J image
Author: k | 2025-04-23
11,524 Free images of Letter J. Browse letter j images and find your perfect picture. Free HD download. letter. alphabet. j. font. text. abc. typography. letters. vintage. Royalty-free images. Ai Generated Letter J J. Edit image. Created By Ai Letter J. Edit image. Letter Rust Writing. Edit image. Wooden J J Letter. Edit image. J Alphabet Waffle. 11,524 Free images of Letter J. Browse letter j images and find your perfect picture. Free HD download. letter. alphabet. j. font. text. abc. typography. letters. vintage. Royalty-free images. Ai Generated Letter J J. Edit image. Created By Ai Letter J. Edit image. Letter Rust Writing. Edit image. Wooden J J Letter.
J j Logo Photos and Images - Shutterstock
Bevy Smith, Warren G, and more. Check out more highlights below. Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Lexus UPTOWN Honors Hollywood Honorees Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors (L-R) J. Alphonse Nicholson, Method Man, Blair Underwood and Omar J. Dorsey J. Alphonse Nicholson, Omar Dorsey, Blair Underwood, Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Warren G, Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Blair Underwood Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors J. Alphonse Nicholson Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Omar J. Dorsey Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Blair Underwood Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Jimmy Akingbola Image Credit: andy Shropshire/Getty Images for Lexus Uptown Honors Blair Underwood, J. Alphonse Nicholson Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Tai Beauchamp, Chris Spencer Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Gralen Bryant Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Salli Richardson-Whitfield, Dondré Whitfield Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors J. Alphonse Nicholson Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Mario Van Peebles, Mandela Van Peebles Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Leonard Burnett Jr., CEO/Co-Founder of UPTOWN Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Leslie “Big Lez” Segar Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Salli Richardson-Whitfield Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors J. Alphonse Nicholson, Method Man, Blair Underwood, Omar Dorsey Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Joe Torry, Guy Torry Image Credit: Randy Technol., IEEE, pp. 706–710Qureshi AM, Deriche M (2014) A review on copy-move image forgery detection techniques, multi-conference on systems. Signals & Devices (SSD):11–14Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE Int. Work. Inf. Forensics Secur., IEEE, pp. 1–6Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51:133–162Article Google Scholar Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8:1355–1370Article Google Scholar Salloum R, Ren Y, Kuo C-CJ (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J Vis Commun Image Represent 51:201–209Article Google Scholar Shivakumar BL, Baboo SS (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues 8:199 Google Scholar Tralic D, Zupancic I, Grgic S, M. Grgic (2013) CoMoFoD — new database for copy-move forgery detection. Proceedings ELMAR-2013, pp. 49–54Wang X, Wang H, Niu S, Zhang J (2019) Detection and localization of image forgeries using improved mask regional convolutional neural network. Math Biosci Eng MBE 16:4581–4593Article Google Scholar Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: Detecting copy-move image forgery with source/target localization. In: Proc. Eur. Conf. Comput. Vis., pp. 168–184Yang J, Ran P, Xiao D, Tan J (2013) Digital image forgery forensics by using undecimated dyadic wavelet transform and Zernike moments. J Comput Inf Syst 9:6399–6408 Google Scholar Zhang J, Ruan Q, Jin Y (2014) Combined SIFT and bi-coherence features to detect image forgery. In: 2014 12th Int. Conf. Signal Process., IEEE, pp. 1859–1863Zhang W, Yang Z, Niu S, Wang J (2016) Detection of copy-move forgery in flat region based on feature enhancement. In: Int. Work. Digit. Watermarking, Springer, pp. 159–171Zhang Y, Goh J, Win LL, Thing VLL (2016) Image Region Forgery Detection: A Deep Learning Approach., SG-CRC. 2016, 1–11Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158–166Article Google Scholar Zheng Y, Cao Y, Chang C-H (2019) AJ Stock Photos, Royalty Free J Images
