-
1
-
-
70350536692
-
A survey of passive image tampering detection
-
Springer, Berlin/Heidelberg
-
Ho A., Shi Y., Kim H., Barni M., Wang W., Dong J., Tan T. A survey of passive image tampering detection. Digital Watermarking 2009, vol. 5703:308-322. Springer, Berlin/Heidelberg.
-
(2009)
Digital Watermarking
, vol.5703
, pp. 308-322
-
-
Ho, A.1
Shi, Y.2
Kim, H.3
Barni, M.4
Wang, W.5
Dong, J.6
Tan, T.7
-
2
-
-
79960906058
-
A passive image authentication scheme for detecting region-duplication forgery with rotation
-
Liu G., Wang J., Lian S., Wang Z. A passive image authentication scheme for detecting region-duplication forgery with rotation. Journal of Network and Computer Applications 2010, 34(5):1557-1565.
-
(2010)
Journal of Network and Computer Applications
, vol.34
, Issue.5
, pp. 1557-1565
-
-
Liu, G.1
Wang, J.2
Lian, S.3
Wang, Z.4
-
3
-
-
85168042292
-
-
Rotten Gods, 2008. [Online]. Available: (accessed 01.03.12).
-
F. Shamshiri, Rotten Gods, 2008. [Online]. Available: (accessed 01.03.12). http://www.rottengods.com/2008/07/missles-forgery.html.
-
-
-
Shamshiri, F.1
-
4
-
-
37249068023
-
Blind passive media forensics: motivation and opportunity
-
Springer, Berlin/Heidelberg
-
Sebe N., Liu Y., Zhuang Y., Huang T., Chang S.-F. Blind passive media forensics: motivation and opportunity. Multimedia Content Analysis and Mining 2007, vol. 4577:57-59. Springer, Berlin/Heidelberg.
-
(2007)
Multimedia Content Analysis and Mining
, vol.4577
, pp. 57-59
-
-
Sebe, N.1
Liu, Y.2
Zhuang, Y.3
Huang, T.4
Chang, S.-F.5
-
5
-
-
64249107623
-
Recent advances in multimedia information system security
-
Lian S., Kanellopoulos D. Recent advances in multimedia information system security. Informatica 2009, 33:3-24.
-
(2009)
Informatica
, vol.33
, pp. 3-24
-
-
Lian, S.1
Kanellopoulos, D.2
-
6
-
-
0036627368
-
A survey of watermarking algorithms for image authentication
-
Rey C., Dugelay J.-L. A survey of watermarking algorithms for image authentication. EURASIP J. Appl. Signal Process. 2002, 2002(1):613-621.
-
(2002)
EURASIP J. Appl. Signal Process.
, vol.2002
, Issue.1
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.-L.2
-
7
-
-
0032648596
-
Digital Watermarking for Telltale Tamper Proofing and Authentication
-
Kundur D., Hatzinakos D. Digital Watermarking for Telltale Tamper Proofing and Authentication. Proceedings of the IEEE, vol. 87 1999, 1167-1180.
-
(1999)
Proceedings of the IEEE, vol. 87
, pp. 1167-1180
-
-
Kundur, D.1
Hatzinakos, D.2
-
8
-
-
74049137095
-
Blur detection of digital forgery using mathematical morphology
-
Springer-Verlag, Wroclaw, Poland
-
Zhou L., Wang D., Guo Y., Zhang J. Blur detection of digital forgery using mathematical morphology. Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications 2007, Springer-Verlag, Wroclaw, Poland.
-
(2007)
Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
-
-
Zhou, L.1
Wang, D.2
Guo, Y.3
Zhang, J.4
-
9
-
-
78651398372
-
Digital image forensics: a booklet for beginners
-
Redi J.A., Taktak W., Dugelay J.L. Digital image forensics: a booklet for beginners. Multimedia Tools Appl. 2011, 51(1):133-162.
-
(2011)
Multimedia Tools Appl.
, vol.51
, Issue.1
, pp. 133-162
-
-
Redi, J.A.1
Taktak, W.2
Dugelay, J.L.3
-
11
-
-
78650323484
-
Run-length and edge statistics based approach for image splicing detection
-
LNCS
-
Dong J., Wang W., Tan T., Shi Y.Q. Run-length and edge statistics based approach for image splicing detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2009, vol. 5450:76-87. LNCS.
