|
1. R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Süsstrunk, "SLIC Superpixels Compared to State-of-The-Art Superpixel Methods," IEEE transactions on pattern analysis and machine intelligence, vol. 34, no. 11, pp. 2274-2282, 2012.
|
|
2. I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, "A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no.3, pp. 1099-1110, 2011.
|
|
3. I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, "Copy-Move Forgery Detection and Localization By Means Of Robust Clustering With J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.
|
|
4. E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-Move Forgery Detection by Matching Triangles of Keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084-2094, 2015.
|
|
5. V. Christlein, C. Riess, and E. Angelopoulou, "A Study On Features for The Detection Of Copy-Move Forgeries," in Sicherheit, vol. 2010, pp. 105-116, 2010.
|
|
6. V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An Evaluation of Popular Copy-Move Forgery Detection Approaches," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.
|
|
7. M. Emam, Q. Han, and X. M. Niu, "PCET Based Copy-Move Forgery Detection in Images Under Geometric Transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, 2016.
|
|
8. A. J. Fridrich, B. D. Soukal, and A. J. Luká?, "Detection of Copy-Move Forgery In Digital Images," in Proceedings of Digital Forensic Research Workshop, 2003.
|
|
9. H. Huang, W. Guo, and Y. Zhang, "Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm," in Proceedings of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272-276, 2008.
|
|
10. T. Huynh-Kha, T. Le-Tien, S. Ha-Viet-Uyen, and K. Huynh-Van, "The Efficiency of Applying DWT And Feature Extraction Into Copy-Move Images Detection," in Proceedings of 2015 International Conference on Advanced Technologies for Communications (ATC), pp. 44-49, 2015.
|
|
11. X. Kang and S. Wei, "Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics," in Proceedings of 2008 International Conference on Computer Science and Software Engineering, vol. 3, pp. 926-930, 2008.
|
|
12. W. Luo, J. Huang, and G. Qiu, "Robust Detection of Region-Duplication Forgery In Digital Image," in Proceedings of 18th International Conference on Pattern Recognition, vol. 4, pp. 746-749, 2006.
|
|
13. A. C. Popescu and H. Farid, "Exposing Digital Forgeries by Detecting Traces Of Resampling," IEEE Transactions on signal processing, vol. 53, no. 2, pp. 758-767, 2005.
|
|
14. C. M. Pun, X. C. Yuan, and X. L. Bi, "Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, 2015.
|
|
15. J. Qin, F. Li, L. Xiang, and C. Yin, "Detection of Image Region Copy-Move Forgery Using Radial Harmonic Fourier Moments," Journal of Image & Graphics, vol. 18, pp. 919-923, 2013.
|
|
16. B. Shivakumar and L. D. S. S. Baboo, "Detection of Region Duplication Forgery In Digital Images Using SURF," International Journal of Computer Science Issues, vol. 8, no. 4, pp. 199-205, 2011.
|
|
17. P. WANG, N. CAO, X.-c. CAO, and J.-f. OUYANG, "Fast Random Sample Consensus Based on Cross Ratio Invariance," Journal of Tianjin University, vol. 2, p. 017, 2011.
|
|
18. Y. Wo, K. Yang, G. Han, H. Chen, and W. Wu, "Copy–Move Forgery Detection Based On Multi-Radius PCET," IET Image Processing,vol. 11, no.2, pp. 99-108, 2016.
|
|
19. M. Zandi, A. Mahmoudi-Aznaveh, and A. Talebpour, "Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector," IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2499-2512, Nov 2016.
|
|
20. F. Zhao, R. Zhang, H. Guo, and Y. Zhang, "Effective Digital Image Copy-Move Location Algorithm Robust To Geometric Transformations," in Proceedings of 2015 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, 2015.
|
|
21. J. Zheng, Y. Liu, J. Ren, T. Zhu, Y. Yan, and H. Yang, "Fusion of Block And Keypoints Based Approaches For Effective Copy-Move Image Forgery Detection," Multidimensional Systems and Signal Processing, vol. 27, no. 4, pp. 989-1005, 2016.
|
|
22. J. Zhong, Y. Gan, and S. Xie, "Radon Odd Radial Harmonic Fourier Moments In Detecting Cloned Forgery Image," Chaos, Solitons & Fractals, vol. 89, pp. 115-129, 2016.
|
|
23. J. Zhong, Y. Gan, J. Young, and P. Lin, "Copy Move Forgery Image Detection via Discrete Radon and Polar Complex Exponential Transform-Based Moment Invariant Features," International Journal of Pattern Recognition and Artificial Intelligence,vol. 31, no. 2, p. 1754005, 2017.
|