吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (2): 446-453.doi: 10.13229/j.cnki.jdxbgxb201402027
• paper • Previous Articles Next Articles
SHEN Xuan-jing1,2, LI Xiang1,2, LYU Ying-da1,2, CHEN Hai-peng1,2
CLC Number:
[1] 吕颖达, 申铉京, 苗健, 等.基于光源方向不一致性的局部光源图像盲鉴别方法[J].吉林大学学报:工学版, 2010, 40(6):1673-1677. LV Ying-da, Shen Xuan-jing, Miao Jian, et al.Blind identification for light source images based on inconsistency in light source direction[J].Journal of Jilin University(Engineering and Technology Edition), 2010, 40(6):1673-1677.[2] 吴琼, 李国辉, 涂丹, 等. 面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报, 2008, 34(12): 1458-1466. Wu Qiong, Li Guo-hui, Tu Dan, et al. A survey of blind digital image forensics technology for authenticity detection[J]. Acta Automatica Sinica, 2008, 34(12): 1458-1466.[3] Qu Z, Qiu G, Huang J. Detect digital image splicing with visual cues[C]//Information Hiding.Berlin:Springer Berlin Heidelberg, 2009.[4] Ng T T, Chang S F, Sun Q. A data set of authentic and spliced image blocks[R]. Columbia University, ADVENT Technical Report, 2004: 203-204.[5] Lin Z, He J, Tang X, et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis[J]. Pattern Recognition, 2009, 42(11): 2492-2501.[6] Zheng Q, Sun W, Lu W. Digital spliced image forensics based on edge blur measurement[C]// 2010 IEEE International Conference on Information Theory and Information Security, Beijing, China, 2010.[7] Dong J, Wang W, Tan T, et al. Run-length and Edge Statistics Based Approach for Image Splicing detection[M]. Berlin:Springer Berlin Heidelberg, 2009.[8] He Z, Sun W, Lu W, et al. Digital image splicing detection based on approximate run length[J]. Pattern Recognition Letters, 2011, 32(12): 1591-1597.[9] Itti L, Koch C, Niebur E. A model of saliency-based visual attention for rapid scene analysis[J]. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 1998, 20(11): 1254-1259.[10] Shi Y Q, Chen C, Chen W. A natural image model approach to splicing detection[C]//Proceedings of the 9th Workshop on Multimedia & Security, ACM, 2007.[11] Zhao X, Li J, Li S, et al. Detecting Digital Image Splicing in Chroma Spaces[M]. Berlin:Springer Berlin Heidelberg, 2011.[12] Guyon I, Weston J, Barnhill S, et al. Gene selection for cancer classification using support vector machines[J]. Machine Learning, 2002, 46(1-3): 389-422.[13] Chang C C, Lin C J. LIBSVM: a library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology (TIST), 2011, 2(3): 27.[14] Hsu C W, Chang C C, Lin C J. A practical guide to support vector classification[R].Department of Computer Science and Information Engineering, National Taiwan University, Taipei, 2003. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|