Sciweavers

5076 search results - page 4 / 1016
» Image manipulation detection
Sort
View
GBRPR
2005
Springer
14 years 4 months ago
Hypergraph-Based Image Representation
Abstract. An appropriate image representation induces some good image treatment algorithms. Hypergraph theory is a theory of finite combinatorial sets, modeling a lot of problems ...
Alain Bretto, Luc Gillibert
CHI
2007
ACM
14 years 11 months ago
Dynamic detection of novice vs. skilled use without a task model
If applications were able to detect a user's expertise, then software could automatically adapt to better match expertise. Detecting expertise is difficult because a user...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
ICIP
2010
IEEE
13 years 8 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
ICIP
2007
IEEE
15 years 17 days ago
Robust Hash for Detecting and Localizing Image Tampering
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to...
Sujoy Roy, Qibin Sun
ACIVS
2006
Springer
14 years 4 months ago
Blue Sky Detection for Picture Quality Enhancement
Content analysis of video and still images is attractive for multiple reasons, such as enabling content-based actions and image manipulation. This paper presents a new algorithm an...
Bahman Zafarifar, Peter H. N. de With