CASIA OpenIR

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 期号: 2024, 页码: 5345-5356
作者:  Weinan Guan;  Wei Wang;  Jing Dong;  Bo Peng
Adobe PDF(1989Kb)  |  收藏  |  浏览/下载:23/6  |  提交时间:2024/06/21
Deepfake detection  forgery texture patterns  
Inconsistency-Aware Wavelet Dual-Branch Network for Face Forgery Detection 期刊论文
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 卷号: 3, 期号: 3, 页码: 308-319
作者:  jia geng yun;  zheng mei song;  hu chuan rui;  ma xin;  xu yu ting;  liu luo qi;  deng ya feng;  he ran
Adobe PDF(2690Kb)  |  收藏  |  浏览/下载:222/49  |  提交时间:2022/06/14
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:359/42  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
A hybrid convolutional architecture for accurate image manipulation localization at the pixel-level 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 期号: 80, 页码: 23377–23392
作者:  Zhang, Yixuan;  Zhang, Jiguang;  Xu, Shibiao
Adobe PDF(1369Kb)  |  收藏  |  浏览/下载:295/61  |  提交时间:2021/03/08
Manipulation localization  Top-down detection  Bottom-up segmentation  DenseCRFs  
Learning Insulators Segmentation from Synthetic Samples 会议论文
IEEE, Rio de Janeiro, 8-13 July 2018
作者:  W. Chang;  G. Yang;  Z. Wu;  Z. Liang
浏览  |  Adobe PDF(7888Kb)  |  收藏  |  浏览/下载:134/41  |  提交时间:2020/10/19
Segmentation  synthetic samples  adversarial training  
Exposing splicing forgery based on color temperature estimation 期刊论文
FORENSIC SCIENCE INTERNATIONAL, 2018, 卷号: 289, 页码: 1-11
作者:  Sun, Peng;  Lang, Yubo;  Fan, Shu;  Shen, Zhe;  Liu, Lei;  Shan, Daguo;  Peng, Silong
收藏  |  浏览/下载:106/0  |  提交时间:2019/12/16
Image authentication  Manipulation localization  Color shift  Color temperature estimation  
Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 11, 页码: 2772-2787
作者:  Quan, Weize;  Wang, Kai;  Yan, Dong-Ming;  Zhang, Xiaopeng
浏览  |  Adobe PDF(8950Kb)  |  收藏  |  浏览/下载:480/153  |  提交时间:2018/10/01
Image forensics  natural image  computer-generated image  convolutional neural network  robustness  local-to-global strategy  visualization  
Image Forensics Based on Planar Contact Constraints of 3D Objects 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2, 页码: 377-392
作者:  Peng, Bo;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6260Kb)  |  收藏  |  浏览/下载:620/194  |  提交时间:2017/09/20
Image Forensics  Splicing Detection  Contact Constraint  3d Morphable Model  
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 138, 页码: 280-293
作者:  Qin, Chuan;  Ji, Ping;  Zhang, Xinpeng;  Dong, Jing;  Wang, Jinwei
收藏  |  浏览/下载:210/0  |  提交时间:2017/07/18
Fragile Watermarking  Overlapping Embedding  Pixel-wise Recovery  Tampering Localization  
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 卷号: 9, 期号: 10, 页码: 1653-1666
作者:  Wang, Wei;  Dong, Jing;  Tan, Tieniu
浏览  |  Adobe PDF(6342Kb)  |  收藏  |  浏览/下载:465/137  |  提交时间:2015/08/12
Image Forensics  Local Tampering Detection  Double Quantization  Graph Cut