[1] 陈园园,于在河. 数字图像被动取证技术综述[J]. 吉林大学学报(信息科学版),2014, 32(6):690-698. Chen Y Y, Yu Z H. Survey on passive forensics techniques for digital images[J]. Journal of Jilin University (Information Science Edition), 2014, 34(6):690-698. (in Chinese) [2] 赵洁,王光夫,赵建楠,等. 面向拼接与克隆篡改的数字图像内容取证系统设计[J]. 中央民族大学学报(自然科学版), 2018, 27(3):61-64. Zhao J, Wang G F, Zhao J N, et al. Design of digital image content forensics system for mosaic and clone tampering[J]. Journal of Minzu University of China (Natural Sciences Edition), 2018, 27(3):61-64. (in Chinese) [3] Liu Z C, He J F, Tang X O, et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis[J]. Pattern Recognition, 2009, 42(11):2492-2501. [4] Bianchi T, Piva A. Image forgery localization via block-grained analysis of JPEG artifacts[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):1003-1017. [5] Ye S Y S, Sun Q S Q, Chang E C. Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C]//IEEE International Conference on Multimedia and Expo. IEEE, 2007:487-492. [6] Li W, Yuan Y, Yu N. Passive detection of doctored JPEG image via block artifact grid extraction[J]. Signal Processing, 2009, 89(9):1821-1829. [7] Ferrara P, Bianchi T, De Rosa A, et al. Image forgery localization via fine-grained analysis of CFA artifacts[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(5):1566-1577. [8] Dirik A E, Memon N D. Image tamper detection based on demosaicing artifacts[C]//IEEE International Conference on Image Processing. IEEE, 2009:354-358. [9] Hsu Y F, Chang S F. Image splicing detection using camera response function consistency and automatic segmentation[C]//IEEE International Conference on Multimedia and Expo. IEEE, 2007:28-31. [10] Stamm M C, Liu K J. Forensic detection of image manipulation using statistical intrinsic fingerprints[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3):492-506. [11] Ng T T, Chang S F, Sun Q. Blind detection of photomontage using higher order statistics[C]//Proceedings of the 2004 International Symposium on Circuits and Systems. IEEE, 2004:688-691. [12] Johnson M K. Exposing digital forgeries in complex lighting environments[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):450-461. [13] Mahdian B, Saic S. Using noise inconsistencies for blind image forensics[J]. Image and Vision Computing, 2009, 27(10):1497-1503. [14] Lü S, Pan X, Zhang X. Exposing region splicing forgeries with blind local noise estimation[J]. International Journal of Computer Vision, 2014, 110(2):202-221. [15] Rao Y, Ni J Q. A deep learning approach to detection of splicing and copy-move forgeries in images[C]//IEEE International Workshop on Information Forensics and Security. IEEE, 2016:254-258. [16] Wang Q, Zhang R. Double JPEG compression forensics based on a convolutional neural network[J]. EURASIP Journal on Information Security, 2016, 2016(1):23-25. [17] Amerini I, Uricchio T, Ballan L. Localization of JPEG double compression through multidomain convolutional neural networks[J]. IEEE CVPR Workshop Media Forensics, 2017, 3(10):1865-1871. [18] Liu B, Pun C M. Locating splicing forgery by fully convolutional networks and conditional random field[J]. Signal Processing Image Communication, 2018, 66(3):103-112. [19] Chen B J, Qi X M, Wang Y T. An improved splicing localization method by fully convolutional networks[J]. IEEE Access, 2018, 6:69472-69480. [20] He K, Zhang X Y, Ren S Q, et al. Deep residual learning for image recognition[C]//IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2016:603-607. |