Field image quality assessment via the light field coherence. IEEE Trans. Image Process. 29, 7945–7956 (2020)Article Google Scholar X. Min, J. Zhou, G. Zhai, P. Le Callet, X. Yang, X. Guan, A metric for light field reconstruction, compression, and display quality evaluation. IEEE Trans. Image Process. 29, 3790–3804 (2020)Article Google Scholar C. Meng, P. An, X. Huang, C. Yang, D. Liu, Full reference light field image quality evaluation based on angular-spatial characteristic. IEEE Signal Process. Lett. 27, 525–529 (2020)Article Google Scholar W. Zhou, L. Shi, Z. Chen, J. Zhang, Tensor oriented no-reference light field image quality assessment. IEEE Trans. Image Process. 29, 4070–4084 (2020)Article Google Scholar Y. Liu, G. Jiang, Z. Jiang, Z. Pan, M. Yu, Y.-S. Ho, Pseudoreference subaperture images and microlens image-based blind light field image quality measurement. IEEE Trans. Inst. Meas. 70, 1–15 (2021)Article Google Scholar J. Xiang, G. Jiang, M. Yu, Z. Jiang, Y.-S. Ho, No-reference light field image quality assessment using four-dimensional sparse transform. IEEE Transactions on Multimedia (2021)Q. Qu, X. Chen, V. Chung, Z. Chen, Light field image quality assessment with auxiliary learning based on depthwise and anglewise separable convolutions. IEEE Trans. Broadcast. 67(4), 837–850 (2021)Article Google Scholar P. Zhao, X. Chen, V. Chung, H. Li, Delfiqe-a low-complexity deep learning-based light field image quality evaluator. IEEE Trans. Instrum. Meas. 70, 1–11 (2021) Google Scholar Z. Pan, M. Yu, G. Jiang, H. Xu, Y.-S. Ho, Combining tensor slice and singular value for blind light field image quality assessment. IEEE J. Selected Topics Signal Process. 15(3), 672–687 (2021)Article Google Scholar C. Meng, P. An, X. Huang, C. Yang, L. Shen, B. Wang, Objective quality assessment of lenslet light field image based on focus stack. IEEE Trans. Multimed. 24, 3193–3207 (2021)Article Google Scholar H. Huang, H. Zeng, J. Hou, J. Chen, J. Zhu, K.-K. Ma, A spatial. 11,524 Free images of Letter J. Browse letter j images and find your perfect picture. Free HD download. letter. alphabet. j. font. text. abc. typography. letters. vintage. Royalty-free images. Ai Generated Letter J J. Edit image. Created By Ai Letter J. Edit image. Letter Rust Writing. Edit image. Wooden J J Letter. Edit image. J Alphabet Waffle.J Related image - suffolkbus.com
Anand V, Keskar AG (2014) A copy-move image forgery detection based on speeded up robust feature transform and wavelet transforms. In: 2014 Int. Conf. Comput. Commun. Technol., IEEE, pp. 147–152Hassaballah M, Abdelmgeid AA, Alshazly HA (2016) Image features detection, description and matching, In: Image Featur. Detect. Descriptors, Springer, pp. 11–45Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206:178–184Article Google Scholar Jwaid MF, Baraskar TN (2017) Study and analysis of copy-move & splicing image forgery detection techniques, In: 2017 Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud)(I-SMAC), IEEE, pp. 697–702Kumar S, Desai J, Mukherjee S (2013) A fast DCT based method for copy move forgery detection, In: 2013 IEEE second Int. Conf. Image Inf. Process., IEEE, pp. 649–654Liu B, Pun C-M (2013) A SIFT and local features based integrated method for copy-move attack detection in digital image, In: 2013 IEEE Int. Conf. Inf. Autom., IEEE, pp. 865–869Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34:1557–1565Article Google Scholar Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60:91–110Article Google Scholar Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image, In: 18th Int. Conf. Pattern Recognit., IEEE, pp. 746–749Maind RA, Khade A, Chitre DK (2014) Image copy move forgery detection using block representing method. Int J Soft Comput Eng 4:49–53 Google Scholar Muhammad G, Hussain M (2013) Passive detection of copy-move image forgery using undecimated wavelets and zernike moments. Inf J 16:2957–2964 Google Scholar Mushtaq S, Mir AH (2014) Digital Image Forgeries and Passive Image Authentication Techniques: A Survey. International Journal of Advanced Science and Technology 73:15–32. Google Scholar Pandey RC, Singh SK, Shukla KK, Agrawal R (2014) Fast and robust passive copy-move forgery detection using SURF and SIFT image features. In: 2014 9th Int. Conf. Ind. Inf. Syst., pp. 1–6. S, Ramkumar B (2016) Passive copy-move forgery detection using SIFT, HOG and SURF features. In: 2016 IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Coding system (JPEG Pleno) – part 2: Light field coding – amendment 1: profiles and levels for JPEG Pleno light field coding system. ISO/IEC 21794-2:2021/AMD 1:2021 (2021). technology – plenoptic image coding system (JPEG Pleno) – part 3: conformance testing. ISO/IEC 21794-2:2021 (2021). technology – plenoptic image coding system (JPEG Pleno) – part 4: reference software. ISO/IEC 21794-4:2022 (2022). Foessel, J. Ascenso, L.A. Silva Cruz, T. Ebrahimi, P.-A. Lemieux, C. Pagliari, A.M.G. Pinheiro, J. Sneyers, F. Temmermanns, Jpeg status and progress report 2022. SMPTE Motion Imaging J. 131(8), 111–119 (2022). Google Scholar B. Wang, W. Xiang, E. Wang, Q. Peng, P. Gao, X. Wu, Learning-based high-efficiency compression framework for light field videos. Multimedia Tools Appl. 81(6), 7527–7560 (2022). Google Scholar G. Tech, Y. Chen, K. Müller, J.-R. Ohm, A. Vetro, Y.-K. Wang, Overview of the multiview and 3d extensions of high efficiency video coding. IEEE Trans. Circuits Syst. Video Technol. 26(1), 35–49 (2016). Google Scholar N. Bakir, W. Hamidouche, O. Déforges, K. Samrouth, M. Khalil, Light field image compression based on convolutional neural networks and linear approximation. In 2018 25th IEEE International Conference on Image Processing (ICIP), pp. 1128–1132 (2018). Zhao, S. Wang, C. Jia, X. Zhang, S. Ma, J. Yang, Light field image compression based on deep learning. In 2018 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6 (2018). Zhao, P. An, X. Huang, L. Shan, R. Ma, Light Field Image Sparse Coding via CNN-Based EPI Super-Resolution. In 2018 IEEE Visual Communications and Image Processing (VCIP), pp. 1–4 (2018). Zhao, P. An, X. Huang, C. Yang, L. Shen, Light field image compression via CNN-based EPI super-resolution and decoder-side quality enhancement. IEEE Access 7, 135982–135998 (2019). Google Scholar J. Hou, J. Chen, L.-P. Chau, Light field image compression based on bi-level view compensation with rate-distortion optimization. IEEE Trans.The incredible images of SmackDown, J:
Log-polar transform. EURASIP J Wirel Commun Netw 2022:1–11Article Google Scholar Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14:955–968Article ADS Google Scholar Lin SD, Chen C-F (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consum Electron 46:415–421Article Google Scholar Liu L, Jiang D, Wang X, Rong X, Zhang R (2021) 2D Logistic-Adjusted-Chebyshev map for visual color image encryption. J Inf Secur Appl 60:102854 Google Scholar Liu W, Li J, Shao C, Ma J, Huang M, Bhatti UA (2022) Robust Zero Watermarking Algorithm for Medical Images Using Local Binary Pattern and Discrete Cosine Transform. In: International Conference on Artificial Intelligence and Security. Springer, pp 350–362Liu Y, Yang F, Gao K, Dong W, Song J (2017) A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing. Cluster Comput 20:3667–3675Article Google Scholar Ma B, Chang L, Wang C, Li J, Li G, Xia Z, Wang X (2021) Double Medical Images Zero-Watermarking Algorithm Based on the Chaotic System and Ternary Accurate Polar Complex Exponential Transform. J Math Imaging Vis 63:1160–1178Article MathSciNet Google Scholar Nandini DU, Divya S (2017) A literature survey on various watermarking techniques. