1 |
Z Zhang, Y Zhou, J Kang and Y Ren, Study of image splicing detection., International Conference on Intelligent Computing. Springer, Berlin, Heidelberg, 2008
|
2 |
Ham, Jisoo, et al. "Investigation of the random forest framework for classification of hyperspectral data." IEEE Transactions on Geoscience and Remote Sensing 43.3 (2005): 492-501
DOI
|
3 |
D Mellouli, TM Hamdani, MB Ayed and AM Alimi, Morph-CNN: a morphological convolutional neural network for image classification, International Conference on Neural Information Processing. Springer, Cham, 2017
|
4 |
Makrushin, Andrey, Tom Neubert, and Jana Dittmann., Automatic generation and detection of visually faultless facial morphs, International Conference on Computer Vision Theory and Applications. Vol. 7. SCITEPRESS, 2017
|
5 |
Rao, Yuan, Jiangqun Ni, and Hao Xie. "Multi-semantic CRF-based attention model for image forgery detection and localization." Signal Processing 183 (2021): 108051.
DOI
|
6 |
Jaiswal, A Kumar, and R Srivastava, A technique for image splicing detection using Hybrid feature set, Multimedia Tools and Applications 79.17 (2020): 11837-11860
DOI
|
7 |
Reyna, Roberto A., et al. "Implementation of the SVM neural network generalization function for image processing." Proceedings Fifth IEEE International Workshop on Computer Architectures for Machine Perception. IEEE, 2000.
|
8 |
Kadam, Kalyani, Swati Ahirrao, and Ketan Kotecha. "AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI." International Journal of Electrical & Computer Engineering (2088-8708) 11.5 (2021).
|
9 |
Venkatesh, Sushma, et al. "Face morphing attack generation & detection: A comprehensive survey." IEEE Transactions on Technology and Society (2021).
|
10 |
Saini, Hardeep, M-SIFT: A detection algorithm for copy move image forgery, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2017
|
11 |
Zhang, Fengli, and Qinghua Li., Deep learning-based data forgery detection in automatic generation control, 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, 2017
|
12 |
Li, Jiming, Active learning for hyperspectral image classification with a stacked autoencoders based neural network, 2015 7th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS). IEEE, 2015
|
13 |
D Cheng, G Meng, S Xiang and C Pan, FusionNet: Edge aware deep convolutional networks for semantic segmentation of remote sensing harbor images, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 10.12 (2017): 5769-5783
DOI
|
14 |
Y Li, J Zhou, A Cheng, X Liu and Y Y Tang, SIFT keypoint removal and injection via convex relaxation, IEEE Transactions on Information Forensics and Security 11.8 (2016): 1722-1735
DOI
|
15 |
F Husain, H Schulz, B Dellen, C Torras and S Behnke, Combining semantic and geometric features for object class segmentation of indoor scenes, IEEE Robotics and Automation Letters 2.1 (2016): 49-55
DOI
|
16 |
Jassim, Sabah, and Aras Asaad, Automatic detection of image morphing by topology-based analysis, 2018 26th European Signal Processing Conference (EUSIPCO). IEEE, 2018
|
17 |
Raja, Kiran, Sushma Venkatesh, and R. B. Christoph Busch. "Transferable deep-cnn features for detecting digital and print-scanned morphed face images." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 2017.
|
18 |
Aghdaie, Poorya, et al. "Morph Detection Enhanced by Structured Group Sparsity." Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision. 2022.
|
19 |
de Santana, Felipe Bachion, Waldomiro Borges Neto, and Ronei J. Poppi. "Random forest as one-class classifier and infrared spectroscopy for food adulteration detection." Food chemistry 293 (2019): 323-332.
DOI
|
20 |
Ferrara, Matteo, Annalisa Franco, and Davide Maltoni. "Face morphing detection in the presence of printing/scanning and heterogeneous image sources." IET Biometrics 10.3 (2021): 290-303.
DOI
|
21 |
https://www.kaggle.com/sophatvathana/casia-dataset
|
22 |
Seibold, Clemens, et al. "Accurate and robust neural networks for face morphing attack detection." Journal of Information Security and Applications 53 (2020): 102526.
DOI
|
23 |
Venkatesh, Sushma, et al. "Single image face morphing attack detection using ensemble of features." 2020 IEEE 23rd International Conference on Information Fusion (FUSION). IEEE, 2020.
|
24 |
Scherhag, Ulrich, et al. "Detecting morphed face images using facial landmarks." International Conference on Image and Signal Processing. Springer, Cham, 2018.
|
25 |
Marra, Francesco, et al. "A full-image full-resolution end-to-end-trainable CNN framework for image forgery detection." IEEE Access 8 (2020): 133488-133502.
