[1] |
Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Niessner M. FaceForensics++: learning to detect manipulated facial images. arXiv preprint, 2019. arXiv: 1901.08971 |
[2] |
Farid H. Creating and Detecting Doctored and Virtual Images: Implications to the Child Pornography Prevention Act. Technical Report TR2004-518, Department of Computer Science, Dartmouth College, USA, 2004. |
[3] |
Farid H. A survey of image forgery detection. IEEE Signal Processing Magazine, 2009, 26(2): 16-25 |
[4] |
Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing, 2005, 53(2): 758-767 doi: 10.1109/TSP.2004.839932 |
[5] |
Luo W, Huang J, Qiu G. JPEG error analysis and its applications to digital image forensics. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 480-491 doi: 10.1109/TIFS.2010.2051426 |
[6] |
Gou H, Swaminathan A, Wu M. Noise features for image tampering detection and steganalysis. In: Proceedings of the 2007 IEEE International Conference on Image Processing. San Antonio, TX, USA: IEEE, 2007. 97-100 https://ieeexplore.ieee.org/document/4379530 |
[7] |
Zhou P, Han X, Morariu V I, Davis L S. Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Salt Lake City, USA: IEEE, 2018. 1053-1061 https://www.researchgate.net/publication/325143175_Learning_Rich_Features_for_Image_Manipulation_Detection |
[8] |
Gloe T, Franz E, Winkler A. Forensics for flatbed scanners. In: Proceedings of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX. California, USA: International Society for Optics and Photonics, 2007. 650511 |
[9] |
Kakar P, Sudha N, Ser W. Exposing digital image forgeries by detecting discrepancies in motion blur. IEEE Transactions on Multimedia, 2011, 13(3): 443-452 doi: 10.1109/TMM.2011.2121056 |
[10] |
Farid H, Bravo M J. Image forensic analyses that elude the human visual system. In: Proceedings of SPIE 7541, Media Forensics and Security Ⅱ. California, USA: International Society for Optics and Photonics, 2010. 754106 doi: 10.1117/12.837788 |
[11] |
Peng B, Wang W, Dong J, Tan T. Image forensics based on planar contact constraints of 3D objects. IEEE Transactions on Information Forensics and Security, 2018, 13(2): 377-392 doi: 10.1109/TIFS.2017.2752728 |
[12] |
Carvalho T J D, Riess C, Angelopoulou E, Pedrini H, Rocha A D R. Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security, 2014, 18(6): 1182-1194 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=Doaj000003806817 |
[13] |
Johnson M K, Farid H. Exposing digital forgeries through specular highlights on the eye. In: Proceedings of International Workshop on Information Hiding. Berlin, Heidelberg, Germany: Springer, 2007. 311-325 doi: 10.1007/978-3-540-77370-2_21 |
[14] |
Liu Q, Cao X, Chao D, Guo X. Identifying image composites through shadow matte consistency. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1111-1122 doi: 10.1109/TIFS.2011.2139209 |
[15] |
Kee E, O0Brien J F, Farid H. Exposing photo manipulation with inconsistent shadows. ACM Transactions on Graphics, 2013, 32(3): 28 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=33fd7688600a6dd746ed39aa3727a855 |
[16] |
Kee E, O0Brien J F, Farid H. Exposing photo manipulation from shading and shadows. ACM Transactions on Graphics, 2014, 33(5): 1-21 https://www.mendeley.com/catalogue/exposing-photo-manipulation-shading-shadows/ |
[17] |
Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on Multimedia and security. NewYork, NY, USA: ACM Press, 2005. 1-10 https://www.mendeley.com/catalogue/exposing-digital-forgeries-detecting-inconsistencies-lighting/ |
[18] |
Carvalho T, Farid H, Kee E R. Exposing photo manipulation from user-guided 3d lighting analysis. In: Proceedings of SPIE Symposium on Electronic Imaging. California, USA: International Society for Optics and Photonics, 2015. 940902 |
[19] |
Johnson M K, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 450-461 doi: 10.1109/TIFS.2007.903848 |
[20] |
Kee E, Farid H. Exposing digital forgeries from 3-D lighting environments. In: Proceedings of IEEE International Workshop on Information Forensics and Security. Seattle, USA: IEEE, 2010. 1-6 |
[21] |
Peng B, Wang W, Dong J, Tan T. Optimized 3D lighting environment estimation for image forgery detection. IEEE Transactions on Information Forensics and Security, 2017, 12(2): 479-494 doi: 10.1109/TIFS.2016.2623589 |
[22] |
孙鹏, 郎宇博, 樊舒, 沈喆, 彭思龙, 刘磊.图像拼接篡改的自动色温距离分类检验方法.自动化学报, 2018, 44(7): 171-182 http://www.aas.net.cn/CN/abstract/abstract19318.shtml
Sun Peng, Lang Yu-Bo, Fan Shu, Shen Zhe, Peng Si-Long, Liu Lei. Detection of image splicing manipulation by automated classification of color temperature distance. Acta Automatica Sinica, 2018, 44(7): 171-182 http://www.aas.net.cn/CN/abstract/abstract19318.shtml |
[23] |
朱叶, 申铉京, 陈海鹏.基于彩色LBP的隐蔽性复制–粘贴篡改盲鉴别算法.自动化学报, 2017, 43(3): 390-397 http://www.aas.net.cn/CN/abstract/abstract19017.shtml
Zhu Ye, Shen Xuan-Jing, Chen Hai-Peng. Covert copy-move forgery detection based on color LBP. Acta Automatica Sinica, 2017, 43(3): 390-397 http://www.aas.net.cn/CN/abstract/abstract19017.shtml |
[24] |
Blanz V, Vetter T. A morphable model for the synthesis of 3D faces. In: Proceedings of the 26th annual conference on Computer graphics and interactive techniques. NewYork, USA: ACM, 1999. 187-194 |
[25] |
Zhu X, Lei Z, Yan J, Yi D, Li S Z. High-fidelity pose and expression normalization for face recognition in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Boston, USA: IEEE, 2015. 787-796 |
[26] |
King D E. Dlib-ml: a machine learning toolkit. Journal of Machine Learning Research, 2009, 10(Jul): 1755-1758 https://core.ac.uk/display/21155954 |
[27] |
Phong B T. Illumination for computer generated pictures. Communications of the Acm, 1975, 18(6): 311-317 doi: 10.1145/360825.360839 |
[28] |
Ramamoorthi R, Hanrahan P. On the relationship between radiance and iIrradiance: determining the illumination from images of a convex lambertian object. Journal of the Optical Society of America A, 2001, 18(10): 2448-2459 doi: 10.1364/JOSAA.18.002448 |
[29] |
Basri R, Jacobs D. Lambertian reflectance and linear subspaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(2): 218-233 doi: 10.1109/TPAMI.2003.1177153 |
[30] |
Zhang Z. A flexible new technique for camera calibration. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(11): 1330-1334 doi: 10.1109/34.888718 |
[31] |
Zhou W, Kambhamettu C. Estimation of illuminant direction and intensity of multiple light sources. In: Proceedings of European conference on computer vision. Berlin, Heidelberg, Germany: Springer, 2002. 206-220 |