{"id":"https://openalex.org/W2336517228","doi":"https://doi.org/10.1109/tifs.2016.2553645","title":"SIFT Keypoint Removal and Injection via Convex Relaxation","display_name":"SIFT Keypoint Removal and Injection via Convex Relaxation","publication_year":2016,"publication_date":"2016-04-13","ids":{"openalex":"https://openalex.org/W2336517228","doi":"https://doi.org/10.1109/tifs.2016.2553645","mag":"2336517228"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2553645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2553645","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016956860","display_name":"Yuanman Li","orcid":"https://orcid.org/0000-0003-4526-3018"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":true,"raw_author_name":"Yuanman Li","raw_affiliation_strings":["Department of Computer and Information Science, University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I204512498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037979193","display_name":"Jiantao Zhou","orcid":"https://orcid.org/0000-0002-6015-2618"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Jiantao Zhou","raw_affiliation_strings":["Department of Computer and Information Science, University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I204512498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055661493","display_name":"An Cheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"An Cheng","raw_affiliation_strings":["Meitu, Inc., Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Meitu, Inc., Xiamen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100654390","display_name":"Xianming Liu","orcid":"https://orcid.org/0000-0002-8857-1785"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianming Liu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085140523","display_name":"Yuan Yan Tang","orcid":"https://orcid.org/0000-0002-6887-130X"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Yuan Yan Tang","raw_affiliation_strings":["Department of Computer and Information Science, University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I204512498"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5016956860"],"corresponding_institution_ids":["https://openalex.org/I204512498"],"apc_list":null,"apc_paid":null,"fwci":2.3381,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.92265091,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"11","issue":"8","first_page":"1722","last_page":"1735"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scale-invariant-feature-transform","display_name":"Scale-invariant feature transform","score":0.9758715629577637},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7495993375778198},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.649417519569397},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.49950528144836426},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4781116843223572},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4641714096069336},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.45138317346572876},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4417414367198944},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.0945909321308136}],"concepts":[{"id":"https://openalex.org/C61265191","wikidata":"https://www.wikidata.org/wiki/Q767770","display_name":"Scale-invariant feature transform","level":3,"score":0.9758715629577637},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7495993375778198},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.649417519569397},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.49950528144836426},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4781116843223572},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4641714096069336},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.45138317346572876},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4417414367198944},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0945909321308136},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2553645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2553645","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1978271410","display_name":null,"funder_award_id":"HIT.NSRIF.2015067","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2286792410","display_name":null,"funder_award_id":"61402547","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G632448438","display_name":null,"funder_award_id":"61300110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6697880830","display_name":null,"funder_award_id":"61273244","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324110","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W120119343","https://openalex.org/W1569734215","https://openalex.org/W1570958768","https://openalex.org/W1963943170","https://openalex.org/W1974183283","https://openalex.org/W1975890006","https://openalex.org/W1980454679","https://openalex.org/W1985101401","https://openalex.org/W1987535593","https://openalex.org/W1992641530","https://openalex.org/W2001412060","https://openalex.org/W2007961193","https://openalex.org/W2009824857","https://openalex.org/W2036459670","https://openalex.org/W2042243302","https://openalex.org/W2045831242","https://openalex.org/W2049109615","https://openalex.org/W2052950171","https://openalex.org/W2055197996","https://openalex.org/W2066941820","https://openalex.org/W2067769652","https://openalex.org/W2085996009","https://openalex.org/W2086407934","https://openalex.org/W2092669196","https://openalex.org/W2096578865","https://openalex.org/W2096582877","https://openalex.org/W2096933452","https://openalex.org/W2106485656","https://openalex.org/W2123537152","https://openalex.org/W2124343442","https://openalex.org/W2124386111","https://openalex.org/W2128813047","https://openalex.org/W2133665775","https://openalex.org/W2134514757","https://openalex.org/W2136858165","https://openalex.org/W2137405310","https://openalex.org/W2146907897","https://openalex.org/W2147332957","https://openalex.org/W2149745530","https://openalex.org/W2151103935","https://openalex.org/W2153361333","https://openalex.org/W2161112350","https://openalex.org/W2162963619","https://openalex.org/W2219549612","https://openalex.org/W3160851792","https://openalex.org/W4250589301","https://openalex.org/W6604906609","https://openalex.org/W6795644987","https://openalex.org/W6997266731"],"related_works":["https://openalex.org/W2049930962","https://openalex.org/W2601157893","https://openalex.org/W2373006798","https://openalex.org/W2056912418","https://openalex.org/W2112208972","https://openalex.org/W2123759770","https://openalex.org/W2033213769","https://openalex.org/W2151520854","https://openalex.org/W2811390910","https://openalex.org/W4312376745"],"abstract_inverted_index":{"Scale":[0],"invariant":[1],"feature":[2,12],"transform":[3],"(SIFT),":[4],"as":[5,71,195],"one":[6],"of":[7,86,106,119,162,190],"the":[8,51,62,77,84,99,104,124,143,151,164,188,191],"most":[9,165],"popular":[10],"local":[11,87,96],"extraction":[13],"algorithms,":[14],"has":[15,29,41],"been":[16,30,43],"widely":[17],"employed":[18],"in":[19,98],"many":[20],"computer":[21],"vision":[22],"and":[23,89,138,156],"multimedia":[24],"security":[25,37],"applications.":[26],"Although":[27],"SIFT":[28,52,66,108,121,136,153,171],"extensively":[31],"investigated":[32],"from":[33],"various":[34],"perspectives,":[35],"its":[36],"against":[38],"malicious":[39],"attacks":[40],"rarely":[42],"discussed.":[44],"In":[45],"this":[46],"paper,":[47],"we":[48,111],"show":[49],"that":[50,150,177],"keypoints":[53,93,122],"can":[54],"be":[55],"effectively":[56],"removed":[57],"with":[58,128],"minimized":[59,129],"distortion":[60],"on":[61],"processed":[63],"image.":[64],"The":[65],"keypoint":[67,109,154,172],"removal":[68,137,155],"is":[69,148,160,181],"formulated":[70],"a":[72,95,116],"constrained":[73],"optimization":[74],"problem,":[75],"where":[76],"constraints":[78],"are":[79],"carefully":[80],"designed":[81,169],"to":[82,114,186,196],"suppress":[83],"existence":[85],"extrema":[88],"prevent":[90],"generating":[91],"new":[92],"within":[94],"cuboid":[97],"scale":[100],"space.":[101],"To":[102],"hide":[103],"traces":[105],"performing":[107],"removal,":[110],"then":[112],"propose":[113],"inject":[115],"large":[117],"number":[118],"fake":[120],"into":[123],"previously":[125],"cleaned":[126],"image":[127],"distortion.":[130],"As":[131],"demonstrated":[132],"experimentally,":[133],"our":[134],"proposed":[135],"injection":[139,157],"algorithms":[140],"significantly":[141],"outperform":[142],"state-of-the-art":[144],"techniques.":[145],"Furthermore,":[146],"it":[147],"shown":[149],"combined":[152],"attack":[158],"strategy":[159],"capable":[161],"defeating":[163],"powerful":[166],"forensic":[167],"detector":[168],"for":[170,183],"removal.":[173],"Our":[174],"results":[175],"suggest":[176],"an":[178],"authorization":[179],"mechanism":[180],"required":[182],"SIFT-based":[184],"systems":[185],"verify":[187],"validity":[189],"input":[192],"data,":[193],"so":[194],"achieve":[197],"high":[198],"reliability.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