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, pp 1–4Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327Article Google Scholar Roček A, Javorník M, Slavíček K, Dostál O (2021) Zero watermarking: critical analysis of its role in current medical imaging. J Digit Imaging 34:204–211Article PubMed PubMed Central Google Scholar Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28:69–83Article Google Scholar Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Comput Math Methods Med 2013. Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12–21Article Google Scholar Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images. Signal Process 120:522–531Article Google Scholar Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. 3rd Int Conf Learn Represent ICLR 2015 - Conf Track ProcSingh A, Dutta MK (2018) Lossless and robust digital watermarking scheme for retinal images. In: 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, pp 1–5Sun L, Xu JC, Zhang XX, Dong W, Tian Y (2015) A novel generalized Arnold transform-based zero-watermarkingFrom the Blog - J Image
BharathK., P., Muthu, R.: Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimed. Tools Appl. 79(43–44), 31739–31757 (2020). Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013). MathSciNet Google Scholar Wu, Y., Noonan, J.P., Agaian, S., et al.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Selected Areas Telecommun. (JSAT) 1(2), 31–38 (2011) Google Scholar Ranjithkumar, R., Saranraj, B., Pradeep, S.: A new one round image encryption algorithm based on multiple chaotic systems. ICTACT J. Image Video Process. 5(4), 1017–1023 (2015). O., Erkan, U., Toktas, A., Gao, S.: Pso-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 237, 121452 (2023). P., Wang, X., Su, Y., Liu, H., Unar, S.: Globally coupled private image encryption algorithm based on infinite interval spatiotemporal chaotic system. IEEE Trans. Circuits Syst. I Regul. Pap. 70(6), 2511–2522 (2023). references. 11,524 Free images of Letter J. Browse letter j images and find your perfect picture. Free HD download. letter. alphabet. j. font. text. abc. typography. letters. vintage. Royalty-free images. Ai Generated Letter J J. Edit image. Created By Ai Letter J. Edit image. Letter Rust Writing. Edit image. Wooden J J Letter. Edit image. J Alphabet Waffle.J Photos and Images - Shutterstock
Stock Image Kapoor, Jack; Dlabay, Les; Hughes, Robert J. ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Condition: Good. Get fast and secure shipping knowing your purchase helps empower our community to transform their lives through work. Seller Inventory # 4RZUQ9000R05 Contact seller Seller Image Personal Finance Jack R. Kapoor, J. Hughes Robert and Les R. Dlabay: ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Hardcover. Condition: Sehr gut. 9. Auflage. kleine Lagerspuren am Buch, Inhalt einwandfrei und ungelesen 148003 Sprache: Englisch Gewicht in Gramm: 1940. Seller Inventory # 385714 Contact seller Stock Image Personal Finance Kapoor, Jack R.; Hughes Robert, J.; Dlabay, Les R. ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Hardcover. Condition: Good. No Jacket. Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 4.2. Seller Inventory # G0073382329I3N10 Contact seller Stock Image Personal Finance Kapoor, Jack R.; Hughes Robert, J.; Dlabay, Les R. ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Hardcover. Condition: Good. No Jacket. Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 4.2. Seller Inventory # G0073382329I3N10 Contact seller Stock Image Personal Finance Kapoor, Jack R.; Hughes Robert, J.; Dlabay, Les R. ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Hardcover. Condition: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 4.2. Seller Inventory # G0073382329I4N10 Contact seller Stock Image Personal Finance Kapoor, Jack R.; Hughes Robert, J.; Dlabay, Les R. ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Hardcover. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 4.2. Seller Inventory # G0073382329I3N00 Contact seller Stock Image Personal Finance Kapoor, Jack R.; Hughes Robert, J.; Dlabay, Les R. ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Hardcover. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 4.2. Seller Inventory # G0073382329I3N00 Contact seller Stock Image Personal Finance Kapoor, Jack R.; Hughes Robert, J.; Dlabay, Les R. ISBN 10: 0073382329 ISBN 13: 9780073382326 Used Hardcover Hardcover. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 4.2. Seller Inventory # G0073382329I3N00 Contact seller Stock Image Personal FinanceComments
