[1] |
VERDOLIVA L. Media Forensics and Deepfakes: An Overview[J]. IEEE Journal of Selected Topics in Signal Processing, 2020, 14(5): 910-932.
doi: 10.1109/JSTSP.2020.3002101
URL
|
[2] |
LI Xurong, JI Shouling, WU Chunming, et al. Survey on Deepfakes and Detection[J]. Journal of Software, 2020, 32(2): 496-518.
|
|
李旭嵘, 纪守领, 吴春明, 等. 深度伪造与检测技术综述[J]. 软件学报, 2020, 32(2): 496-518.
|
[3] |
NGUYEN E, BUI T, SWAMINATHAN V, et al. OSCAR-Net: Object-Centric Scene Graph Attention for Image Attribution[C]// IEEE. Proceedings of the International Conference on Computer Vision. New York: IEEE, 2021: 14499-14508.
|
[4] |
WANG Xiaofeng, PANG Kemu, ZHOU Xiaorui, et al. A Visual Model-Based Perceptual Image Hash for Content Authentication[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7): 1336-1349.
doi: 10.1109/TIFS.2015.2407698
URL
|
[5] |
ZHENG Yue, CAO Yuan, CHANG C H. A PUF-Based Data-Device Hash for Tampered Image Detection and Source Camera Identification[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 620-634.
doi: 10.1109/TIFS.10206
URL
|
[6] |
MORRA L, LAMBERTI F. Benchmarking Unsupervised Near-Duplicate Image Detection[J]. Expert Systems with Applications, 2019, 135: 313-326.
doi: 10.1016/j.eswa.2019.05.002
|
[7] |
DU Ling, HO A T S, CONG Runming. Perceptual Hashing for Image Authentication: A Survey[EB/OL]. [2022-09-11]. https://www.sciencedirect.com/science/article/pii/S0923596519301286?casa_token=-0e5whXRzlMAAAAA:FmzmPXwGobhIxJqrpIjEuyQquICm3J7lTNsuI4PaALvnTR1nHeB2hBr10NVoyC45kTb6sxH9I9Ql.
|
[8] |
ROSENTHOL L, PARSONS A, SCOUTEN E, et al. Content Authenticity Initiative (CAI): Setting the Standard for Content Attribution[EB/OL]. [2022-10-11]. https://contentauthenticity.org/.
|
[9] |
BLACK A, BUI T, JIN Hailin, et al. Deep Image Comparator: Learning to Visualize Editorial Change[C]// IEEE. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. New York: IEEE, 2021: 972-980.
|
[10] |
MOREIRA D, BHARATI A, BROGAN J, et al. Image Provenance Analysis at Scale[J]. IEEE Transactions on Image Processing, 2018, 27(12): 6109-6123.
doi: 10.1109/TIP.2018.2865674
URL
|
[11] |
BHARATI A, MOREIRA D, FLYNN P J, et al. Transformation-Aware Embeddings for Image Provenance[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2493-2507.
doi: 10.1109/TIFS.10206
URL
|
[12] |
COZZOLINO D, VERDOLIVA L. Noiseprint: A CNN-Based Camera Model Fingerprint[J]. IEEE Transactions on Information Forensics and Security, 2019, 15: 144-159.
doi: 10.1109/TIFS.10206
URL
|
[13] |
MATERN F, RIESS C, STAMMINGER M. Gradient-Based Illumination Description for Image Forgery Detection[J]. IEEE Transactions on Information Forensics and Security, 2019, 15: 1303-1317.
doi: 10.1109/TIFS.10206
URL
|
[14] |
QI Hua, GUO Qing, JUEFEI-XU F, et al. Deeprhythm: Exposing Deepfakes with Attentional Visual Heartbeat Rhythms[C]// ACM. Proceedings of the 28th ACM International Conference on Multimedia. New York: ACM, 2020: 4318-4327.
