UM

Browse/Search Results:  1-10 of 17 Help

Selected(0)Clear Items/Page:    Sort:
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019,Volume: 14,Issue: 5,Page: 1307-1322
Authors:  Yuanman Li;  Jiantao Zhou
Favorite  |  View/Download:97/0  |  Submit date:2019/04/16
Copy-move  Forgery Detection  Hierarchical Feature Matching  Iterative Localization  
Chronological Age Estimation under the Guidance of Age-related Facial Attributes Journal article
IEEE Transactions on Information Forensics and Security, 2019,Page: 1-12
Authors:  Jiu-Cheng Xie;  Chi-Man Pun
Favorite  |  View/Download:20/0  |  Submit date:2019/05/06
Chronological Age Estimation  Facial Attributes Estimation  Convolutional Neural Network  Controlled And Wild Environments  
SIFT Keypoint Removal via Directed Graph Construction for Color Images Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 12,Page: 2971-2985
Authors:  Li, Yuanman;  Zhou, Jiantao;  Cheng, An
Favorite  |  View/Download:17/0  |  Submit date:2018/10/30
Sift  Keypoint Removal  Directed Graph  Convex Optimization  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Conference paper
IEEE Transactions on Information Forensics and Security, Hong Kong, China, 2018-12
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite  |  View/Download:4/0  |  Submit date:2019/07/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 7,Page: 1735-1750
Authors:  Yang, Qingyu;  An, Dou;  Min, Rui;  Yu, Wei;  Yang, Xinyu;  Zhao, Wei
Favorite  |  View/Download:18/0  |  Submit date:2018/10/30
Data integrity attacks  state estimation  defense strategy  system observability  optimal PMU placement  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Zheng Y.;  Cui H.;  Wang C.;  Zhou J.
Favorite  |  View/Download:8/0  |  Submit date:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 9,Page: 2144-2158
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite  |  View/Download:24/0  |  Submit date:2018/10/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
On optimal PMU placement-based defense against data integrity attacks in smart grid Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 7,Page: 1735
Authors:  Yang Q.;  An D.;  Min R.;  Yu W.;  Yang X.;  Zhao W.
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30
Data integrity attacks  defense strategy  optimal PMU placement  state estimation  system observability  
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 12,Issue: 2,Page: 377-391
Authors:  Chi-Man Pun;  Caiping Yan;  Xiao-Chen Yuan
Favorite  |  View/Download:7/0  |  Submit date:2019/02/14
Image Alignment  Image Hashing  Multi-region Matching  Object-level Tampering Detection  
SIFT Keypoint Removal and Injection via Convex Relaxation Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 8,Page: 1722-1735
Authors:  Yuanman Li;  Jiantao Zhou;  An Cheng;  Xianming Liu;  Yuan Yan Tang
Favorite  |  View/Download:14/0  |  Submit date:2018/12/22
Convex Optimization  Keypoint Injection  Keypoint Removal  Sift