2017 IEEE International Conference on Image Processing (ICIP) 2017
DOI: 10.1109/icip.2017.8296536
|View full text |Cite
|
Sign up to set email alerts
|

Inpainting-Based camera anonymization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
27
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(28 citation statements)
references
References 17 publications
1
27
0
Order By: Relevance
“…The first dataset is the Dresden Image Database [17], which collects both uncompressed and compressed images from more than 50 diverse devices. Following the same procedure done in past works proposed in literature [13], [12], we select images from 6 different camera instances, precisely Nikon D70, Nikon D70s, Nikon D200, two devices each. Second dataset is the recently released Vision Dataset [18], which includes JPEG compressed images captured from 35 devices.…”
Section: A Datasetsmentioning
confidence: 99%
See 3 more Smart Citations
“…The first dataset is the Dresden Image Database [17], which collects both uncompressed and compressed images from more than 50 diverse devices. Following the same procedure done in past works proposed in literature [13], [12], we select images from 6 different camera instances, precisely Nikon D70, Nikon D70s, Nikon D200, two devices each. Second dataset is the recently released Vision Dataset [18], which includes JPEG compressed images captured from 35 devices.…”
Section: A Datasetsmentioning
confidence: 99%
“…Regarding PRNU-blind strategies, the most recent contribution is that proposed by [13], which demonstrates to outperform results of [12] in a PRNU-blind scenario. For the implementation of [13], we consider the parameter configurations achieving the best anonymization results, i.e., the strategies defined as (5) 1 in the original paper.…”
Section: B State-of-the-art Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…In the case of seam carving, it was subsequently shown that when multiple seam carved images are available from the same camera, successful verification could still be done by increasing alignment between the camera fingerprint and the seam-carved images [10], [11], provided no additional operation such as scaling and cropping has been performed. In-painting [12], Patch-based desynchronization [13], and image stitching [14] are other examples of complex techniques for breaking alignment.…”
Section: Introductionmentioning
confidence: 99%