|
[15] |
WU Jinhai, LIN Fuzong. Image Authentication Based on Digital Watermarking[J]. Chinese Journal of Computers, 2004, 27(9): 1153-1161.
|
|
吴金海, 林福宗. 基于数字水印的图像认证技术[J]. 计算机学报, 2004, 27(9): 1153-1161.
|
[16] |
ZHANG Rui, XUE Rui, LIU Ling. Security and Privacy on Blockchain[J]. ACM Computing Surveys, 2019, 52(3): 1-34.
|
[17] |
HAO Qingying, LUO Licheng, JAN S T K, et al. It's Not What It Looks Like: Manipulating Perceptual Hashing Based Applications[C]// ACM. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2021: 69-85.
|
[18] |
LIANG Xiaoping, TANG Zhenjun, HUANG Ziqing, et al. Efficient Hashing Method Using 2D-2D PCA for Image Copy Detection[J]. IEEE Transactions on Knowledge and Data Engineering, 2021, 35(4): 3765-3778.
doi: 10.1109/TKDE.2021.3131188
URL
|
[19] |
ZHOU Zhili, WANG Yunlong, WU Q M J, et al. Effective and Efficient Global Context Verification for Image Copy Detection[J]. IEEE Transactions on Information Forensics and Security, 2016, 12(1): 48-63.
doi: 10.1109/TIFS.2016.2601065
URL
|
[20] |
LIANG Xiaoping, TANG Zhenjun, WU Jingli, et al. Robust Image Hashing with Isomap and Saliency Map for Copy Detection[EB/OL]. [2022-09-11]. https://ieeexplore.ieee.org/abstract/document/9665342.
|
[21] |
ZHANG Xuyao, LIU Chenglin, SUEN C Y. Towards Robust Pattern Recognition: A Review[J]. Proceedings of the IEEE, 2020, 108(6): 894-922.
doi: 10.1109/PROC.5
URL
|
[22] |
BALNTAS V, LENC K, VEDALDI A, et al. H-Patches: A Benchmark and Evaluation of Handcrafted and Learned Local Descriptors[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020, 42(11): 2825-2841.
|
[23] |
QI Shuren, ZHANG Yushu, WANG Chao, et al. A Principled Design of Image Representation: Towards Forensic Tasks[EB/OL]. [2022-09-11]. https://ieeexplore.ieee.org/abstract/document/9881995.
|
[24] |
QI Shuren, ZHANG Yushu, WANG Chao, et al. A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation[J]. ACM Computing Surveys, 2021, 55(1): 1-35.
|
[25] |
LOWE D G. Distinctive Image Features from Scale-Invariant Keypoints[J]. International Journal of Computer Vision, 2004, 60(2): 91-110.
doi: 10.1023/B:VISI.0000029664.99615.94
URL
|
[26] |
XIE Lingxi, WANG Jingdong, ZHANG Bo, et al. Fine-Grained Image Search[J]. IEEE Transactions on Multimedia, 2015, 17(5): 636-647.
doi: 10.1109/TMM.2015.2408566
URL
|
[27] |
VEMPALA S S. The Random Projection Method[M]. Providence, RhodeIsland, USA: American Mathematical Soc., 2005.
|
[28] |
DERRODE S, GHORBEL F. Robust and Efficient Fourier-Mellin Transform Approximations for Invariant Grey-Level Image Description and Reconstruction[J]. Computer Vision and Image Understanding, 2001, 83(1): 57-78.
doi: 10.1006/cviu.2001.0922
URL
|
[29] |
YAP P T, JIANG Xudong, KOT A C. Two-Dimensional Polar Harmonic Transforms for Invariant Image Representation[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(7): 1259-1270.
doi: 10.1109/TPAMI.2009.119
URL
|
[30] |
KORUS P, HUANG Jiwu. Evaluation of Random Field Models in Multi-Modal Unsupervised Tampering Localization[C]// IEEE. 2016 IEEE International Workshop on Information Forensics and Security (WIFS). New York: IEEE, 2016: 1-6.
|