參考文獻 |
[1] S. Fazli, M. Moeini, "A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks," in Optik, vol. 127, no. 2, pp. 964-972, 2016.
[2] I. Yerushalmy, H. Hel-Or, "Digital image forgery detection based on lens and sensor aberration," in International journal of computer vision, vol. 92, pp. 71-91, 2011.
[3] P. Ferrara, et al., "Image forgery localization via fine-grained analysis of CFA artifacts," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1566-1577, 2012.
[4] H. Farid, S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," in 2003 Conference on computer vision and pattern recognition workshop, vol. 8, pp. 94, 2003.
[5] A. Popescu, H. Farid, "Statistical tools for digital forensics," in International workshop on information hiding, pp. 128-147, 2004.
[6] B. Mahdian, S. Saic, "Using noise inconsistencies for blind image forensics," in Image and vision computing, vol. 27, no. 10, pp. 1497-1503, 2009.
[7] D. Cozzolino, G. Poggi, L. Verdoliva, "Splicebuster: A new blind image splicing detector," in 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1-6, 2015.
[8] T. Bianchi, A. Piva, "Image forgery localization via block-grained analysis of JPEG artifacts," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1003-1017, 2012.
[9] C. Iakovidou, et al., "Content-aware detection of JPEG grid inconsistencies for intuitive image forensics," in Journal of Visual Communication and Image Representation, vol. 54, pp. 155-170, 2018.
[10] X. Bi, et al., "RRU-Net: The ringed residual U-Net for image splicing forgery detection," in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 0, 2019.
[11] Y. Wu, W. AbdAlmageed, P. Natarajan, "Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features," in Proceedings of the IEEE/CVF conference on Computer Vision and Pattern Recognition, pp. 9543-9552, 2019.
[12] M. Huh, et al., "Fighting fake news: Image splice detection via learned self-consistency," in Proceedings of the European conference on computer vision (ECCV), pp. 101-117, 2018.
[13] A. Rossler, et al., "Faceforensics++: Learning to detect manipulated facial images," in Proceedings of the IEEE/CVF international conference on computer vision, pp. 1-11, 2019.
[14] H. Nguyen, J. Yamagishi, I. Echizen, "Capsule-forensics: Using capsule networks to detect forged images and videos," in ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 2307-2311, 2019.
[15] P. Zhou, et al., "Two-stream neural networks for tampered face detection," in 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp. 1831-1839, 2017.
[16] B. Yu, et al., "Frequency-aware spatiotemporal transformers for video inpainting detection," in Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 8188-8197, 2021.
[17] H. Liu, et al., "Spatial-phase shallow learning: rethinking face forgery detection in frequency domain," in Proceedings of the IEEE/CVF conference on Computer Vision and Pattern Recognition, pp. 772-781, 2021.
[18] X. Yang, Y. Li, S. Lyu, "Exposing deep fakes using inconsistent head poses," in ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8261-8265, 2019.
[19] P. Gronquist, et al., "Efficient Temporally-Aware DeepFake Detection using H. 264 Motion Vectors," in arXiv preprint arXiv:2311.10788, 2023.
[20] D. Güera, E. Delp, "Deepfake video detection using recurrent neural networks," in 2018 15th IEEE international conference on advanced video and signal based surveillance (AVSS), pp. 1-6, 2018.
[21] D. Wodajo, S. Atnafu. "Deepfake video detection using convolutional vision transformer," in arXiv preprint arXiv:2102.11126, 2021.
[22] A. Haliassos, et al., "Lips don′t lie: A generalisable and robust approach to face forgery detection," in Proceedings of the IEEE/CVF conference on Computer Vision and Pattern Recognition, pp. 5039-5049, 2021.
[23] C. Feng, Z. Chen, A. Owens, "Self-supervised video forensics by audio-visual anomaly detection," in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 10491-10503, 2023.
[24] K. Zhang, et al., "Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising," in IEEE transactions on image processing, vol. 26, no. 7, pp. 3142-3155, 2017.
[25] J. Bromley, et al., "Signature verification using a" siamese" time delay neural network," in Advances in neural information processing systems, vol. 6, 1993.
[26] S. Chopra, R. Hadsell, Y. LeCun, "Learning a similarity metric discriminatively, with application to face verification," in 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR′05), pp. 539-546, 2005.
