CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共7条,第1-7条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Revisiting ensemble adversarial attack 期刊论文
Signal Processing: Image Communication, 2022, 卷号: 107, 页码: 116747
作者:  Ziwen He;  Wei Wang;  Jing Dong;  Tieniu Tan
Adobe PDF(1597Kb)  |  收藏  |  浏览/下载:220/77  |  提交时间:2023/04/26
Image Forgery Detection Based on Semantic Image Understanding 会议论文
, Tianjin, China, 11-14, Oct. 2017
作者:  Ye, Kui;  Dong, Jing;  Wang, Wei;  Xu, Jindong;  Tan, Tieniu
浏览  |  Adobe PDF(602Kb)  |  收藏  |  浏览/下载:466/170  |  提交时间:2017/09/20
High Capacity Reversible Data Hiding with Contrast Enhancement 会议论文
, Tianjin, China, 11-14, Oct. 2017
作者:  Ri, Yonggwon;  Dong, Jing;  Wang, Wei;  Tan, Tieniu
浏览  |  Adobe PDF(1752Kb)  |  收藏  |  浏览/下载:394/119  |  提交时间:2017/09/20
Adaptive Histogram Shifting Based Reversible Data Hiding 会议论文
, Matsue, Shimane, Japan, August 12-15, 2017
作者:  Ri, Yonggwon;  Dong, Jing;  Wang, Wei;  Tan, Tieniu
浏览  |  Adobe PDF(13654Kb)  |  收藏  |  浏览/下载:413/50  |  提交时间:2017/09/20
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:636/198  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Optimized 3D Lighting Environment Estimation for Image Forgery Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2, 页码: 479-494
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(4867Kb)  |  收藏  |  浏览/下载:698/272  |  提交时间:2017/02/14
Image Forensics  Composite Detection  Human Faces  Lighting Estimation  
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 卷号: 9, 期号: 10, 页码: 1653-1666
作者:  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6342Kb)  |  收藏  |  浏览/下载:473/139  |  提交时间:2015/08/12
Image Forensics  Local Tampering Detection  Double Quantization  Graph Cut