-
1
-
-
27844554394
-
Detection of copy-move forgery in digital images
-
Cleveland, OH, Aug
-
J. Fridrich, D. Soukal, and J. Lukáš, "Detection of copy-move forgery in digital images," in Proc. Digit. Forensic Res. Workshop, Cleveland, OH, Aug. 2003.
-
(2003)
Proc. Digit. Forensic Res. Workshop
-
-
Fridrich, J.1
Soukal, D.2
Lukáš, J.3
-
2
-
-
27844542239
-
-
Dept. Comput. Sci., Dartmouth College, Hanover, NH, USA, Tech. Rep. TR2004-515
-
A. C. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions," Dept. Comput. Sci., Dartmouth College, Hanover, NH, USA, Tech. Rep. TR2004-515, 2004.
-
(2004)
Exposing Digital Forgeries by Detecting Duplicated Image Regions
-
-
Popescu, A.C.1
Farid, H.2
-
3
-
-
34147142845
-
Robust detection of region-duplication forgery in digital image
-
Aug
-
W. Luo, J. Huang, and G. Qiu, "Robust detection of region-duplication forgery in digital image," in Proc. 18th Int. Conf. Pattern Recognit. (ICPR), Aug. 2006, pp. 746-749.
-
(2006)
Proc. 18th Int. Conf. Pattern Recognit. (ICPR)
, pp. 746-749
-
-
Luo, W.1
Huang, J.2
Qiu, G.3
-
4
-
-
58149235809
-
A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
-
Jul
-
G. Li, Q. Wu, D. Tu, and S. Sun, "A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2007, pp. 1750-1753.
-
(2007)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 1750-1753
-
-
Li, G.1
Wu, Q.2
Tu, D.3
Sun, S.4
-
5
-
-
34547689478
-
Detection of copy-move forgery using a method based on blur moment invariants
-
B. Mahdian and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic Sci. Int., vol. 171, nos. 2-3, pp. 180-189, 2007.
-
(2007)
Forensic Sci. Int
, vol.171
, Issue.2-3
, pp. 180-189
-
-
Mahdian, B.1
Saic, S.2
-
6
-
-
79951544608
-
Identifying tampered regions using singular value decomposition in digital image forensics
-
Dec
-
X. B. Kang and S. M. Wei, "Identifying tampered regions using singular value decomposition in digital image forensics," in Proc. Int. Conf. Comput. Sci. Softw. Eng., Dec. 2008, pp. 926-930.
-
(2008)
Proc. Int. Conf. Comput. Sci. Softw. Eng
, pp. 926-930
-
-
Kang, X.B.1
Wei, S.M.2
-
7
-
-
70349199203
-
An efficient and robust method for detecting copy-move forgery
-
Apr
-
S. Bayram, H. T. Sencar, and N. Memon, "An efficient and robust method for detecting copy-move forgery," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Apr. 2009, pp. 1053-1056.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP)
, pp. 1053-1056
-
-
Bayram, S.1
Sencar, H.T.2
Memon, N.3
-
8
-
-
77749279983
-
Detection of image region duplication forgery using model with circle block
-
Nov
-
J. Wang, G. Liu, H. Li, Y. Dai, and Z. Wang, "Detection of image region duplication forgery using model with circle block," in Proc. Int. Conf. Multimedia Inf. Netw. Secur. (MINES), Nov. 2009, pp. 25-29.
-
(2009)
Proc. Int. Conf. Multimedia Inf. Netw. Secur. (MINES)
, pp. 25-29
-
-
Wang, J.1
Liu, G.2
Li, H.3
Dai, Y.4
Wang, Z.5
-
9
-
-
74049111557
-
Fast and robust forensics for image region-duplication forgery
-
J. W. Wang, G. J. Liu, Z. Zhang, Y. W. Dai, and Z. Q. Wang, "Fast and robust forensics for image region-duplication forgery," Acta Automat. Sinica, vol. 35, no. 12, pp. 1488-1495, 2009.
-
(2009)
Acta Automat. Sinica
, vol.35
, Issue.12
, pp. 1488-1495
-
-
Wang, J.W.1
Liu, G.J.2
Zhang, Z.3
Dai, Y.W.4
Wang, Z.Q.5
-
10
-
-
70350023285
-
Fast copy-move forgery detection
-
H. J. Lin, C. W. Wang, and Y. T. Kao, "Fast copy-move forgery detection," WSEAS Trans. Signal Process., vol. 5, no. 5, pp. 188-197, 2009.
-
(2009)
WSEAS Trans. Signal Process
, vol.5
, Issue.5
, pp. 188-197
-
-
Lin, H.J.1
Wang, C.W.2
Kao, Y.T.3
-
11
-
-
78549275481
-
Detection of copy-rotate-move forgery using Zernike moments
-
Berlin, Germany: Springer-Verlag
-
S. J. Ryu, M. J. Lee, and H. K. Lee, "Detection of copy-rotate-move forgery using Zernike moments," in Information Hiding. Berlin, Germany: Springer-Verlag, 2010, pp. 51-65.
