Fronts propagating with curvature-dependent speed: algorithms based on Hamilton-Jacobi formulations
Journal of Computational Physics
Determining the Epipolar Geometry and its Uncertainty: A Review
International Journal of Computer Vision
Digital watermarking
Multiple View Geometry in Computer Vision
Multiple View Geometry in Computer Vision
Distinctive Image Features from Scale-Invariant Keypoints
International Journal of Computer Vision
An Experimental Comparison of Min-Cut/Max-Flow Algorithms for Energy Minimization in Vision
IEEE Transactions on Pattern Analysis and Machine Intelligence
Level Set Evolution without Re-Initialization: A New Variational Formulation
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Detecting Doctored Images Using Camera Response Normality and Consistency
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Exposing digital forgeries by detecting inconsistencies in lighting
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Online Selection of Discriminative Tracking Features
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generic Object Recognition with Boosting
IEEE Transactions on Pattern Analysis and Machine Intelligence
Evaluation of Features Detectors and Descriptors based on 3D Objects
International Journal of Computer Vision
Exposing digital forgeries in video by detecting duplication
Proceedings of the 9th workshop on Multimedia & security
Precise object cutout from images
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Exposing digital forgeries from JPEG ghosts
IEEE Transactions on Information Forensics and Security
Detecting photographic composites using shadows
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Detecting doctored JPEG images via DCT coefficient analysis
ECCV'06 Proceedings of the 9th European conference on Computer Vision - Volume Part III
Determining Image Origin and Integrity Using Sensor Noise
IEEE Transactions on Information Forensics and Security
Using JPEG quantization tables to identify imagery processed by software
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
With the advancement of photo and video editing tools, it has become fairly easy to tamper with photos and videos. One common way is to insert visually plausible composites into target images and videos. In this paper, we propose an automatic fake region detection method based on the planar homography constraint, and an automatic extraction method using graph cut with online feature/parameter selection. Two steps are taken in our method: 1) the targeting step, and 2) the segmentation step. First, the fake region is located roughly by enforcing the planar homography constraint. Second, the fake object is segmented via graph cut with the initialization given by the targeting step. To achieve an automatic segmentation, the optimal features and parameters for graph cut are dynamically selected via the proposed online feature/parameter selection. Performance of this method is evaluated on both semisimulated and real images. Our method works efficiently on images as long as there are regions satisfying the planar homography constraint, including image pairs captured by the approximately cocentered cameras, image pairs photographing planar or distant scenes, and a single image with duplications.