[1] |
孔月萍, 刘楚, 朱旭东. 一种利用背景光流特征的虚假人脸检测方法[J]. 西安电子科技大学学报, 2021, 48(5):86-91.
|
|
KONG Yueping, LIU Chu, ZHU Xudong. Faceanti-Spoofing Method Using the Optical Flow Features of Back Ground[J]. Journal of Xidian University, 2021, 48(5):86-91.
|
[2] |
KIM M, TARIQ S, WOO S S. Fretal:Generalizing Deepfake Detection Using Knowledge Distillation and Representation Learning[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE, 2021:1001-1012.
|
[3] |
李昊东, 庄培裕, 李斌. 基于深度学习的数字图像篡改定位方法综述[J]. 信号处理, 2021, 37(12):2278-2301.
|
|
LI Haodong, ZHUANG Peiyu, LI Bin. A Survey on Deep Learning Based Digital Image Tampering Localization Methods[J]. Journal of Signal Processing, 2021, 37(12):2278-2301.
|
[4] |
朱叶, 余宜林, 郭迎春. HRDA-Net:面向真实场景的图像多篡改检测与定位算法[J]. 通信学报, 2022, 43(1):217-226.
doi: 10.11959/j.issn.1000-436x.2022016
|
|
ZHU Ye, YU Yilin, GUO Yingchun. HRDA-Net:Image Multiple Manipulation Detection and Location Algorithm in Real Scene[J]. Journal on Communications, 2022, 43(1):217-226.
doi: 10.11959/j.issn.1000-436x.2022016
|
[5] |
MAHDIAN B, SAIC S. Using Noise Inconsistencies for Blind Image Forensics[J]. Image and Vision Computing, 2009, 27(10):1497-1503.
doi: 10.1016/j.imavis.2009.02.001
|
[6] |
张旭, 胡晰远, 陈晨, 等. 基于透视投影下空间光照一致性分析的图像拼接篡改检测[J]. 自动化学报, 2019, 45(10):1857-1869.
|
|
ZHANG Xu, HU Xiyuan, CHEN Chen, et al. Image Splicing Detection Based on Spatial Lighting Consistency Analysis Under Perspective Projection[J]. Acta Automatica Sinica, 2019, 45(10):1857-1869.
|
[7] |
FERRARA P, BIANCHI T, DE ROSA A, et al. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(5):1566-1577.
doi: 10.1109/TIFS.2012.2202227
|
[8] |
LIN Z, HE J, TANG X, et al. Fast,Automatic and Fine-Grained Tampered JPEG Image Detection via DCT Coefficient Analysis[J]. Pattern Recognition, 2009, 42(11):2492-2501.
doi: 10.1016/j.patcog.2009.03.019
|
[9] |
BAYAR B, STAMM M C. Constrained Convolutional Neural Networks:A New Approach towards General Purpose Image Manipulation Detection[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(11):2691-2706.
doi: 10.1109/TIFS.2018.2825953
|
[10] |
WU Y, ABDALMAGEED W, NATARAJAN P. Mantra-Net:Manipulation Tracing Network for Detection and Localization of Image Forgeries with Anomalous Features[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE, 2019:9543-9552.
|
[11] |
LONG J, SHELHAMER E, DARREL T. Fully Convolutional Networks for Semantic Segmentation[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE, 2015:3431-3440.
|
[12] |
吴韵清, 吴鹏, 陈北京, 等. 基于残差全卷积网络的图像拼接定位算法[J]. 应用科学学报, 2019, 37(5):651-662.
|
|
WU Yunqing, WU Peng, CHEN Beijing, et al. Image Splicing Localization Method Based on Fully Convolutional Residual Networks[J]. Journal of Applied Sciences, 2019, 37(5):651-662.
|
[13] |
KWON M J, YU I J, NAM S H, et al. CAT-Net:Compression Artifact Tracing Network for Detection and Localization of Image Splicing[C]// Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.Piscataway:IEEE, 2021:375-384.
|
[14] |
ZHUANG P, LI H, TAN S, et al. Image Tampering Localization Using a Dense Fully Convolutional Network[J]. IEEE Transactions on Information Forensics and Security, 2021, 16:2986-2999.
doi: 10.1109/TIFS.2021.3070444
|
[15] |
RONNEBERGER O, FISCHER P, BROX T. U-Net:Convolutional Networks for Biomedical ImageSegmentation[C]// International Conference on Medical Image Computing and Computer-Assisted Intervention.Heidelberg:Springer, 2015:234-241.
|
[16] |
BI X, WEI Y, XIAO B, et al. RRU-Net:The Ringed Residual U-Net for Image Splicing Forgery Detection[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.Piscataway:IEEE, 2019:30-39.