-
(2010)
Information Hiding
, pp. 51-65
-
-
Ryu, S.J.1
Lee, M.J.2
Lee, H.K.3
-
12
-
-
84880672623
-
Rotation invariant localization of duplicated image regions based on Zernike moments
-
Aug
-
S. J. Ryu, M. Kirchner, M. J. Lee, and H. K. Lee, "Rotation invariant localization of duplicated image regions based on Zernike moments," IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1355-1370, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.8
, pp. 1355-1370
-
-
Ryu, S.J.1
Kirchner, M.2
Lee, M.J.3
Lee, H.K.4
-
13
-
-
80051645137
-
Exposing duplicated regions affected by reflection, rotation and scaling
-
May
-
S. Bravo-Solorio and A. K. Nandi, "Exposing duplicated regions affected by reflection, rotation and scaling," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), May 2011, pp. 1880-1883.
-
(2011)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP)
, pp. 1880-1883
-
-
Bravo-Solorio, S.1
Nandi, A.K.2
-
14
-
-
63149091707
-
Detection of copy-move forgery in digital images using SIFT algorithm
-
Dec
-
H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Proc. Pacific-Asia Workshop Comput. Intell. Ind. Appl. (PACIIA), Dec. 2008, pp. 272-276.
-
(2008)
Proc. Pacific-Asia Workshop Comput. Intell. Ind. Appl. (PACIIA)
, pp. 272-276
-
-
Huang, H.1
Guo, W.2
Zhang, Y.3
-
15
-
-
78649426066
-
Region duplication detection using image feature matching
-
Dec
-
X. Pan and S. Lyu, "Region duplication detection using image feature matching," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 857-867, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 857-867
-
-
Pan, X.1
Lyu, S.2
-
16
-
-
80051734185
-
A SIFT-based forensic method for copy-move attack detection and transformation recovery
-
Sep
-
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A SIFT-based forensic method for copy-move attack detection and transformation recovery," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 1099-1110, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 1099-1110
-
-
Amerini, I.1
Ballan, L.2
Caldelli, R.3
Del Bimbo, A.4
Serra, G.5
-
17
-
-
78751489569
-
Image copy-move forgery detection based on SURF
-
Nov
-
X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, "Image copy-move forgery detection based on SURF," in Proc. Int. Conf. Multimedia Inf. Netw. Secur. (MINES), Nov. 2010, pp. 889-892.
-
(2010)
Proc. Int. Conf. Multimedia Inf. Netw. Secur. (MINES)
, pp. 889-892
-
-
Bo, X.1
Junwen, W.2
Guangjie, L.3
Yuewei, D.4
-
18
-
-
84861111121
-
Exposing postprocessed copy-paste forgeries through transform-invariant features
-
Jun
-
P. Kakar and N. Sudha, "Exposing postprocessed copy-paste forgeries through transform-invariant features," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1018-1028, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 1018-1028
-
-
Kakar, P.1
Sudha, N.2
-
19
-
-
84870281448
-
Detection of region duplication forgery in digital images using SURF
-
B. L. Shivakumar and S. S. Baboo, "Detection of region duplication forgery in digital images using SURF," IJCSI Int. J. Comput. Sci. Issues, vol. 8, issue 4. no. 1, pp. 199-205, 2011.
-
(2011)
IJCSI Int. J. Comput. Sci. Issues
, vol.8
, Issue.4
, pp. 199-205
-
-
Shivakumar, B.L.1
Baboo, S.S.2
-
20
-
-
0033284915
-
Object recognition from local scale-invariant features
-
Sep
-
D. G. Lowe, "Object recognition from local scale-invariant features," in Proc. 7th IEEE Int. Conf. Comput. Vis., Sep. 1999, pp. 1150-1157.
-
(1999)
Proc. 7th IEEE Int. Conf. Comput. Vis
, pp. 1150-1157
-
-
Lowe, D.G.1
-
21
-
-
33745827782
-
SURF: Speeded up robust features
-
Berlin, Germany: Springer-Verlag
-
H. Bay, T. Tuytelaars, and L. Van Gool, "SURF: Speeded up robust features," in Computer Vision. Berlin, Germany: Springer-Verlag, 2006, pp. 404-417.
-
(2006)
Computer Vision
, pp. 404-417
-
-
Bay, H.1
Tuytelaars, T.2
Van Gool, L.3
-
22
-
-
84870264329
-
An evaluation of popular copy-move forgery detection approaches
-
Dec
-
V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1841-1854, Dec. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.6
, pp. 1841-1854
-
-
Christlein, V.1
Riess, C.2
Jordan, J.3
Riess, C.4
Angelopoulou, E.5
-
23
-
-
84866657764
-
SLIC superpixels compared to state-of-the-art superpixel methods
-
Nov
-
R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Süsstrunk, "SLIC superpixels compared to state-of-the-art superpixel methods," IEEE Trans. Pattern Anal. Mach. Intell., vol. 34, no. 11, pp. 2274-2282, Nov. 2012.
-
(2012)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.34
, Issue.11
, pp. 2274-2282
-
-
Achanta, R.1
Shaji, A.2
Smith, K.3
Lucchi, A.4
Fua, P.5
Süsstrunk, S.6
|