QIAN R, LI W, YU N, et al. Image Forensics with Rotation-tolerant Resampling Detection [C]//Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops.Washington:IEEE Computer Society, 2012: 61-66.
|
[7] |
KUMAWAT C, PANKAJAKSHAN V. A Robust JPEG Compression Detector for Image Forensics[J]. Signal Processing:Image Communication, 2020,89:116008.
|
[8] |
BHARDWAJ D, PANKAJAKSHAN V. A JPEG Blocking Artifact Detector for Image Forensics[J]. Signal Processing:Image Communication, 2018,68:155-161.
|
[9] |
SHAN W, YI Y, QIU J, et al. Robust Median Filtering Forensics Using Image Deblocking and Filtered Residual Fusion[J]. IEEE Access, 2019,7:17174-17183.
|
[10] |
YUANH D. Blind Forensics of Median Filtering in Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2011,6(4):1335-1345.
|
[11] |
HUANG H Y, CIOU A J. Copy-move Forgery Detection for Image Forensics Using the Superpixel Segmentation and the Helmert Transformation[J]. EURASIP Journal on Image and Video Processing, 2019,2019(1):68.
|
[12] |
LI Y M, ZHOU J. Fast and Effective Image Copy-move Forgery Detection via Hierarchical Feature Point Matching[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5):1307-1322.
|
[13] |
WU Y, ABD-ALMAGEED W, NATARAJAN P. Image Copy-move Forgery Detection via an End-to-end Deep Neural Network [C] //Proceedings of the 2018 IEEE Winter Conference on Applications of Computer Vision.Piscataway:IEEE, 2018: 1907-1915.
|
[14] |
STAMM MC, LIU K J R.Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints[J]. IEEE Transactions on Information Forensics and Security, 2010,5(3):492-506.
|
[15] |
CAO G, ZHAO Y, NI R, et al. Contrast Enhancement-based Forensics in Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2014,9(3):515-525.
|
[16] |
DE ROSA A, FONTANI M, MASSAI M, et al. Second-order Statistics Analysis to Cope with Contrast Enhancement Counter-forensics[J]. IEEE Signal Processing Letters, 2015,22(8):1132-1136.
|
[17] |
SUN J Y, KIM S W, LEE S W, et al. A Novel Contrast Enhancement Forensics Based on Convolutional Neural Networks[J]. Signal Processing:Image Communication, 2018,63:149-160.
|
[18] |
SHAN W, YI Y, HUANG R, et al. Robust Contrast Enhancement Forensics Based on Convolutional Neural Networks[J]. Signal Processing:Image Communication, 2019,71:138-146.
|
[19] |
CHEN Y, LYU Z X, KANG X, et al. A Rotation-invariant Convolutional Neural Network for Image Enhancement Forensics [C]// Proceedings of the 2018 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway:IEEE, 2018: 2111-2115.
|
[20] |
CHANG C C, LIN C J. Libsvm:a Library for Support Vector Machines[J]. ACM Transactions on Intelligent Systems and Technology, 2011,2(3):27.
|
[21] |
BAS P, FILLER T, PEVNY T. Break Our Steganographic System:the Ins and Outs of Organizing BOSS [C]//Lecture Notes in Computer Science:6958.Heidelberg:Springer Verlag, 2011: 59-70.
|
[22] |
GONEN, M. Receiver Operating Characteristic (ROC) Curves[J]. Journal of Clinical Nursing (Wiley-Blackwell), 2002,11(1):136.
|