Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns (English)
- New search for: Li, Zhaohong
- New search for: Ye, Jingyu
- New search for: Shi, Yun Qing
- New search for: Li, Zhaohong
- New search for: Ye, Jingyu
- New search for: Shi, Yun Qing
In:
The International Workshop on Digital Forensics and Watermarking 2012
1
;
228-241
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns
-
Contributors:
-
Published in:Lecture Notes in Computer Science ; 7809, 1 ; 228-241
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
New Channel Selection Criterion for Spatial Domain SteganographyZhong, Yane / Huang, Fangjun / Zhang, Dong et al. | 2013
- 8
-
A Study of Optimal Matrix for Efficient Matrix Embedding in $\mathbb{F}_3$Qi, Yuanzhi / Li, Xiaolong / Wang, Bin / Yang, Bin et al. | 2013
- 19
-
A Novel Mapping Scheme for SteganalysisChen, Licong / Shi, Yun Q. / Sutthiwan, Patchara / Niu, Xinxin et al. | 2013
- 34
-
Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image EstimationGuo, Yan-qing / Kong, Xiang-wei / Wang, Bo / Xiao, Qian et al. | 2013
- 44
-
Calibration Based Reliable Detector for Detecting LSB Matching SteganographyPeng, Fei / Li, Xiaolong / Yang, Bin et al. | 2013
- 54
-
LSB Replacement Steganography Software Detection Based on Model CheckingZhao, Zheng / Liu, Fenlin / Luo, Xiangyang / Xie, Xin / Yu, Lu et al. | 2013
- 69
-
An Attempt to Generalize Distortion Measure for JPEG SteganographySachnev, Vasily / Kim, Hyoung Joong et al. | 2013
- 83
-
Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective InvariantsYaşaroğlu, Yağız / Alatan, A. Aydın et al. | 2013
- 98
-
Consideration of the Watermark Inversion Attack and Its Invalidation FrameworkOhzeki, Kazuo / Wei, YuanYu / Hirakawa, Yutaka / Sato, Kiyosugu et al. | 2013
- 111
-
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT TransformZhang, Huang / Li, Xiao-Qiang et al. | 2013
- 120
-
Self-embedding Fragile Watermarking Scheme Combined Average with VQ EncodingHe, Hongjie / Chen, Fan / Huo, Yaoran et al. | 2013
- 135
-
An Efficient Fragile Web Pages Watermarking for Integrity Protection of XML DocumentsWen, Quan / Wang, Yufei et al. | 2013
- 145
-
Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric ExtensionZhao, Qiyin / Chen, Daqing / Tao, Zhi / Gu, Jihua et al. | 2013
- 156
-
High Capacity Data Hiding for Halftone Image AuthenticationGuo, Meng / Zhang, Hongbin et al. | 2013
- 169
-
Coded Spread Spectrum Watermarking SchemeKuribayashi, Minoru et al. | 2013
- 184
-
Enhancement of Method for Preventing Unauthorized Copying of Displayed Information Using Object Surface ReflectionYamada, Takayuki / Gohshi, Seiichi / Echizen, Isao et al. | 2013
- 198
-
Image Splicing Verification Based on Pixel-Based Alignment MethodCiptasari, Rimba Whidiana / Rhee, Kyung-Hyune / Sakurai, Kouichi et al. | 2013
- 213
-
Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic ToolsComesaña, Pedro / Pérez-González, Fernando et al. | 2013
- 228
-
Distinguishing Computer Graphics from Photographic Images Using Local Binary PatternsLi, Zhaohong / Ye, Jingyu / Shi, Yun Qing et al. | 2013
- 242
-
Detecting Removed Object from Video with Stationary BackgroundLi, Leida / Wang, Xuewei / Zhang, Wei / Yang, Gaobo / Hu, Guozhang et al. | 2013
- 253
-
Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference SignalHu, Yongjian / Li, Chang-Tsun / Lv, Zhisheng / Liu, Bei-Bei et al. | 2013
- 267
-
A Novel Video Inter-frame Forgery Model Detection Scheme Based on Optical Flow ConsistencyChao, Juan / Jiang, Xinghao / Sun, Tanfeng et al. | 2013
- 282
-
Countering Universal Image Tampering Detection with Histogram RestorationChen, Luyi / Wang, Shilin / Li, Shenghong / Li, Jianhua et al. | 2013
- 290
-
Face Verification Using Color Sparse RepresentationShin, Wook Jin / Lee, Seung Ho / Min, Hyun-Seok / Sohn, Hosik / Ro, Yong Man et al. | 2013
- 300
-
Rapid Image Splicing Detection Based on Relevance Vector MachineSu, Bo / Yuan, Quanqiao / Zhang, Yujin / Zhai, Mengying / Wang, Shilin et al. | 2013
- 311
-
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation DegreeLiu, Zhenghui / Wang, Hongxia et al. | 2013
- 327
-
Saliency-Based Region Log Covariance Feature for Image Copy DetectionHe, Xin / Jing, Huiyun / Han, Qi / Niu, Xiamu et al. | 2013
- 336
-
Blind Detection of Electronic Voice Transformation with Natural DisguiseWang, Yong / Deng, Yanhong / Wu, Haojun / Huang, Jiwu et al. | 2013
- 344
-
Robust Median Filtering Detection Based on Filtered ResidualPeng, Anjie / Kang, Xiangui et al. | 2013
- 358
-
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence ModulationZhang, Xinpeng / Qin, Chuan / Sun, Guangling et al. | 2013
- 368
-
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data HidingXuan, Guorong / Tong, Xuefeng / Teng, Jianzhong / Zhang, Xiaojie / Shi, Yun Qing et al. | 2013
- 384
-
An Improved Algorithm for Reversible Data Hiding in Encrypted ImageYu, Jie / Zhu, Guopu / Li, Xiaolong / Yang, Jianquan et al. | 2013
- 395
-
Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion EmbeddingChen, Quan / Xiang, Shijun / Luo, Xinrong et al. | 2013
- 410
-
Automatic Anonymous Fingerprinting of Text Posted on Social Networking ServicesNguyen-Son, Hoang-Quoc / Tran, Minh-Triet / Tien, Dung Tran / Yoshiura, Hiroshi / Sonehara, Noboru / Echizen, Isao et al. | 2013
- 425
-
Memoryless Hash-Based Perceptual Image AuthenticationLiu, Fang / Fu, Qi-Kai / Cheng, Lee-Ming et al. | 2013
- 435
-
Visual Cryptography Based Watermarking: Definition and MeaningCimato, Stelvio / Yang, James Ching-Nung / Wu, Chih-Cheng et al. | 2013
- 449
-
Region-in-Region Incrementing Visual Cryptography SchemeYang, Ching-Nung / Lin, Yi-Chin / Wu, Chih-Cheng et al. | 2013
- 464
-
A Secret Enriched Visual CryptographyLiu, Feng / Yan, Wei Q. / Li, Peng / Wu, Chuankun et al. | 2013
- 485
-
On the Security of Multi-secret Visual Cryptography Scheme with Ring SharesFu, Zheng-Xin / Yu, Bin et al. | 2013
- 495
-
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse RepresentationZhang, Aixin / Guan, Chao / Jiang, Haomiao / Li, Jianhua et al. | 2013
- 507
-
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CAYe, Conghuan / Ling, Hefei / Zou, Fuhao / Lu, Zhengding / Xiong, Zenggang / Zhang, Kaibing et al. | 2013
- 520
-
A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel LearningCheng, Dongyang / Sun, Tanfeng / Jiang, Xinghao et al. | 2013
- E1
-
Erratum to: The International Workshop on Digital Forensics and Watermarking 2012Shi, Yun Q. / Kim, Hyoung-Joong / Pérez-González, Fernando et al. | 2013