UM

Browse/Search Results:  1-10 of 19 Help

Selected(0)Clear Items/Page:    Sort:
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019,Volume: 14,Issue: 5,Page: 1307-1322
Authors:  Yuanman Li;  Jiantao Zhou
Favorite  |  View/Download:22/0  |  Submit date:2019/04/16
Copy-move  Forgery Detection  Hierarchical Feature Matching  Iterative Localization  
Deep Fusion Network for Splicing Forgery Localization Conference paper
ECCV 2018: Computer Vision – ECCV 2018 Workshops, Munich, Germany, 2018-8-14
Authors:  Liu, Bo;  Pun, Chi-Man
Favorite  |  View/Download:12/0  |  Submit date:2019/05/24
Image Forensics  Splicing Forgery Detection  Forgery Localization  Deep Convolutional Network  Fusion Network  
SIFT Keypoint Removal via Directed Graph Construction for Color Images Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 12,Page: 2971-2985
Authors:  Li, Yuanman;  Zhou, Jiantao;  Cheng, An
Favorite  |  View/Download:12/0  |  Submit date:2018/10/30
Sift  Keypoint Removal  Directed Graph  Convex Optimization  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Conference paper
IEEE Transactions on Information Forensics and Security, Hong Kong, China, 2018-12
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite  |  View/Download:0/0  |  Submit date:2019/07/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Fast reflective offset-guided searching method for copy-move forgery detection Journal article
INFORMATION SCIENCES, 2017,Volume: 418,Page: 531-545
Authors:  Bi, Xiuli;  Pun, Chi-Man
Favorite  |  View/Download:20/0  |  Submit date:2018/10/30
Copy-move Forgery Detection  The Mapping Offset  The Reflective Offset-guided Searching  The Priority Based Feature Matching  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Zheng Y.;  Cui H.;  Wang C.;  Zhou J.
Favorite  |  View/Download:4/0  |  Submit date:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 9,Page: 2144-2158
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite  |  View/Download:18/0  |  Submit date:2018/10/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 12,Issue: 2,Page: 377-391
Authors:  Chi-Man Pun;  Caiping Yan;  Xiao-Chen Yuan
Favorite  |  View/Download:4/0  |  Submit date:2019/02/14
Image Alignment  Image Hashing  Multi-region Matching  Object-level Tampering Detection  
SIFT Keypoint Removal and Injection via Convex Relaxation Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 8,Page: 1722-1735
Authors:  Yuanman Li;  Jiantao Zhou;  An Cheng;  Xianming Liu;  Yuan Yan Tang
Favorite  |  View/Download:6/0  |  Submit date:2018/12/22
Convex Optimization  Keypoint Injection  Keypoint Removal  Sift  
Quaternion-Based Image Hashing for Adaptive Tampering Localization Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 12,Page: 2664-2677
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:5/0  |  Submit date:2019/02/14
Adaptive Tampering Localization  Image Hashing  Quaternion Fourier Transform (Qft)  Quaternion Fourier-mellin Transform (Qmmt)