-
2
-
-
85032768213
-
Image forgery detection
-
Mar
-
H. Farid, "Image forgery detection" IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, Mar 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
5
-
-
85013855044
-
-
2nd ed. Francisco, Calif, USA: Morgan Kaufmann
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital WaterMarking and Steganography, 2nd ed. Francisco, Calif, USA: Morgan Kaufmann, 2008.
-
(2008)
Digital WaterMarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
6
-
-
84944878354
-
-
1st ed. Boca Raton, Fla, USA: CRC Press
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, 1st ed. Boca Raton, Fla, USA: CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
7
-
-
46449095467
-
A survey on digital camera image forensic methods
-
Jul
-
T. Van Lanh, K.-S. Chong, S. Emmanuel, and M. S. Kankanhaui, "A survey on digital camera image forensic methods" in Proceedings of the IEEE International Conference onMultimedia and Expo (ICME'07), Jul 2007, pp. 16-19.
-
(2007)
Proceedings of the IEEE International Conference OnMultimedia and Expo (ICME'07)
, pp. 16-19
-
-
Van Lanh, T.1
Chong, K.-S.2
Emmanuel, S.3
Kankanhaui, M.S.4
-
9
-
-
70350536692
-
A survey of passive image tampering detection
-
Berlin, Heidelberg: Springer-Verlag
-
W. Wang, J. Dong, and T. Tan, "A survey of passive image tampering detection," in Proceedings of the 8th International Workshop on Digital Watermarking (IWDW) '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 308-322.
-
(2009)
Proceedings of the 8th International Workshop on Digital Watermarking (IWDW) '09
, pp. 308-322
-
-
Wang, W.1
Dong, J.2
Tan, T.3
-
10
-
-
77953650817
-
A bibliography on blind methods for identifying image forgery
-
Jul
-
B. Mahdian and S. Saic, "A bibliography on blind methods for identifying image forgery,iSignal Processing: Image Communication, vol. 25, no. 6,pp. 389-399,Jul 2010.
-
(2010)
ISignal Processing: Image Communication
, vol.25
, Issue.6
, pp. 389-399
-
-
Mahdian, B.1
Saic, S.2
-
11
-
-
84890463165
-
An overview on image forensics
-
A. Piva, "An overview on image forensics," ISRN Signal Processing, pp. 1-22,2013.
-
(2013)
ISRN Signal Processing
, pp. 1-22
-
-
Piva, A.1
-
13
-
-
34547689478
-
Detection of copy-move forgery using a method based on blur moment invariants
-
Sep.
-
B. Mahdian and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic science international, vol. 171, no. 2, pp. 180-189, Sep. 2007.
-
(2007)
Forensic Science International
, vol.171
, Issue.2
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
14
-
-
74049111557
-
Fast and robust forensics for image region-duplication forgery
-
Mar.
-
J.-W. Wang, G.-J. Liu, Z. Zhang, Y. Dai, and Z. Wang, "Fast and robust forensics for image region-duplication forgery," Acta Automatica Sinica, vol. 35, no. 12, pp. 1488-1495, Mar. 2009.
-
(2009)
Acta Automatica Sinica
, vol.35
, Issue.12
, pp. 1488-1495
-
-
Wang, J.-W.1
Liu, G.-J.2
Zhang, Z.3
Dai, Y.4
Wang, Z.5
-
15
-
-
78549275481
-
Detection of copy-rotate-move forgery using zernike moments
-
Berlin, Heidelberg: Springer
-
S.-J. Ryu, M.-J. Lee, and H.-K. Lee, "Detection of copy-rotate-move forgery using zernike moments,iin Information Hiding. Berlin, Heidelberg: Springer, 2010, pp. 51-65.
-
(2010)
Information Hiding
, pp. 51-65
-
-
Ryu, S.-J.1
Lee, M.-J.2
Lee, H.-K.3
-
17
-
-
84979865404
-
Exploring duplicated regions in natural images
-
M. Bashar, K. Noda, N. Ohnishi, and K. Mori, "Exploring duplicated regions in natural images," IEEE transactions on image processing: a publication of the IEEE Signal Processing Society, 2010.
-
(2010)
IEEE Transactions on Image Processing: A Publication of the IEEE Signal Processing Society
-
-
Bashar, M.1
Noda, K.2
Ohnishi, N.3
Mori, K.4
-
19
-
-
79951638155
-
Reduced time complexity for detection of copy-move forgery using discrete wavelet transform
-
S. Khan and A. Kulkarni, "Reduced time complexity for detection of copy-move forgery using discrete wavelet transform," International Journal of Computer Applications, vol. 6, no. 7, pp. 31-36, 2010.
-
(2010)
International Journal of Computer Applications
, vol.6
, Issue.7
, pp. 31-36
-
-
Khan, S.1
Kulkarni, A.2
-
20
-
-
79952526555
-
Wavelet-based multiresolution features for detecting duplications in images
-
M. K. Bashar, K. Noda, N. Ohnishi, H. Kudo, T. Matsumoto, and Y Takeuchi, "Wavelet-based multiresolution features for detecting duplications in images," in Conference on Machine Vision and Intelligence, 2007,pp. 264-267.
