-
1
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
S. Bayram, H.T. Sencar, and N. Memon An efficient and robust method for detecting copy-move forgery Proc. ICASSP09 2009 1053 1056
-
(2009)
Proc. ICASSP09
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
3
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
DOI 10.1109/TIFS.2007.916285
-
M. Chen, J. Fridrich, M. Goljan, and J. Lukas Determining image Origin and integrity using sensor noise IEEE Transactions on Information Forensics and Security 3 1 2008 74 90 (Pubitemid 351270074)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
6
-
-
85032768213
-
Image forgery detection - A survey
-
H. Farid Image forgery detection - a survey IEEE Signal Processing Magazine 5 March 2009 16 25
-
(2009)
IEEE Signal Processing Magazine
, vol.5
, pp. 16-25
-
-
Farid, H.1
-
9
-
-
58149235809
-
A sorted neighborhood approach detecting duplicated forgeries based on DWT and SVD
-
G. Li, Q. Wu, D. Tu, and S. Sun A sorted neighborhood approach detecting duplicated forgeries based on DWT and SVD Proc. ICME2007 2007 1750 1753
-
(2007)
Proc. ICME2007
, pp. 1750-1753
-
-
Li, G.1
Wu, Q.2
Tu, D.3
Sun, S.4
-
10
-
-
69749097361
-
Digital image source coder forensics via intrinsic fingerprints
-
W.S. Lin, S.K. Tjoa, H.V. Zhoa, and J.R. Liu Digital image source coder forensics via intrinsic fingerprints IEEE Transactions on Information Forensics and Security 4 3 Sept 2009 460 475
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 460-475
-
-
Lin, W.S.1
Tjoa, S.K.2
Zhoa, H.V.3
Liu, J.R.4
-
11
-
-
34547689478
-
Detection of copy-move forgery using a method based on blur moment invariants
-
DOI 10.1016/j.forsciint.2006.11.002, PII S0379073806006748
-
B. Mahdian, and S. Saic Detection of copy-move forgery using a method based on blur moment invariants Forensic Science International 171 2-3 2007 180 189 (Pubitemid 47211748)
-
(2007)
Forensic Science International
, vol.171
, Issue.2-3
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
12
-
-
77953650817
-
A bibliography on blind methods for identifying image forgery
-
B. Mahdian, and S. Saic A bibliography on blind methods for identifying image forgery Signal Processing: Image Communication 25 2010 389 399
-
(2010)
Signal Processing: Image Communication
, vol.25
, pp. 389-399
-
-
Mahdian, B.1
Saic, S.2
-
14
-
-
67349211082
-
Using noise inconsistencies for blind image forensics
-
B. Mahdian, and S. Saic Using noise inconsistencies for blind image forensics Image and Vision Computing 27 10 September 2009 1497 1503
-
(2009)
Image and Vision Computing
, vol.27
, Issue.10
, pp. 1497-1503
-
-
Mahdian, B.1
Saic, S.2
-
17
-
-
80053146888
-
Blind copy move image forgery detection using dyadic undecimated wavelet transform
-
G. Muhammad, M. Hussain, K. Khawaji, and G. Bebis Blind copy move image forgery detection using dyadic undecimated wavelet transform Proc. 17th digital signal processing (DSP) conference, Corfu, Greece July, 2011
-
(2011)
Proc. 17th Digital Signal Processing (DSP) Conference, Corfu, Greece
-
-
Muhammad, G.1
Hussain, M.2
Khawaji, K.3
Bebis, G.4
-
20
-
-
80053168927
-
Passive forensic method for detecting duplicated regions affected by reflection, rotation, and scaling
-
S.B. Solario, and A.K. Nandi Passive forensic method for detecting duplicated regions affected by reflection, rotation, and scaling Proc. EUSIPCO09 2009 824 828
-
(2009)
Proc. EUSIPCO09
, pp. 824-828
-
-
Solario, S.B.1
Nandi, A.K.2
-
21
-
-
33847702157
-
The undecimated wavelet decomposition and its reconstruction
-
DOI 10.1109/TIP.2006.887733
-
Jean-Luc Starck, Jalal Fadili, and Fionn Murtagh The undecimated wavelet decomposition and its reconstruction IEEE Transactions on Image Processing 16 2 2007 297 309 (Pubitemid 46421673)
-
(2007)
IEEE Transactions on Image Processing
, vol.16
, Issue.2
, pp. 297-309
-
-
Starck, J.-L.1
Fadili, J.2
Murtagh, F.3
-
24
-
-
0043201448
-
Digital watermarking
-
M.M. Yeung Digital watermarking ACM Communications 41 7 1998 30 33
-
(1998)
ACM Communications
, vol.41
, Issue.7
, pp. 30-33
-
-
Yeung, M.M.1
-
26
-
-
56749161438
-
Multipurpose watermarking based on multiscale curvelet transform
-
C. Zhang, L.L. Cheng, Z. Qiu, and L.M. Cheng Multipurpose watermarking based on multiscale curvelet transform IEEE Transactions on Information Forensics and Security 3 4 December 2008 611 619
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 611-619
-
-
Zhang, C.1
Cheng, L.L.2
Qiu, Z.3
Cheng, L.M.4
|