Bevy Smith, Warren G, and more. Check out more highlights below. Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Lexus UPTOWN Honors Hollywood Honorees Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors (L-R) J. Alphonse Nicholson, Method Man, Blair Underwood and Omar J. Dorsey J. Alphonse Nicholson, Omar Dorsey, Blair Underwood, Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Warren G, Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Blair Underwood Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors J. Alphonse Nicholson Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Omar J. Dorsey Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Blair Underwood Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Jimmy Akingbola Image Credit: andy Shropshire/Getty Images for Lexus Uptown Honors Blair Underwood, J. Alphonse Nicholson Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Tai Beauchamp, Chris Spencer Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Gralen Bryant Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Salli Richardson-Whitfield, Dondré Whitfield Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors J. Alphonse Nicholson Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Mario Van Peebles, Mandela Van Peebles Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Leonard Burnett Jr., CEO/Co-Founder of UPTOWN Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Leslie “Big Lez” Segar Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Salli Richardson-Whitfield Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors J. Alphonse Nicholson, Method Man, Blair Underwood, Omar Dorsey Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Method Man Image Credit: Randy Shropshire/Getty Images for Lexus Uptown Honors Joe Torry, Guy Torry Image Credit: Randy
2025-04-01Technol., IEEE, pp. 706–710Qureshi AM, Deriche M (2014) A review on copy-move image forgery detection techniques, multi-conference on systems. Signals & Devices (SSD):11–14Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE Int. Work. Inf. Forensics Secur., IEEE, pp. 1–6Redi JA, Taktak W, Dugelay JL (2011) Digital image forensics: a booklet for beginners. Multimed Tools Appl 51:133–162Article Google Scholar Ryu S-J, Kirchner M, Lee M-J, Lee H-K (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inf Forensics Secur 8:1355–1370Article Google Scholar Salloum R, Ren Y, Kuo C-CJ (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J Vis Commun Image Represent 51:201–209Article Google Scholar Shivakumar BL, Baboo SS (2011) Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues 8:199 Google Scholar Tralic D, Zupancic I, Grgic S, M. Grgic (2013) CoMoFoD — new database for copy-move forgery detection. Proceedings ELMAR-2013, pp. 49–54Wang X, Wang H, Niu S, Zhang J (2019) Detection and localization of image forgeries using improved mask regional convolutional neural network. Math Biosci Eng MBE 16:4581–4593Article Google Scholar Wu Y, Abd-Almageed W, Natarajan P (2018) Busternet: Detecting copy-move image forgery with source/target localization. In: Proc. Eur. Conf. Comput. Vis., pp. 168–184Yang J, Ran P, Xiao D, Tan J (2013) Digital image forgery forensics by using undecimated dyadic wavelet transform and Zernike moments. J Comput Inf Syst 9:6399–6408 Google Scholar Zhang J, Ruan Q, Jin Y (2014) Combined SIFT and bi-coherence features to detect image forgery. In: 2014 12th Int. Conf. Signal Process., IEEE, pp. 1859–1863Zhang W, Yang Z, Niu S, Wang J (2016) Detection of copy-move forgery in flat region based on feature enhancement. In: Int. Work. Digit. Watermarking, Springer, pp. 159–171Zhang Y, Goh J, Win LL, Thing VLL (2016) Image Region Forgery Detection: A Deep Learning Approach., SG-CRC. 2016, 1–11Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233:158–166Article Google Scholar Zheng Y, Cao Y, Chang C-H (2019) A
