-
1
-
-
85032768213
-
Image forgery detection: a survey
-
Farid H. Image forgery detection: a survey. IEEE Signal Process. Mag. 2009, 26(2):16-25.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
2
-
-
0032648596
-
Digital watermarking for telltale tamper proofing and authentication
-
Kundur D., Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE 1999, 87(7):1167-1180.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
3
-
-
48149093483
-
Robust hash for detecting and localizing image tampering
-
Roy S., Sun Q. Robust hash for detecting and localizing image tampering. Proc. IEEE Conf. Image Processing 2007, 117-120.
-
(2007)
Proc. IEEE Conf. Image Processing
, pp. 117-120
-
-
Roy, S.1
Sun, Q.2
-
5
-
-
79952443740
-
Improved DCT-based detection of copy-move forgery in images
-
Huang Y.P., Lu W., Sun W., Long D.Y. Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 2011, 206(1-3):178-184.
-
(2011)
Forensic Sci. Int.
, vol.206
, Issue.1-3
, pp. 178-184
-
-
Huang, Y.P.1
Lu, W.2
Sun, W.3
Long, D.Y.4
-
6
-
-
27844542239
-
Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515
-
Dartmouth College, Computer Science
-
A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.
-
(2004)
-
-
Popescu, A.C.1
Farid, H.2
-
7
-
-
58149235809
-
A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
-
Li G.H., Wu Q., Tu D., Sun S.J. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. Proc. IEEE Conf. Multimedia and Expo 2007, 1750-1753.
-
(2007)
Proc. IEEE Conf. Multimedia and Expo
, pp. 1750-1753
-
-
Li, G.H.1
Wu, Q.2
Tu, D.3
Sun, S.J.4
-
9
-
-
78549275481
-
Detection of copy-rotate-move forgery using Zernike moments
-
Ryu S.J., Lee M.J., Lee H.K. Detection of copy-rotate-move forgery using Zernike moments. Proc. Information Hiding 2010, 51-65.
-
(2010)
Proc. Information Hiding
, pp. 51-65
-
-
Ryu, S.J.1
Lee, M.J.2
Lee, H.K.3
-
10
-
-
34547689478
-
Detection of copy-move forgery using a method based on blur moment invariants
-
Mahdian B., Saic S. Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 2007, 171(2-3):180-189.
-
(2007)
Forensic Sci. Int.
, vol.171
, Issue.2-3
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
11
-
-
77952673897
-
Two-dimensional polar harmonic transforms for invariant image representation
-
Yap P.T., Jiang X.D., Kot A.C. Two-dimensional polar harmonic transforms for invariant image representation. IEEE Trans. Pattern Anal. Mach. Intell. 2010, 32(7):1259-1270.
-
(2010)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.32
, Issue.7
, pp. 1259-1270
-
-
Yap, P.T.1
Jiang, X.D.2
Kot, A.C.3
-
12
-
-
0031644241
-
Approximate nearest neighbors: towards removing the curse of dimensionality
-
Indyk P., Motwani R. Approximate nearest neighbors: towards removing the curse of dimensionality. Proc. 30th ACM Symp. Theory of Computing 1998, 604-613.
-
(1998)
Proc. 30th ACM Symp. Theory of Computing
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
14
-
-
85198028989
-
ImageNet: a large-scale hierarchical image database
-
Deng J., Dong W., Socher R., Li L.J., Li K., Li F.F. ImageNet: a large-scale hierarchical image database. Proc. IEEE Conf. Computer Vision and Pattern Recognition 2009, 248-255.
-
(2009)
Proc. IEEE Conf. Computer Vision and Pattern Recognition
, pp. 248-255
-
-
Deng, J.1
Dong, W.2
Socher, R.3
Li, L.J.4
Li, K.5
Li, F.F.6
-
15
-
-
85168038812
-
-
Database for object and concept recognition. Available:
-
Database for object and concept recognition. Available: http://www.cs.washington.edu/research/imagedatabase/groundtruth/.
-
-
-
-
16
-
-
85168040626
-
-
Kodak lossless true color image suite. Available:
-
Kodak lossless true color image suite. Available: http://r0k.us/graphics/kodak/.
-
-
-
|