-
2
-
-
84890463165
-
An overview on image forensics
-
A. Piva, An Overview on Image Forensics, ISRN Signal Processing, vol. 2013, p. 22, 2013
-
(2013)
ISRN Signal Processing
, vol.2013
, pp. 22
-
-
Piva, A.1
-
3
-
-
84855205141
-
A robust detection algorithm for copy-move forgery in digital images
-
Y. Cao, T. Gao, L. Fan, and Q. Yang, A robust detection algorithm for copy-move forgery in digital images, Forensic science international, vol. 214, pp. 33-43, 2012
-
(2012)
Forensic Science International
, vol.214
, pp. 33-43
-
-
Cao, Y.1
Gao, T.2
Fan, L.3
Yang, Q.4
-
4
-
-
78549275481
-
Detection of copy-rotate-move forgery using zernike moments
-
R. Böhme, P. L. Fong, and R. Safavi-Naini, Eds., ed Springer Berlin Heidelberg
-
S.-J. Ryu, M.-J. Lee, and H.-K. Lee, Detection of Copy-Rotate-Move Forgery Using Zernike Moments, in Information Hiding. vol. 6387, R. Böhme, P. L. Fong, and R. Safavi-Naini, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 51-65
-
(2010)
Information Hiding
, vol.6387
, pp. 51-65
-
-
Ryu, S.-J.1
Lee, M.-J.2
Lee, H.-K.3
-
5
-
-
63149091707
-
Detection of copy-move forgery in digital images using sift algorithm
-
PACIIA '08. Pacific-Asia Workshop on 2008
-
H. Hailing, G. Weiqiang, and Z. Yu, Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm, in Computational Intelligence and Industrial Application, 2008. PACIIA '08. Pacific-Asia Workshop on, 2008, pp. 272-276
-
(2008)
Computational Intelligence and Industrial Application
, pp. 272-276
-
-
Hailing, H.1
Weiqiang, G.2
Yu, Z.3
-
6
-
-
84870264329
-
An evaluation of popular copy-move forgery detection approaches
-
V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, An Evaluation of Popular Copy-Move Forgery Detection Approaches, IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1841-1854, 2012
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, pp. 1841-1854
-
-
Christlein, V.1
Riess, C.2
Jordan, J.3
Riess, C.4
Angelopoulou, E.5
-
7
-
-
84880672623
-
Rotation invariant localization of duplicated image regions based on zernike moments
-
S.-J. Ryu, M. Kirchner, M.-J. Lee, and H.-K. Lee, Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments, Information Forensics and Security, IEEE Transactions on, vol. 8, pp. 1355-1370, 2013
-
(2013)
Information Forensics and Security IEEE Transactions on
, vol.8
, pp. 1355-1370
-
-
Ryu, S.-J.1
Kirchner, M.2
Lee, M.-J.3
Lee, H.-K.4
-
8
-
-
84872395718
-
Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
-
Y. Li, Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching, Forensic science international, vol. 224, pp. 59-67, 2013
-
(2013)
Forensic Science International
, vol.224
, pp. 59-67
-
-
Li, Y.1
-
9
-
-
84878019726
-
Copy-move forgery detection and localization by means of robust clustering with j-linkage
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, L. Del Tongo, and G. Serra, Copy-move forgery detection and localization by means of robust clustering with J-Linkage, Signal Processing: Image Communication, vol. 28, pp. 659-669, 2013
-
(2013)
Signal Processing: Image Communication
, vol.28
, pp. 659-669
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Del Tongo, L.5
Serra, G.6
-
10
-
-
80051734185
-
A sift-based forensic method for copy-move attack detection and transformation recovery
-
2011
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery, Information Forensics and Security, IEEE Transactions on, vol. 6, pp. 1099-1110, 2011 2011
-
(2011)
Information Forensics and Security IEEE Transactions on
, vol.6
, pp. 1099-1110
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
11
-
-
85172620828
-
-
Digital Forensic Research Workshop, Cleveland, OH
-
J. Fridrich, D. Soukal, and J. Lukas, Detection of Copy Move Forgery in Digital Images, in Digital Forensic Research Workshop, Cleveland, OH, 2003
-
(2003)
Detection of Copy Move Forgery in Digital Images
-
-
Fridrich, J.1
Soukal, D.2
Lukas, J.3
-
13
-
-
84979865404
-
Exploring duplicated regions in natural images
-
M. Bashar, K. Noda, N. Ohnishi, and K. Mori, Exploring Duplicated Regions in Natural Images, Image Processing, IEEE Transactions on, vol. PP, pp. 1-1, 2010
-
(2010)
Image Processing IEEE Transactions on
, pp. 1-1
-
-
Bashar, M.1
Noda, K.2
Ohnishi, N.3
Mori, K.4
-
14
-
-
46449096967
-
A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd
-
L. Guohui, W. Qiong, D. Tu, and S. Shaojie, A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD, in Multimedia and Expo, 2007 IEEE International Conference on, 2007, pp. 1750-1753
-
(2007)
Multimedia and Expo 2007 IEEE International Conference on
, pp. 1750-1753
-
-
Guohui, L.1
Qiong, W.2
Tu, D.3
Shaojie, S.4
-
15
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
S. Bayram, H. T. Sencar, and N. Memon, An efficient and robust method for detecting copy-move forgery, in Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on, 2009, pp. 1053-1056
-
(2009)
Acoustics, Speech and Signal Processing 2009 ICASSP 2009 IEEE International Conference on
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
16
-
-
84871264812
-
An efficient scheme for detecting copy-move forged images by local binary patterns
-
S. L. Leida Li, Hancheng Zhu, An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns, Journal of Information Hiding and Multimedia Signal Processing, vol. 4, pp. 46-56, 2013
-
(2013)
Journal of Information Hiding and Multimedia Signal Processing
, vol.4
, pp. 46-56
-
-
Leida Li, S.L.1
Zhu, H.2
-
17
-
-
78049403223
-
Geometric tampering estimation by means of a SIFT-based forensic analysis
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, Geometric tampering estimation by means of a SIFT-based forensic analysis, in IEEE International Conference on Acoustics Speech and Signal Processing, 2010, pp. 1702-1705
-
(2010)
IEEE International Conference on Acoustics Speech and Signal Processing
, pp. 1702-1705
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
18
-
-
79952523514
-
On rotation invariance in copy-move forgery detection
-
V. Christlein, C. Riess, and E. Angelopoulou, On rotation invariance in copy-move forgery detection, in Information Forensics and Security (WIFS), 2010 IEEE International Workshop on, 2010, pp. 1-6
-
(2010)
Information Forensics and Security (WIFS 2010 IEEE International Workshop on
, pp. 1-6
-
-
Christlein, V.1
Riess, C.2
Angelopoulou, E.3
-
19
-
-
84929134231
-
Counter-forensics: Attacking image forensics
-
H. T. Sencar and N. Memon, Eds., ed Springer New York
-
R. Böhme and M. Kirchner, Counter-Forensics: Attacking Image Forensics, in Digital Image Forensics, H. T. Sencar and N. Memon, Eds., ed: Springer New York, 2013, pp. 327-366
-
(2013)
Digital Image Forensics
, pp. 327-366
-
-
Böhme, R.1
Kirchner, M.2
|