2025-04-01Field image quality assessment via the light field coherence. IEEE Trans. Image Process. 29, 7945–7956 (2020)Article Google Scholar X. Min, J. Zhou, G. Zhai, P. Le Callet, X. Yang, X. Guan, A metric for light field reconstruction, compression, and display quality evaluation. IEEE Trans. Image Process. 29, 3790–3804 (2020)Article Google Scholar C. Meng, P. An, X. Huang, C. Yang, D. Liu, Full reference light field image quality evaluation based on angular-spatial characteristic. IEEE Signal Process. Lett. 27, 525–529 (2020)Article Google Scholar W. Zhou, L. Shi, Z. Chen, J. Zhang, Tensor oriented no-reference light field image quality assessment. IEEE Trans. Image Process. 29, 4070–4084 (2020)Article Google Scholar Y. Liu, G. Jiang, Z. Jiang, Z. Pan, M. Yu, Y.-S. Ho, Pseudoreference subaperture images and microlens image-based blind light field image quality measurement. IEEE Trans. Inst. Meas. 70, 1–15 (2021)Article Google Scholar J. Xiang, G. Jiang, M. Yu, Z. Jiang, Y.-S. Ho, No-reference light field image quality assessment using four-dimensional sparse transform. IEEE Transactions on Multimedia (2021)Q. Qu, X. Chen, V. Chung, Z. Chen, Light field image quality assessment with auxiliary learning based on depthwise and anglewise separable convolutions. IEEE Trans. Broadcast. 67(4), 837–850 (2021)Article Google Scholar P. Zhao, X. Chen, V. Chung, H. Li, Delfiqe-a low-complexity deep learning-based light field image quality evaluator. IEEE Trans. Instrum. Meas. 70, 1–11 (2021) Google Scholar Z. Pan, M. Yu, G. Jiang, H. Xu, Y.-S. Ho, Combining tensor slice and singular value for blind light field image quality assessment. IEEE J. Selected Topics Signal Process. 15(3), 672–687 (2021)Article Google Scholar C. Meng, P. An, X. Huang, C. Yang, L. Shen, B. Wang, Objective quality assessment of lenslet light field image based on focus stack. IEEE Trans. Multimed. 24, 3193–3207 (2021)Article Google Scholar H. Huang, H. Zeng, J. Hou, J. Chen, J. Zhu, K.-K. Ma, A spatial
2025-04-21Anand V, Keskar AG (2014) A copy-move image forgery detection based on speeded up robust feature transform and wavelet transforms. In: 2014 Int. Conf. Comput. Commun. Technol., IEEE, pp. 147–152Hassaballah M, Abdelmgeid AA, Alshazly HA (2016) Image features detection, description and matching, In: Image Featur. Detect. Descriptors, Springer, pp. 11–45Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206:178–184Article Google Scholar Jwaid MF, Baraskar TN (2017) Study and analysis of copy-move & splicing image forgery detection techniques, In: 2017 Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud)(I-SMAC), IEEE, pp. 697–702Kumar S, Desai J, Mukherjee S (2013) A fast DCT based method for copy move forgery detection, In: 2013 IEEE second Int. Conf. Image Inf. Process., IEEE, pp. 649–654Liu B, Pun C-M (2013) A SIFT and local features based integrated method for copy-move attack detection in digital image, In: 2013 IEEE Int. Conf. Inf. Autom., IEEE, pp. 865–869Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34:1557–1565Article Google Scholar Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60:91–110Article Google Scholar Luo W, Huang J, Qiu G (2006) Robust detection of region-duplication forgery in digital image, In: 18th Int. Conf. Pattern Recognit., IEEE, pp. 746–749Maind RA, Khade A, Chitre DK (2014) Image copy move forgery detection using block representing method. Int J Soft Comput Eng 4:49–53 Google Scholar Muhammad G, Hussain M (2013) Passive detection of copy-move image forgery using undecimated wavelets and zernike moments. Inf J 16:2957–2964 Google Scholar Mushtaq S, Mir AH (2014) Digital Image Forgeries and Passive Image Authentication Techniques: A Survey. International Journal of Advanced Science and Technology 73:15–32. Google Scholar Pandey RC, Singh SK, Shukla KK, Agrawal R (2014) Fast and robust passive copy-move forgery detection using SURF and SIFT image features. In: 2014 9th Int. Conf. Ind. Inf. Syst., pp. 1–6. S, Ramkumar B (2016) Passive copy-move forgery detection using SIFT, HOG and SURF features. In: 2016 IEEE Int. Conf. Recent Trends Electron. Inf. Commun.
