Author:
Luo Weiqi,Qu Zhenhua,Pan Feng,Huang Jiwu
Publisher
Springer Science and Business Media LLC
Subject
General Computer Science,Theoretical Computer Science
Reference76 articles.
1. Farid H. Digital doctoring: How to tell the real from the fake, Significance, 2006, 3(4):162–166
2. http://www.cs.dartmouth.edu/farid/research/digitaltampering
3. Light K, Fonda, Kerry, Photo Fakery. The Washington Post, Saturday 28 Feb. 2004
4. Voice of the Mirror. Sorry. we were hoaxed: Iraqi PoW abuse pictures handed to us WERE fake. Daily Mirror Newspaper, 15 May 2004
5. Zhu B, Swanson M, Tewfik A. When seeing isn’t believing [multimedia authentication technologies]. IEEE Signal Processing Magazine, Mar. 2004, 21(2): 40–49
Cited by
53 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Efficient Image Forgery Detection Framework using Transfer Learning Models;2024 International Telecommunications Conference (ITC-Egypt);2024-07-22
2. A Comprehensive Survey on Methods for Image Integrity;ACM Transactions on Multimedia Computing, Communications, and Applications;2023-11-16
3. Visual User-Generated Content Verification in Journalism: An Overview;IEEE Access;2023
4. Error level analysis with convnet to identify image forgery;PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ENGINEERING RESEARCH AND APPLICATION 2022 (ICERA 2022);2023
5. QR-Code Crime-Specific Framework with Crime-Specific Intelligence;Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing;2023