-
(2009)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.5450
, pp. 76-87
-
-
Dong, J.1
Wang, W.2
Tan, T.3
Shi, Y.Q.4
-
14
-
-
78650874889
-
Copy-move forgery detection via texture description
-
Ardizzone E., Bruno A., Mazzola G. Copy-move forgery detection via texture description. MiFor'10 - Proceedings of the 2010 ACM Workshop on Multimedia in Forensics, Security and Intelligence, Co-located with ACM Multimedia 2010 2010, 59-64.
-
(2010)
MiFor'10 - Proceedings of the 2010 ACM Workshop on Multimedia in Forensics, Security and Intelligence, Co-located with ACM Multimedia 2010
, pp. 59-64
-
-
Ardizzone, E.1
Bruno, A.2
Mazzola, G.3
-
15
-
-
78650577184
-
Copy-move forgery detection in digital image
-
Kang L., Cheng X.P., Li K., Xiao-ping C. Copy-move forgery detection in digital image. Image and Signal Processing (CISP), vol. 5, 2010 3rd International Congress 2010, 2419-2421.
-
(2010)
Image and Signal Processing (CISP), vol. 5, 2010 3rd International Congress
, pp. 2419-2421
-
-
Kang, L.1
Cheng, X.P.2
Li, K.3
Xiao-ping, C.4
-
20
-
-
79960005370
-
A robust detection algorithm for region duplication in digital images
-
Cao Y., Gao T., Fan L., Yang Q. A robust detection algorithm for region duplication in digital images. Int. J. Digit. Content Technol. Appl. 2011, 5(6):95-103.
-
(2011)
Int. J. Digit. Content Technol. Appl.
, vol.5
, Issue.6
, pp. 95-103
-
-
Cao, Y.1
Gao, T.2
Fan, L.3
Yang, Q.4
-
21
-
-
84880277856
-
A robust detection algorithm for copy-move forgery in digital images
-
Cao Y., Gao T., Fan L., Yang Q. A robust detection algorithm for copy-move forgery in digital images. Forensic Sci. Int. 2011, (0).
-
(2011)
Forensic Sci. Int.
, Issue.0
-
-
Cao, Y.1
Gao, T.2
Fan, L.3
Yang, Q.4
-
22
-
-
79952443740
-
Improved DCT-based detection of copy-move forgery in images
-
Huang Y., Lu W., Sun W., Long D. Improved DCT-based detection of copy-move forgery in images. Forensic Sci. Int. 2011, 3:178-184.
-
(2011)
Forensic Sci. Int.
, vol.3
, pp. 178-184
-
-
Huang, Y.1
Lu, W.2
Sun, W.3
Long, D.4
-
23
-
-
41149112485
-
Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
-
Myrna A.N., Venkateshmurthy M.G., Patil C.G. Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping. Conference on Computational Intelligence and Multimedia Applications, 2007, International Conference, vol. 3 2007, 371-377.
-
(2007)
Conference on Computational Intelligence and Multimedia Applications, 2007, International Conference, vol. 3
, pp. 371-377
-
-
Myrna, A.N.1
Venkateshmurthy, M.G.2
Patil, C.G.3
-
24
-
-
79955478772
-
Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics
-
Bravo-Solorio S., Nandi A.K. Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics. Signal Proc. 2011, 91(8):1759-1770.
-
(2011)
Signal Proc.
, vol.91
, Issue.8
, pp. 1759-1770
-
-
Bravo-Solorio, S.1
Nandi, A.K.2
-
29
-
-
80052057670
-
Log-polar based scheme for revealing duplicated regions in digital images
-
Wu Q., Wang S., Zhang X. Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Proc. Lett. 2011, 18(10):559-562.
-
(2011)
IEEE Signal Proc. Lett.
, vol.18
, Issue.10
, pp. 559-562
-
-
Wu, Q.1
Wang, S.2
Zhang, X.3
-
30
-
-
83455245296
-
Comparative study of global color and texture descriptors for web image retrieval
-
Penatti O.A.B., Valle E., da R., Torres S. Comparative study of global color and texture descriptors for web image retrieval. J. Visual Commun. Image Rep. Feb. 2012, 23(2):359-380.