|
[17] |
ZHANG R, NI J. A Dense U-Net with Cross-Layer Intersection for Detection and Localization of Image Forgery[C]// ICASSP 2020-2020 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).Piscataway:IEEE, 2020:2982-2986.
|
[18] |
WU H, ZHOU J, TIAN J, et al. Robust Image Forgery Detection against Transmission over Online Social Networks[J]. IEEE Transactions on Information Forensics and Security, 2022, 17:443-456.
doi: 10.1109/TIFS.2022.3144878
|
[19] |
CRUZ F, SIDERE N, COUSTATY M, et al. Local Binary Patterns for Document Forgery Detection[C]// 2017 14th IAPR International Conference on Document Analysis and Recognition(ICDAR).Piscataway:IEEE, 2017, 1:1223-1228.
|
[20] |
SHIVAKUMARA P, BASAVARAJA V, GOWDA H S, et al. A New RGB Based Fusion for Forged IMEI Number Detection in Mobile Images[C]// 2018 16th International Conference on Frontiers in Handwriting Recognition(ICFHR).Piscataway:IEEE, 2018:386-391.
|
[21] |
VAN BEUSEKOM J, SHAFAIT F, BREUEL T M. Document Inspection Using Text-Line Alignment[C]// Proceedings of the 9th IAPR International Workshop on Document Analysis Systems. New York: ACM, 2010:263-270.
|
[22] |
VAN BEUSEKOM J, SHAFAIT F, BREUEL T M. Text-Line Examination for Document Forgery Detection[J]. International Journal on Document Analysis and Recognition(IJDAR), 2013, 16(2):189-207.
|
[23] |
BERTRAND R, GOMEZ-KRÄMER P, TERRADES O R, et al. A System Based on Intrinsic Features for Fraudulent Document Detection[C]// 2013 12th International Conference on Document Analysis and Recognition.Piscataway:IEEE, 2013:106-110.
|
[24] |
BERTRAND R, TERRADES O R, GOMEZ-KRÄMER P, et al. A Conditional Random Field Model for Font Forgery Detection[C]// 2015 13th International Conference on Document Analysis and Recognition(ICDAR).Piscataway:IEEE, 2015:576-580.
|
[25] |
SHANG S, KONG X, YOU X. Document Forgery Detection Using Distortion Mutation of Geometric Parameters in Characters[J]. Journal of Electronic Imaging, 2015, 24(2):023008.
doi: 10.1117/1.JEI.24.2.023008
|
[26] |
NANDANWAR L, SHIVAKUMARA P, PAL U, et al. A New Method for Detecting Altered Text in Document Images[J]. International Journal of Pattern Recognition and Artificial Intelligence, 2021, 35(12):2160010.
doi: 10.1142/S0218001421600107
|
[27] |
JAMES H, GUPTA O, RAVIV D. Learning Document Graphs with Attention for Image Manipulation Detection[C]// International Conference on Pattern Recognition and Artificial Intelligence.Heidelberg:Springer, 2022:263-274.
|
[28] |
XU W, LUO J, ZHU C, et al. Document Images Forgery Localization Using a Two-Stream Network[J]. International Journal of Intelligent Systems, 2022, 37(8):5272-5289.
doi: 10.1002/int.v37.8
|
[29] |
LIU Z, MAO H, WU C Y, et al. A Convnet for the 2020s[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE, 2022:11976-11986.
|
[30] |
HU J, SHEN L, SUN G. Squeeze-and-Excitation Networks[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE, 2018:7132-7141.
|
[31] |
LIN T Y, GOYAL P, GIRSHICK R, et al. Focal Loss for Dense Object Detection[C]// Proceedings of the IEEE International Conference on Computer Vision.Piscataway:IEEE, 2017:2980-2988.
|
[32] |
BERMAN M, TRIKI A R, BLASCHKO M B. The Lovász-Softmax Loss:A Tractable Surrogate for the Optimization of the Intersection-over-Union Measure in Neural Networks[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE, 2018:4413-4421.
|
[33] |
COZZOLINO D, VERDOLIVA L. Noiseprint:A CNN-Based Camera Model Fingerprint[J]. IEEE Transactions on Information Forensics and Security, 2019, 15:144-159.
doi: 10.1109/TIFS.10206
|
[34] |
CHEN X, DONG C, JI J, et al. Image Manipulation Detection by Multi-View Multi-Scale Supervision[C]// Proceedings of the IEEE/CVF International Conference on Computer Vision.Piscataway:IEEE, 2021:14185-14193.
|
[35] |
ALIBABA SECURITY, CHINA SOCIETY OF IMAGE AND GRAPHICS(CSIG). Real-World Image Forgery Localization Challenge(2022) [DB/OL].[2022-10-20]. https://tianchi.aliyun.com/competition/entrance/531945/introduction.
|