DOI
|
26 |
Dua, Shilpa, Jyotsna Singh, and Harish Parthasarathy. "Image forgery detection based on statistical features of block DCT coefficients." Procedia Computer Science 171 (2020): 369-378.
DOI
|
27 |
Meena, Kunj Bihari, and Vipin Tyagi. "A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms." Multimedia Tools and Applications 79.11 (2020): 8197-8212.
DOI
|
28 |
Al_Azrak, Faten Maher, et al. "An efficient method for image forgery detection based on trigonometric transforms and deep learning." Multimedia Tools and Applications 79.25 (2020): 18221-18243.
DOI
|
29 |
M Hildebrandt, T Neubert, A Makrushin and J Dittmann , Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps, 2017 5th International Workshop on Biometrics and Forensics (IWBF). IEEE, 2017
|
30 |
R Raghavendra, K B Raja, S Marcel and C Busch, Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in laplacian scale-space, 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA). IEEE, 2016
|
31 |
Neubert, Tom, Face morphing detection: An approach based on image degradation analysis, International Workshop on Digital Watermarking. Springer, Cham, 2017
|
32 |
Albawi, Saad, Tareq Abed Mohammed, and Saad Al-Zawi., Understanding of a convolutional neural network, 2017 International Conference on Engineering and Technology (ICET). Ieee, 2017
|
33 |
Geetha, M., et al. "A novel approach for image forgery detection using improved crow search algorithm." Materials Today: Proceedings (2021).
|
34 |
El Biach, Fatima Zahra, et al. "Encoder-decoder based convolutional neural networks for image forgery detection." Multimedia Tools and Applications (2021): 1-18.
|
35 |
A Thakur and N Jindal, Hybrid deep learning and machine learning approach for passive image forensic, IET Image Processing 14.10 (2020): 1952-1959
DOI
|
36 |
Z He, W Lu, W Sun and J Huang, Digital image splicing detection based on Markov features in DCT and DWT domain, Pattern recognition 45.12 (2012): 4292-4299
DOI
|
37 |
Jackins, V., et al. "AI-based smart prediction of clinical disease using random forest classifier and Naive Bayes." The Journal of Supercomputing 77.5 (2021): 5198-5219.
DOI
|
38 |
Brownlee, Jason. "What is the Difference Between a Batch and an Epoch in a Neural Network?." Machine Learning Mastery 20 (2018).
|
39 |
Jaiswal, Ankit Kumar, and Rajeev Srivastava, Image splicing detection using deep residual network, Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE). 2019
|
40 |
J Bunk, J H Bappy, T M Mohammed, L Nataraj, A Flenner, B S Manjunath, S Chandrasekaran, A Chowdhury and L Peterson, Detection and localization of image forgeries using resampling features and deep learning, 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW). IEEE, 2017
|
41 |
V Thirunavukkarasu, and J S Kumar, Passive image tamper detection based on fast retina key point descriptor, 2016 IEEE International Conference on Advances in Computer Applications (ICACA). IEEE, 2016.
|
42 |
I Amerini, L Ballan, R Caldelli, A D Bimbo, G Serra, A sift-based forensic method for copy-move attack detection and transformation recovery, IEEE transactions on information forensics and security 6.3 (2011): 1099-1110
DOI
|
43 |
Zhao, Wenzhi, Shihong Du, and William J. Emery, Object-based convolutional neural network for high-resolution imagery classification, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 10.7 (2017): 3386-3396
DOI
|
44 |
Wang, Wenguan, Jianbing Shen, and Ling Shao, Video salient object detection via fully convolutional networks, IEEE Transactions on Image Processing 27.1 (2017): 38-49
DOI
|
45 |
Makrushin, Andrey, Tom Neubert, and Jana Dittmann. "Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control." VISIGRAPP (4: VISAPP). 2019.
|
46 |
Neubert, Tom, Christian Kraetzer, and Jana Dittmann. "A face morphing detection concept with a frequency and a spatial domain feature space for images on eMRTD." Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 2019.
|
47 |
Aghdaie, Poorya, et al. "Attention aware wavelet-based detection of morphed face images." 2021 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2021.
|
48 |
Scherhag, Ulrich, et al. "Morphing Attack Detection using Laplace operator based features." Norsk IKT-konferanse for forskning og utdanning. No. 3. 2020.
|
49 |
https://www.ee.columbia.edu/ln/dvmm/downloads/AuthSp licedDataSet/AuthSplicedDataSet.htm
|