메뉴 건너뛰기




Volumn , Issue , 2011, Pages 304-308

A DWT-DCT based passive forensics method for copy-move attacks

Author keywords

Copy move detection; DCT; DWT; Feature matching; Passive forensics

Indexed keywords

DCT; DWT; FEATURE MATCHING; IMAGE BLOCKS; PASSIVE FORENSICS; QUALITY LEVELS; TIME COMPLEXITY;

EID: 84862966008     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MINES.2011.98     Document Type: Conference Paper
Times cited : (25)

References (15)
  • 2
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • M.U.Celik, G.Sharma, E.Saber, A.M.Tekalp,"Hierarchical watermarking for secure image authentication with localization," IEEE Signal Processing Magazine, Vol.11(6), pp.585-595, 2002.
    • (2002) IEEE Signal Processing Magazine , vol.11 , Issue.6 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 4
    • 8644248272 scopus 로고    scopus 로고
    • Image authentication based on digital watermarking
    • J.Wu, F.Lin, "Image authentication based on digital watermarking," Chinese Journal of Conputers, Vol.27(9), pp.1153-1161, 2004.
    • (2004) Chinese Journal of Conputers , vol.27 , Issue.9 , pp. 1153-1161
    • Wu, J.1    Lin, F.2
  • 5
    • 58149230256 scopus 로고    scopus 로고
    • An image authentication watermarking with self localization and recovery
    • Chongqing. China: World Scientfic
    • Q.Wu, G.H.Li, D.Tu. "An image authentication watermarking with self localization and recovery," In Proceedings of the 11th Joint International Computer Conference. Chongqing. China: World Scientfic, pp.960-963, 2005.
    • (2005) Proceedings of the 11th Joint International Computer Conference , pp. 960-963
    • Wu, Q.1    Li, G.H.2    Tu, D.3
  • 6
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • G.L.Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," IEEE Transaction Consumer Electronics, Vol.39(4), pp.905-910, 1993.
    • (1993) IEEE Transaction Consumer Electronics , vol.39 , Issue.4 , pp. 905-910
    • Friedman, G.L.1
  • 7
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C.Y.Lin, S.F.Chang. "A robust image authentication method distinguishing JPEG compression from malicious manipulation," WEE Transactions on Circuits and Systems for Video Technology,Vol. 11(2), pp.153-168, 2001.
    • (2001) WEE Transactions on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 8
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature forimag eauthentication: An incidental distortion resistant scheme
    • C.S.Lu, H.Y.M.Liao. "Structural digital signature forimag eauthentication: an incidental distortion resistant scheme," IEEE Transaction Multimddia. Vol.5(2),pp.161-173, 2003.
    • (2003) IEEE Transaction Multimddia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.S.1    Liao, H.Y.M.2
  • 9
    • 84862910224 scopus 로고    scopus 로고
    • Digital Image Forgery Detection
    • B.L.Shivakumar, S.Santhosh Baboo,"Digital Image Forgery Detection", SAJOSPS, Vol.10(2), pp.1 16-119, 2010.
    • (2010) SAJOSPS , vol.10 , Issue.2 , pp. 116-119
    • Shivakumar, B.L.1    Santhosh Baboo, S.2
  • 12
    • 79960718594 scopus 로고    scopus 로고
    • Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Cuff ent Methods
    • B.L.Shivakumar, S.Santhoth Baboo, "Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Cuff ent Methods," Global Journal of Computer Science and Technology, Vol.10(7), pp.61-65, 2010.
    • (2010) Global Journal of Computer Science and Technology , vol.10 , Issue.7 , pp. 61-65
    • Shivakumar, B.L.1    Santhoth Baboo, S.2
  • 13
    • 58149235809 scopus 로고    scopus 로고
    • A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
    • IEEE, Beijing
    • G.H.Li, Q.Wu, D.Tu,S.J.Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," In Proceedings of 2007 IEEE ICME, pp.1750-1753. IEEE, Beijing 2007.
    • (2007) Proceedings of 2007 IEEE ICME , pp. 1750-1753
    • Li, G.H.1    Wu, Q.2    Tu, D.3    Sun, S.J.4
  • 14
    • 42449164842 scopus 로고    scopus 로고
    • Chester F. Carlson Center for Imaging Science, Rochester Institute of Technology, May 29
    • E.J.Ientilucci, "Using the Singular Value Decompostion," Chester F. Carlson Center for Imaging Science, Rochester Institute of Technology, May 29, 2003.
    • (2003) Using the Singular Value Decompostion
    • Ientilucci, E.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.