Image tampering localization model for intensive post-processing scenarios
Addressing the challenges of blurred or destroyed tampering traces presented by lossy operations such as image compression and scaling on images within social platforms like WeChat and Weibo, an adversarial image tampering localization model was introduced. Utilizing the pyramid vision transformer,...
Saved in:
Main Authors: | TAN Shunquan, LIAO Guiying, PENG Rongxuan, HUANG Jiwu |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024079/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Pseudo-siamese network image tampering localization model based on reinforced samples
by: Jinwei WANG, et al.
Published: (2024-02-01) -
Passive forensics for video object removal tampering
by: Ye YAO, et al.
Published: (2017-02-01) -
Tampered text detection via RGB and frequency relationship modeling
by: Yuxin WANG, et al.
Published: (2022-06-01) -
Robust tampering detection and localization of composite image
by: Xiao WANG, et al.
Published: (2017-08-01) -
Video tamper detection method based on nonnegative tensor factorization
by: Xue-li ZHANG, et al.
Published: (2017-06-01)