-
(2007)
Conference on Machine Vision and Intelligence
, pp. 264-267
-
-
Bashar, M.K.1
Noda, K.2
Ohnishi, N.3
Kudo, H.4
Matsumoto, T.5
Takeuchi, Y.6
-
21
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
IEEE
-
S. Bayram, H. T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in International Conference on Acoustics, Speech and Signal Processing, (ICASSP'09). IEEE, 2009, pp. 1053-1056.
-
(2009)
International Conference on Acoustics, Speech and Signal Processing, (ICASSP'09).
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
22
-
-
84863325954
-
Passive copy move image forgery detection using undecimated dyadic wavelet transform
-
Jun.
-
G. Muhammad,M. Hussain,and G. Bebis,"Passive copy move image forgery detection using undecimated dyadic wavelet transform,,' Digital Investigation, vol. 9, no. 1, pp. 49-57, Jun. 2012.
-
(2012)
Digital Investigation
, vol.9
, Issue.1
, pp. 49-57
-
-
Muhammad, G.1
Hussainand, M.2
Bebis, G.3
-
23
-
-
70350023285
-
Fast copy-move forgery detection
-
H.-J. Lin, C.-W. Wang, Y.-T. Kao et al., "Fast copy-move forgery detection," WSEAS Transactions on Signal Processing, vol. 5, no. 5, pp. 188-197, 2009.
-
(2009)
WSEAS Transactions on Signal Processing
, vol.5
, Issue.5
, pp. 188-197
-
-
Lin, H.-J.1
Wang, C.-W.2
Kao, Y.-T.3
-
24
-
-
84880396631
-
Fast and efficient region duplication detection in digital images using sub-blocking method
-
V. K. Singh and R. Tripathi, "Fast and efficient region duplication detection in digital images using sub-blocking method," International Journal of Advanced Science and Technology, vol. 35, pp. 93-102, 2011.
-
(2011)
International Journal of Advanced Science and Technology
, vol.35
, pp. 93-102
-
-
Singh, V.K.1
Tripathi, R.2
-
25
-
-
34147142845
-
Robust detection of region-duplication forgery in digital image
-
IEEE
-
W. Luo, J. Huang, and G. Qiu, "Robust detection of region-duplication forgery in digital image," in 18th International Conference on Pattern Recognition,(ICPR'06), vol. 4. IEEE, 2006, pp. 746-749.
-
(2006)
18th International Conference on Pattern Recognition,(ICPR'06)
, vol.4
, pp. 746-749
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
26
-
-
77749279983
-
Detection of image region duplication forgery using model with circle block
-
IEEE
-
J. Wang, G. Liu, H. Li, Y Dai, and Z. Wang, "Detection of image region duplication forgery using model with circle block," in International Conference on Multimedia Information Networking and Security, (MINES'09), vol. 1. IEEE, 2009, pp. 25-29.
-
(2009)
International Conference on Multimedia Information Networking and Security, (MINES'09)
, vol.1
, pp. 25-29
-
-
Wang, J.1
Liu, G.2
Li, H.3
Dai, Y.4
Wang, Z.5
-
27
-
-
78650874889
-
Copy-move forgery detection via texture description
-
NY, USA: ACM
-
E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-move forgery detection via texture description," in Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence. NY, USA: ACM, 2010, pp. 59-64.
-
(2010)
Proceedings of the 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence
, pp. 59-64
-
-
Ardizzone, E.1
Bruno, A.2
Mazzola, G.3
-
29
-
-
78649426066
-
Region duplication detection using image feature matching
-
Dec.
-
X. Pann and S. Lyu,"Region duplication detection using image feature matching," IEEE Transactions on Information Forensics and Security, vol. 5,no. 4,pp. 857-867,Dec. 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.4
, pp. 857-867
-
-
Pann, X.1
Lyu, S.2
-
30
-
-
80051734185
-
A SIFT-Based forensic method for copy-move attack detection and transformation recovery
-
Sep.
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A SIFT-Based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, Sep. 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 1099-1110
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
31
-
-
84880263765
-
Automated forensic method for copy-move forgery detection based on harris interest points and sift descriptors
-
B. Shivakumar and S. S. Baboo, "Automated forensic method for copy-move forgery detection based on harris interest points and sift descriptors," International Journal of Computer Applications, vol. 27, no. 3, pp. 9-17, 2011.
-
(2011)
International Journal of Computer Applications
, vol.27
, Issue.3
, pp. 9-17
-
-
Shivakumar, B.1
Baboo, S.S.2
-
32
-
-
80055037788
-
Dwt-dct (qcd) based copy-move image forgery detection
-
IEEE
-
M. Ghorbani, M. Firouzmand, and A. Faraahi, "Dwt-dct (qcd) based copy-move image forgery detection," in 18th International Conference on Systems, Signals and Image Processing (IWSSIP'11). IEEE, 2011, pp. 1-4.
-
(2011)
18th International Conference on Systems, Signals and Image Processing (IWSSIP'11)
, pp. 1-4
-
-
Ghorbani, M.1
Firouzmand, M.2
Faraahi, A.3
|