Two-stream neural networks to detect manipulation of JPEG compressed images

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 617
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, H. -G.ko
dc.contributor.authorPark, J. -S.ko
dc.contributor.authorKim, D. -G.ko
dc.contributor.authorLee, Heung-Kyuko
dc.date.accessioned2018-04-24T05:07:46Z-
dc.date.available2018-04-24T05:07:46Z-
dc.date.created2018-04-09-
dc.date.created2018-04-09-
dc.date.created2018-04-09-
dc.date.issued2018-03-
dc.identifier.citationELECTRONICS LETTERS, v.54, no.6, pp.354 - 355-
dc.identifier.issn0013-5194-
dc.identifier.urihttp://hdl.handle.net/10203/241324-
dc.description.abstractWith the rapid spread of image editing software, anyone can easily create, distribute, and forge images. Although techniques to detect image forgery have been widely studied, current techniques have significant limitations, such as specific file formats, manipulations, or compression qualities. Although deep learning techniques have been introduced to detect various manipulations, such as blurring, median filtering, and Gaussian noise, these techniques are only suitable to detect forgeries of uncompressed images, and are difficult to apply in practice because most images are compressed for distribution. Therefore, a two-stream neural network approach for image forensics that is robust to compression is proposed. The two-stream neural network is based on constrained convolutional neural network and Markov characteristics to consider compression. Experimental results show that the proposed method overcomes current technique limitations.-
dc.languageEnglish-
dc.publisherINST ENGINEERING TECHNOLOGY-IET-
dc.titleTwo-stream neural networks to detect manipulation of JPEG compressed images-
dc.typeArticle-
dc.identifier.wosid000427955500013-
dc.identifier.scopusid2-s2.0-85044176790-
dc.type.rimsART-
dc.citation.volume54-
dc.citation.issue6-
dc.citation.beginningpage354-
dc.citation.endingpage355-
dc.citation.publicationnameELECTRONICS LETTERS-
dc.identifier.doi10.1049/el.2017.4444-
dc.contributor.localauthorLee, Heung-Kyu-
dc.contributor.nonIdAuthorKim, H. -G.-
dc.contributor.nonIdAuthorPark, J. -S.-
dc.contributor.nonIdAuthorKim, D. -G.-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0