2025-04-09Coding system (JPEG Pleno) – part 2: Light field coding – amendment 1: profiles and levels for JPEG Pleno light field coding system. ISO/IEC 21794-2:2021/AMD 1:2021 (2021). technology – plenoptic image coding system (JPEG Pleno) – part 3: conformance testing. ISO/IEC 21794-2:2021 (2021). technology – plenoptic image coding system (JPEG Pleno) – part 4: reference software. ISO/IEC 21794-4:2022 (2022). Foessel, J. Ascenso, L.A. Silva Cruz, T. Ebrahimi, P.-A. Lemieux, C. Pagliari, A.M.G. Pinheiro, J. Sneyers, F. Temmermanns, Jpeg status and progress report 2022. SMPTE Motion Imaging J. 131(8), 111–119 (2022). Google Scholar B. Wang, W. Xiang, E. Wang, Q. Peng, P. Gao, X. Wu, Learning-based high-efficiency compression framework for light field videos. Multimedia Tools Appl. 81(6), 7527–7560 (2022). Google Scholar G. Tech, Y. Chen, K. Müller, J.-R. Ohm, A. Vetro, Y.-K. Wang, Overview of the multiview and 3d extensions of high efficiency video coding. IEEE Trans. Circuits Syst. Video Technol. 26(1), 35–49 (2016). Google Scholar N. Bakir, W. Hamidouche, O. Déforges, K. Samrouth, M. Khalil, Light field image compression based on convolutional neural networks and linear approximation. In 2018 25th IEEE International Conference on Image Processing (ICIP), pp. 1128–1132 (2018). Zhao, S. Wang, C. Jia, X. Zhang, S. Ma, J. Yang, Light field image compression based on deep learning. In 2018 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6 (2018). Zhao, P. An, X. Huang, L. Shan, R. Ma, Light Field Image Sparse Coding via CNN-Based EPI Super-Resolution. In 2018 IEEE Visual Communications and Image Processing (VCIP), pp. 1–4 (2018). Zhao, P. An, X. Huang, C. Yang, L. Shen, Light field image compression via CNN-based EPI super-resolution and decoder-side quality enhancement. IEEE Access 7, 135982–135998 (2019). Google Scholar J. Hou, J. Chen, L.-P. Chau, Light field image compression based on bi-level view compensation with rate-distortion optimization. IEEE Trans.
2025-04-06Log-polar transform. EURASIP J Wirel Commun Netw 2022:1–11Article Google Scholar Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14:955–968Article ADS Google Scholar Lin SD, Chen C-F (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consum Electron 46:415–421Article Google Scholar Liu L, Jiang D, Wang X, Rong X, Zhang R (2021) 2D Logistic-Adjusted-Chebyshev map for visual color image encryption. J Inf Secur Appl 60:102854 Google Scholar Liu W, Li J, Shao C, Ma J, Huang M, Bhatti UA (2022) Robust Zero Watermarking Algorithm for Medical Images Using Local Binary Pattern and Discrete Cosine Transform. In: International Conference on Artificial Intelligence and Security. Springer, pp 350–362Liu Y, Yang F, Gao K, Dong W, Song J (2017) A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing. Cluster Comput 20:3667–3675Article Google Scholar Ma B, Chang L, Wang C, Li J, Li G, Xia Z, Wang X (2021) Double Medical Images Zero-Watermarking Algorithm Based on the Chaotic System and Ternary Accurate Polar Complex Exponential Transform. J Math Imaging Vis 63:1160–1178Article MathSciNet Google Scholar Nandini DU, Divya S (2017) A literature survey on various watermarking techniques. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, pp 1–4Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327Article Google Scholar Roček A, Javorník M, Slavíček K, Dostál O (2021) Zero watermarking: critical analysis of its role in current medical imaging. J Digit Imaging 34:204–211Article PubMed PubMed Central Google Scholar Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28:69–83Article Google Scholar Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Comput Math Methods Med 2013. Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12–21Article Google Scholar Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images. Signal Process 120:522–531Article Google Scholar Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. 3rd Int Conf Learn Represent ICLR 2015 - Conf Track ProcSingh A, Dutta MK (2018) Lossless and robust digital watermarking scheme for retinal images. In: 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, pp 1–5Sun L, Xu JC, Zhang XX, Dong W, Tian Y (2015) A novel generalized Arnold transform-based zero-watermarking
2025-03-31