-
(2012)
J. Visual Commun. Image Rep.
, vol.23
, Issue.2
, pp. 359-380
-
-
Penatti, O.A.B.1
Valle, E.2
da, R.3
Torres, S.4
-
33
-
-
34147142845
-
Robust detection of region-duplication forgery in digital image
-
Luo W., Huang J., Qiu G., Weiqi L., Jiwu H., Guoping Q. Robust detection of region-duplication forgery in digital image. Proceedings of the 18th International Conference on Pattern Recognition, vol. 04 2006, 746-749.
-
(2006)
Proceedings of the 18th International Conference on Pattern Recognition, vol. 04
, pp. 746-749
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
Weiqi, L.4
Jiwu, H.5
Guoping, Q.6
-
36
-
-
79961033059
-
Fast and robust image cloning detection using block characteristics of DWT coefficients
-
Zimba M., Xingming S. Fast and robust image cloning detection using block characteristics of DWT coefficients. Int. J. Digital Content Technol. Appl. 2011, 5(7):359-367.
-
(2011)
Int. J. Digital Content Technol. Appl.
, vol.5
, Issue.7
, pp. 359-367
-
-
Zimba, M.1
Xingming, S.2
-
37
-
-
0036472227
-
Efficient use of MPEG-7 edge histogram descriptor
-
Won C.S., Park D.K., Park S.-J. Efficient use of MPEG-7 edge histogram descriptor. ETRI J. 2002, 24(1):23-30.
-
(2002)
ETRI J.
, vol.24
, Issue.1
, pp. 23-30
-
-
Won, C.S.1
Park, D.K.2
Park, S.-J.3
-
39
-
-
0026398342
-
Unsupervised texture segmentation using Gabor filters
-
Jain A.K., Farrokhnia F. Unsupervised texture segmentation using Gabor filters. Pattern Recogn. 1991, 24(12):1167-1186.
-
(1991)
Pattern Recogn.
, vol.24
, Issue.12
, pp. 1167-1186
-
-
Jain, A.K.1
Farrokhnia, F.2
-
40
-
-
0018466704
-
Statistical and structural approaches to texture
-
Haralick R.M. Statistical and structural approaches to texture. Proc IEEE 1979, 67(5):786-804.
-
(1979)
Proc IEEE
, vol.67
, Issue.5
, pp. 786-804
-
-
Haralick, R.M.1
-
46
-
-
80051734185
-
A SIFT-based forensic method for copy-move attack detection and transformation recovery, Information Forensics and Security
-
Amerini I., Ballan L., Caldelli R., Del Bimbo A., Serra G. A SIFT-based forensic method for copy-move attack detection and transformation recovery, Information Forensics and Security. IEEE Trans. 2011, 6(3):1099.
-
(2011)
IEEE Trans.
, vol.6
, Issue.3
, pp. 1099
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
48
-
-
78649426066
-
Region duplication detection using image feature matching
-
Pan X., Lyu S. Region duplication detection using image feature matching. IEEE Tran. Inform. Forensics Secur. 2010, 5(4):857-867.
-
(2010)
IEEE Tran. Inform. Forensics Secur.
, vol.5
, Issue.4
, pp. 857-867
-
-
Pan, X.1
Lyu, S.2
-
49
-
-
84880263765
-
Automated forensic method for copy-move forgery detection based on Harris interest points and SIFT descriptors
-
Shivakumar B.L., Baboo S. Automated forensic method for copy-move forgery detection based on Harris interest points and SIFT descriptors. International Journal of Computer Applications 2011, 27(3):9-17.
-
(2011)
International Journal of Computer Applications
, vol.27
, Issue.3
, pp. 9-17
-
-
Shivakumar, B.L.1
Baboo, S.2
-
52
-
-
84870281448
-
Detection of Region Duplication Forgery in Digital Images Using SURF
-
Shivakumar B.L., Baboo S. Detection of Region Duplication Forgery in Digital Images Using SURF. Int. J. Comput. Sci. Issues 2011, 8(4):199-205.
-
(2011)
Int. J. Comput. Sci. Issues
, vol.8
, Issue.4
, pp. 199-205
-
-
Shivakumar, B.L.1
Baboo, S.2
-
53
-
-
84891302906
-
-
A John Wiley and Sons Ltd., Publication, Chichester, UK
-
Flusser J., Suk T., Zitov B. Moments and moment invariants in pattern recognition 2009, 1-9. A John Wiley and Sons Ltd., Publication, Chichester, UK. 1st ed.
