ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Image manipulation detection using Edge-based segmentation and statistical property of wavelet coefficients
2014 International Conference on Electronics, Information and Communications (ICEIC)
◽
10.1109/elinfocom.2014.6914358
◽
2014
◽
Author(s):
Bo Gyu Jeong
◽
Il Kyu Eom
Keyword(s):
Image Manipulation
◽
Wavelet Coefficients
◽
Statistical Property
◽
Edge Based
◽
Manipulation Detection
Download Full-text
Related Documents
Cited By
References
Structuring Element-counting Approach for Morphological Pattern Spectrum-based Image Manipulation Detection
2019 2nd International Symposium on Devices, Circuits and Systems (ISDCS)
◽
10.1109/isdcs.2019.8719260
◽
2019
◽
Cited By ~ 1
Author(s):
Kyosuke Kageyama
◽
Takeshi Kumaki
◽
Tetsushi Koide
Keyword(s):
Image Manipulation
◽
Morphological Pattern
◽
Pattern Spectrum
◽
Structuring Element
◽
Counting Approach
◽
Manipulation Detection
Download Full-text
Constrained R-Cnn: A General Image Manipulation Detection Model
2020 IEEE International Conference on Multimedia and Expo (ICME)
◽
10.1109/icme46284.2020.9102825
◽
2020
◽
Author(s):
Chao Yang
◽
Huizhou Li
◽
Fangting Lin
◽
Bin Jiang
◽
Hao Zhao
Keyword(s):
Image Manipulation
◽
Detection Model
◽
Manipulation Detection
Download Full-text
A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16
◽
10.1145/2909827.2930786
◽
2016
◽
Cited By ~ 132
Author(s):
Belhassen Bayar
◽
Matthew C. Stamm
Keyword(s):
Deep Learning
◽
Image Manipulation
◽
Learning Approach
◽
Manipulation Detection
Download Full-text
Revealing image forgery through image manipulation detection
2015 Global Conference on Communication Technologies (GCCT)
◽
10.1109/gcct.2015.7342759
◽
2015
◽
Cited By ~ 2
Author(s):
Jayshri Charpe
◽
Antara Bhattacharya
Keyword(s):
Image Manipulation
◽
Image Forgery
◽
Manipulation Detection
Download Full-text
Data-Dependent Scaling of CNN’s First Layer for Improved Image Manipulation Detection
Digital Forensics and Watermarking - Lecture Notes in Computer Science
◽
10.1007/978-3-030-69449-4_16
◽
2021
◽
pp. 208-223
Author(s):
Ivan Castillo Camacho
◽
Kai Wang
Keyword(s):
Image Manipulation
◽
Manipulation Detection
Download Full-text
L2-Constrained RemNet for Camera Model Identification and Image Manipulation Detection
Computer Vision – ECCV 2020 Workshops - Lecture Notes in Computer Science
◽
10.1007/978-3-030-66823-5_16
◽
2020
◽
pp. 267-282
Author(s):
Abdul Muntakim Rafi
◽
Jonathan Wu
◽
Md. Kamrul Hasan
Keyword(s):
Model Identification
◽
Image Manipulation
◽
Camera Model
◽
Manipulation Detection
Download Full-text
Convolutional Neural Network Initialization Approaches for Image Manipulation Detection
Digital Signal Processing
◽
10.1016/j.dsp.2021.103376
◽
2021
◽
pp. 103376
Author(s):
Ivan Castillo Camacho
◽
Kai Wang
Keyword(s):
Neural Network
◽
Convolutional Neural Network
◽
Image Manipulation
◽
Manipulation Detection
Download Full-text
Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches
Digital Forensics and Watermarking - Lecture Notes in Computer Science
◽
10.1007/978-3-030-43575-2_8
◽
2020
◽
pp. 99-114
Author(s):
Ludovic Darmet
◽
Kai Wang
◽
François Cayre
Keyword(s):
Image Manipulation
◽
Weakly Supervised
◽
Manipulation Detection
Download Full-text
Improving the security of image manipulation detection through one-and-a-half-class multiple classification
Multimedia Tools and Applications
◽
10.1007/s11042-019-08425-z
◽
2019
◽
Vol 79
(3-4)
◽
pp. 2383-2408
◽
Cited By ~ 1
Author(s):
Mauro Barni
◽
Ehsan Nowroozi
◽
Benedetta Tondi
Keyword(s):
Image Manipulation
◽
Multiple Classification
◽
Manipulation Detection
Download Full-text
Digital image manipulation detection with weak feature stream
The Visual Computer
◽
10.1007/s00371-021-02146-x
◽
2021
◽
Author(s):
Hao Chen
◽
Qi Han
◽
Qiong Li
◽
Xiaojun Tong
Keyword(s):
Digital Image
◽
Image Manipulation
◽
Manipulation Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close