咨询与建议

限定检索结果

文献类型

  • 14 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 10 篇 计算机科学与技术...
    • 9 篇 机械工程
    • 7 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 材料科学与工程(可...
    • 4 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 软件工程
    • 2 篇 网络空间安全
  • 6 篇 理学
    • 6 篇 数学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 文学
    • 1 篇 外国语言文学

主题

  • 15 篇 image forensics
  • 3 篇 forgery detectio...
  • 3 篇 convolutional ne...
  • 2 篇 natural image
  • 1 篇 digital images
  • 1 篇 deep learning
  • 1 篇 reflection
  • 1 篇 no-reference
  • 1 篇 computer generat...
  • 1 篇 error distance
  • 1 篇 texture
  • 1 篇 digital forgery
  • 1 篇 computer graphic...
  • 1 篇 sun elevation
  • 1 篇 generative adver...
  • 1 篇 image forgery lo...
  • 1 篇 marked graph
  • 1 篇 image resampling...
  • 1 篇 vanishing points
  • 1 篇 multimedia secur...

机构

  • 2 篇 department of el...
  • 1 篇 college of infor...
  • 1 篇 key laboratory o...
  • 1 篇 guangdong key la...
  • 1 篇 engineering rese...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 dr.m.g.r educati...
  • 1 篇 beijing key lab ...
  • 1 篇 computer science...
  • 1 篇 department of el...
  • 1 篇 school of data a...
  • 1 篇 shandong univers...
  • 1 篇 academy of foren...
  • 1 篇 st.peter’s insti...
  • 1 篇 nanjing universi...
  • 1 篇 engineering rese...
  • 1 篇 electrical and c...
  • 1 篇 college of lnfor...
  • 1 篇 engineering rese...

作者

  • 2 篇 蒋学芹
  • 2 篇 葛华勇
  • 1 篇 shaopei shi
  • 1 篇 tongfeng yang
  • 1 篇 pan feng chen ji...
  • 1 篇 subodh srivastav...
  • 1 篇 yunqing shi
  • 1 篇 chen haipeng
  • 1 篇 li yan
  • 1 篇 guorui feng
  • 1 篇 xu chang
  • 1 篇 niu shaozhang
  • 1 篇 guo yu-cui
  • 1 篇 junwei luo
  • 1 篇 jinhua zeng
  • 1 篇 feng ding
  • 1 篇 cao xiaochun
  • 1 篇 jian wu
  • 1 篇 yuan kai-guo
  • 1 篇 hafiz malik

语言

  • 15 篇 英文
检索条件"主题词=image forensics"
15 条 记 录,以下是1-10 订阅
排序:
Digital image forensics Using Orthogonal 1-D Objects
收藏 引用
Chinese Journal of Electronics 2014年 第3期23卷 545-549页
作者: NIU Shaozhang MENG Xianzhe CUI Haoliang Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications
The imaging features are shared by all images shot by cameras, the artificial images may break these features. We introduce the image formation model to image forensics. Orthogonal 1-D objects with known scale on eith... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Thorough Investigation on image Forgery Detection
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第3期134卷 1489-1528页
作者: Anjani Kumar Rai Subodh Srivastava Department of Electronics&Communication Engineering NITPatnaIndia
image forging is the alteration of a digital image to conceal some of the necessary or helpful *** cannot be easy to distinguish themodified region fromthe original image in *** demand for authenticity and the integri... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery
收藏 引用
Science China(Information Sciences) 2017年 第8期60卷 83-100页
作者: Rajan CRISTIN Velankanni CYRIL RAJ St.Peter’s Institute of Higher Education and Research Dr.M.G.R Educational and Research Institute University
Advances in photo editing software have made it possible to generate visually convincing photographic forgeries which have been increased tremendously in recent years. In order to alleviate the problem of image forger... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
image composite authentication using a single shadow observation
收藏 引用
Science China(Information Sciences) 2015年 第9期58卷 122-134页
作者: CAO XiaoChun ZHAO HanDong WANG Chuan ZHANG Wei State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences
The paper presents a novel method for image composite authentication based on a single shadow in an outdoor image. Existing methods based on the shadow geometry consistency involve more than two shadow observations. W... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Copy-Paste Detection Based on a SIFT Marked Graph Feature Vector
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 345-350页
作者: LYU Yingda SHEN Xuanjing CHEN Haipeng College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University
To detect copy-paste tampering,an improved SIFT(Scale invariant feature transform)-based algorithm was *** angle is defined and a maximum angle-based marked graph is *** marked graph feature vector is provided to each... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Exposing photo manipulation with inconsistent perspective geometry
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2014年 第4期21卷 83-91,104页
作者: LI Yan ZHOU Ya-jian YUAN Kai-guo GUO Yu-cui NIU Xin-xin Information Security Center Beijing University of Posts and Telecommunications
Manipulated digital image is got interesting in recent years. Digital images can be manipulated more easily with the aid of powerful image editing software. Forensic techniques for authenticating the integrity of digi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Digital forensics for Recoloring via Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2020年 第1期62卷 1-16页
作者: Zhangyi Shen Feng Ding Yunqing Shi Electrical and Computer Engineering Department New Jersey Institute of Technology323 Martin Luther King BLVDNewark NJ 07102USA Computer Science Department State University of New York Albany1400 Washington AveAlbany NY 12222USA
As a common medium in our daily life,images are important for most people to gather *** are also people who edit or even tamper images to deliberately deliver false information under different ***,in digital forensics... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Resampling Factor Estimation via Dual-Stream Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 647-657页
作者: Shangjun Luo Junwei Luo Wei Lu Yanmei Fang Jinhua Zeng Shaopei Shi Yue Zhang School of Data and Computer Science Guangdong Province Key Laboratory of Information Security TechnologyMinistry of Education Key Laboratory of Machine Intelligence and Advanced ComputingSun Yat-sen UniversityGuangzhou510006China Academy of Forensic Science Shanghai200063China College of Information Science and Technology Jinan UniversityGuangzhou510632China Department of Computer Science University of Massachusetts LowellLowellMA 01854USA
The estimation of image resampling factors is an important problem in image *** all the resampling factor estimation methods,spectrumbased methods are one of the most widely used methods and have attracted a lot of re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
image Tampering Detection Using No-Reference image Quality Metrics
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2014年 第6期21卷 51-56页
作者: Ying Li Bo Wang Xiang-Wei Kong Yan-Qing Guo School of Information and Communication Engineering Dalian University of Technology
In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image *** image tampering without any prior information of the original ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Discriminating between photorealistic computer graphics and natural images using fractal geometry
收藏 引用
Science in China(Series F) 2009年 第2期52卷 329-337页
作者: PAN Feng CHEN JiongBin HUANG JiWu Guangdong Key Lab of Information Security Technology School of Information Science and Technology Sun Yat-Sen UniversityGuangzhou 510275 China
Rendering technology in computer graphics (CG) is now capable of producing highly photorealistic images, giving rise to the problem of how to identify CG images from natural images. Some methods were proposed to sol... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论