-
(2009)
Moments and moment invariants in pattern recognition
, pp. 1-9
-
-
Flusser, J.1
Suk, T.2
Zitov, B.3
-
54
-
-
84937655864
-
Visual pattern recognition by moment invariants. Information Theory
-
February (2)
-
Hu M.-K. Visual pattern recognition by moment invariants. Information Theory. IRE Trans. 1962, 8(February (2)):179-187.
-
(1962)
IRE Trans.
, vol.8
, pp. 179-187
-
-
Hu, M.-K.1
-
55
-
-
80755169418
-
Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
-
Muhammad G., Hossain M.S. Robust copy-move image forgery detection using undecimated wavelets and Zernike moments. ACM International Conference Proceeding Series 2011, 95-98.
-
(2011)
ACM International Conference Proceeding Series
, pp. 95-98
-
-
Muhammad, G.1
Hossain, M.S.2
-
58
-
-
34547689478
-
Detection of copy-move forgery using a method based on blur moment invariants
-
Mahdian B., Saic S. Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci. Int. 2007, 3:180-189.
-
(2007)
Forensic Sci. Int.
, vol.3
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
59
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
Popescu A.C., Farid H. Exposing digital forgeries by detecting traces of resampling. IEEE Tran. Signal Proc. 2005, 53(2):3948-3959.
-
(2005)
IEEE Tran. Signal Proc.
, vol.53
, Issue.2
, pp. 3948-3959
-
-
Popescu, A.C.1
Farid, H.2
-
61
-
-
0019009028
-
Singular value decomposition: its computation and some applications
-
Klema V.C., Laub A.J. Singular value decomposition: its computation and some applications. IEEE Trans. Automatic Control 1980, 25(2):164-176.
-
(1980)
IEEE Trans. Automatic Control
, vol.25
, Issue.2
, pp. 164-176
-
-
Klema, V.C.1
Laub, A.J.2
-
62
-
-
58149235809
-
A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
-
Li G., Wu Q., Tu D., Sun S. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. Multimedia and Expo, 2007 IEEE International Conference 2007, 1750-1753.
-
(2007)
Multimedia and Expo, 2007 IEEE International Conference
, pp. 1750-1753
-
-
Li, G.1
Wu, Q.2
Tu, D.3
Sun, S.4
-
67
-
-
57749104227
-
Detection of digital doctoring in exemplar-based in painted images
-
Wu Q., Sun S.J., Zhu W., Li G.H., Tu D. Detection of digital doctoring in exemplar-based in painted images. Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, vol. 3 2008, 1222-1226.
-
(2008)
Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, vol. 3
, pp. 1222-1226
-
-
Wu, Q.1
Sun, S.J.2
Zhu, W.3
Li, G.H.4
Tu, D.5
-
68
-
-
67349284349
-
Passive detection of doctored JPEG image via block artifact grid extraction
-
Li W., Yuan Y., Yu N. Passive detection of doctored JPEG image via block artifact grid extraction. Signal Proc. 2009, 89(9):1821-1829.
-
(2009)
Signal Proc.
, vol.89
, Issue.9
, pp. 1821-1829
-
-
Li, W.1
Yuan, Y.2
Yu, N.3
-
70
-
-
79951638155
-
Reduced time complexity for detection of copy-move forgery using discrete wavelet transform
-
October (7)
-
Khan S., Kulkarni A. Reduced time complexity for detection of copy-move forgery using discrete wavelet transform. International Journal of Computer Applications IJCA 2010, 6(October (7)):31-36.
-
(2010)
International Journal of Computer Applications IJCA
, vol.6
, pp. 31-36
-
-
Khan, S.1
Kulkarni, A.2
-
72
-
-
84862933213
-
Detecting copy-move forgery using non-negative matrix factorization
-
Yao H., Qiao T., Tang Z., Zhao Y., Mao H. Detecting copy-move forgery using non-negative matrix factorization. 2011 Third International Conference on Multimedia Information Networking and Security 2011, 591-594.
-
(2011)
2011 Third International Conference on Multimedia Information Networking and Security
, pp. 591-594
-
-
Yao, H.1
Qiao, T.2
Tang, Z.3
Zhao, Y.4
Mao, H.5
|