[1] |
Farid H. Chapter 1 photo fakery and forensics[J]. Advances in Computers, 2009, 77:1-55.
|
[2] |
Fridrich J J. Detection of copy-move forgery in digital images[C]//Digital Forensic Research Workshop, 2004.
|
[3] |
Huang Y, Lu W, Sun W, Long D. Improved DCT-based detection of copy-move forgery in images[J]. Forensic Science International, 2011, 206(1-3):178-184.
|
[4] |
Khan S, Kulkarni A. Reduced time complexity for detection of copy-move forgery using discrete wavelet transform[J]. International Journal of Computer Applications, 2011, 6(7):31-36.
|
[5] |
Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[J]. Computer Science, 2004:1-11.
|
[6] |
Ryu S J, Kirchner M, Lee M J, Lee H K. Rotation invariant localization of duplicated image regions based on zernike moments[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(8):1355-1370.
|
[7] |
Ryu S J, Lee M J, Lee H K. Detection of copy-rotate-move forgery using Zernike moments[C]//International Conference on Information Hiding. Springer-Verlag, 2010:51-65.
|
[8] |
Fischler M A, Bolles R C. Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography[J]. Readings in Computer Vision, 1987, 24:726-740.
|
[9] |
Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2):91-110.
|
[10] |
Bay H, Ess A, Tuytelaars T. Gool LV SURF:speeded up robust features[C]//Computer Vision and Image Understanding, 2008, 110(3):346-359.
|
[11] |
Pan X, Lü S. Region duplication detection using image feature matching[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(4):857-867.
|
[12] |
Amerini I, Ballan L, Caldelli R, Bimbo A D, Serra G. A sift-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):1099-1110.
|
[13] |
Amerini I, Ballan L, Caldelli R, Bimbo A D, Tongo L D, Serra G. Copy-move forgery detection and localization by means of robust clustering with J-Linkage[J]. Signal Processing Image Communication, 2013, 28(6):659-669.
|
[14] |
Pun C M, Yuan X C, Bi X L. Image forgery detection using adaptive over segmentation and feature point matching[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(8):1705-1716.
|
[15] |
Levinshtein A, Stere A, Kutulakos K N, Fleet D J, Dickinson S J, Siddiqi K. Turbo pixels:fast super pixels using geometric flows[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2009, 31(12):2290-2297.
|
[16] |
Li J, Li X, Yang B, Sun X. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(3):507-518.
|
[17] |
Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(6):1841-1854.
|