Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network. Wu, Y., AbdAlmageed, W., & Natarajan, P. In 2018 IEEE Winter Conference on Applications of Computer Vision (WACV), pages 1907–1915, March, 2018. Paper doi bibtex 6 downloads @inproceedings{wu_image_2018,
title = {Image {Copy}-{Move} {Forgery} {Detection} via an {End}-to-{End} {Deep} {Neural} {Network}},
isbn = {978-1-5386-4886-5},
url = {doi.ieeecomputersociety.org/10.1109/WACV.2018.00211},
doi = {10.1109/WACV.2018.00211},
booktitle = {2018 {IEEE} {Winter} {Conference} on {Applications} of {Computer} {Vision} ({WACV})},
author = {Wu, Y. and AbdAlmageed, W. and Natarajan, P.},
month = mar,
year = {2018},
keywords = {affine transforms, convolution, Feature extraction, feedforward neural nets, image forensics},
pages = {1907--1915}
}
Downloads: 6
{"_id":"it3Jn3r6ki457mmXE","bibbaseid":"wu-abdalmageed-natarajan-imagecopymoveforgerydetectionviaanendtoenddeepneuralnetwork-2018","downloads":6,"creationDate":"2018-02-01T06:21:20.811Z","title":"Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network","author_short":["Wu, Y.","AbdAlmageed, W.","Natarajan, P."],"year":2018,"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/TSLgqgnuxtcMC9Fue","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network","isbn":"978-1-5386-4886-5","url":"doi.ieeecomputersociety.org/10.1109/WACV.2018.00211","doi":"10.1109/WACV.2018.00211","booktitle":"2018 IEEE Winter Conference on Applications of Computer Vision (WACV)","author":[{"propositions":[],"lastnames":["Wu"],"firstnames":["Y."],"suffixes":[]},{"propositions":[],"lastnames":["AbdAlmageed"],"firstnames":["W."],"suffixes":[]},{"propositions":[],"lastnames":["Natarajan"],"firstnames":["P."],"suffixes":[]}],"month":"March","year":"2018","keywords":"affine transforms, convolution, Feature extraction, feedforward neural nets, image forensics","pages":"1907–1915","bibtex":"@inproceedings{wu_image_2018,\n\ttitle = {Image {Copy}-{Move} {Forgery} {Detection} via an {End}-to-{End} {Deep} {Neural} {Network}},\n\tisbn = {978-1-5386-4886-5},\n\turl = {doi.ieeecomputersociety.org/10.1109/WACV.2018.00211},\n\tdoi = {10.1109/WACV.2018.00211},\n\tbooktitle = {2018 {IEEE} {Winter} {Conference} on {Applications} of {Computer} {Vision} ({WACV})},\n\tauthor = {Wu, Y. and AbdAlmageed, W. and Natarajan, P.},\n\tmonth = mar,\n\tyear = {2018},\n\tkeywords = {affine transforms, convolution, Feature extraction, feedforward neural nets, image forensics},\n\tpages = {1907--1915}\n}\n\n\n","author_short":["Wu, Y.","AbdAlmageed, W.","Natarajan, P."],"key":"wu_image_2018","id":"wu_image_2018","bibbaseid":"wu-abdalmageed-natarajan-imagecopymoveforgerydetectionviaanendtoenddeepneuralnetwork-2018","role":"author","urls":{"Paper":"https://bibbase.org/network/files/doi.ieeecomputersociety.org/10.1109/WACV.2018.00211"},"keyword":["affine transforms","convolution","Feature extraction","feedforward neural nets","image forensics"],"metadata":{"authorlinks":{}},"downloads":6},"search_terms":["image","copy","move","forgery","detection","via","end","end","deep","neural","network","wu","abdalmageed","natarajan"],"keywords":["affine transforms","convolution","feature extraction","feedforward neural nets","image forensics"],"authorIDs":["54597ad5b43425b7720005e6"],"dataSources":["dDcybAPCHBAZER5nc","pTPdBqfEnmNcJALAe","e6SApkbjjXkBJLSqa","ZHpXMeEzrbf8jtT2K","AfBybHaxyt33K5MBP","RaZEzzMyXzgjMhMJN","v5pC6iKH87X8YPwsQ"]}