[27] Q. Wang, et al., "Fast online object tracking and segmentation: A unifying approach," in Proceedings of the IEEE/CVF conference on Computer Vision and Pattern Recognition, pp. 1328-1338, 2019.
[28] J. Mueller, A. Thyagarajan, " Siamese Recurrent Architectures for Learning Sentence Similarity," in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 30, no. 1, 2016.
[29] R. Hadsell, S. Chopra, Y. LeCun, " Dimensionality Reduction by Learning an Invariant Mapping," in 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR′06), vol. 2, pp. 1735-1742, 2006.
[30] C. Rother, V. Kolmogorov, A. Blake, "" GrabCut" interactive foreground extraction using iterated graph cuts," in ACM transactions on graphics (TOG), vol. 23, no. 3, pp. 309-314, 2004.
[31] K. Zhang, et al., "Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks," in IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.
[32] T. Gloe, R. Böhme, " The ′Dresden Image Database′ for benchmarking digital image forensics", in Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1584-1590, 2010.
[33] C. Galdi, F. Hartung, J. Dugelay, "Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones" in Electronic Imaging, vol. 29, pp 100-103, 2017.
[34] D. Shullani, et al., "Vision: a video and image dataset for source identification," in EURASIP Journal on Information Security, vol. 2017, pp. 1-16, 2017.
[35] T. De Carvalho, et al., "Exposing digital image forgeries by illumination color classification," in IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1182-1194, 2013.
[36] P. Jaccard, "The distribution of the flora in the alpine zone, "in New Phytologist, vol. 11, no. 2, pp. 37-50, 1912.
[37] P. Su, B. Huang, T. Kuo, "UFCC: A Unified Forensic Approach to Locating Tampered Areas in Still Images and Detecting Deepfake Videos by Evaluating Content Consistency," in Electronics, vol. 13, no. 4, pp. 804, 2024.
[38] T. Bianchi, A. Piva. "Image forgery localization via block-grained analysis of JPEG artifacts," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1003-1017, 2012.
[39] S. Ye, Q. Sun, E. Chang, "Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact," in 2007 IEEE International Conference on Multimedia and Expo, pp. 12-15, 2007.
[40] B. Mahdian, S. Saic, "Using noise inconsistencies for blind image forensics," in Image and Vision Computing, vol. 27, no. 10, pp. 1497-1503, 2009.
[41] R. Salloum, Y. Ren, C. Kuo, "Image Splicing Localization using a Multi-task Fully Convolutional Network (MFCN)," in Journal of Visual Communication and Image Representation, vol. 51, pp. 201-209, 2018.
[42] H. Ding, et al., "DCU-Net: a dual-channel U-shaped network for image splicing forgery detection," in Neural Comput & Applic 35, pp. 5015–5031, 2023.
[43] Y. Zhang, et al., "Multi-Task SE-Network for Image Splicing Localization," in IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 7, pp. 4828-4840, 2022.
[44] F. Chollet, "Xception: Deep Learning with Depthwise Separable Convolutions," in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1800-1807, 2017.
[45] J. Fridrich, J. Kodovsky, "Rich Models for Steganalysis of Digital Images," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, 2012.
[46] D. Cozzolino, G. Poggi, L. Verdoliva, "Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection," in Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp. 159-164, 2017.
[47] B. Bayar, M. Stamm, "A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer," in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 5–10, 2016.
[48] N. Rahmouni, et al., "Distinguishing computer graphics from natural images using convolution neural networks," in 2017 IEEE Workshop on Information Forensics and Security (WIFS), pp. 1-6, 2017.
[49] D. Afchar, et al., "MesoNet: a Compact Facial Video Forgery Detection Network," in 2018 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1-7, 2018.
[50] R. Venkatesan, et al., "Robust image hashing," in Proceedings 2000 International Conference on Image Processing, vol. 3, pp. 664-666, 2000.
[51] R. Datta, et al., "Image retrieval: Ideas, influences, and trends of the new age," in ACM Comput. Surv., vol. 40, no. 2, pp. 60, 2008.
[52] M. Chen, et al., "Determining Image Origin and Integrity Using Sensor Noise," in IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74-90, 2008.
[53] Corel, Corel_Professional_Photos_Collection_1994, Internet Archive Python library 1.9.0, 1994, https://archive.org/details/Corel_Professional_Photos_Collection_1994. |