UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019,Volume: 14,Issue: 5,Page: 1307-1322
Authors:  Yuanman Li;  Jiantao Zhou
Favorite  |  View/Download:22/0  |  Submit date:2019/04/16
Copy-move  Forgery Detection  Hierarchical Feature Matching  Iterative Localization  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Conference paper
IEEE Transactions on Information Forensics and Security, Hong Kong, China, 2018-12
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite  |  View/Download:0/0  |  Submit date:2019/07/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite  |  View/Download:13/0  |  Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 9,Page: 2144-2158
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite  |  View/Download:18/0  |  Submit date:2018/10/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 12,Issue: 2,Page: 377-391
Authors:  Chi-Man Pun;  Caiping Yan;  Xiao-Chen Yuan
Favorite  |  View/Download:4/0  |  Submit date:2019/02/14
Image Alignment  Image Hashing  Multi-region Matching  Object-level Tampering Detection  
Quaternion-Based Image Hashing for Adaptive Tampering Localization Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 12,Page: 2664-2677
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:5/0  |  Submit date:2019/02/14
Adaptive Tampering Localization  Image Hashing  Quaternion Fourier Transform (Qft)  Quaternion Fourier-mellin Transform (Qmmt)  
Adaptive local feature based multi-scale image hashing for robust tampering detection Conference paper
IEEE Region 10 Annual International Conference, Proceedings/TENCON, Macao, China, 1-4 Nov. 2015
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/14
Adaptive Local Feature Extraction  Location-context Information  Multi-scale Image Hashing  Tampering Detection  
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:184/6  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid