CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection
暂无分享,去创建一个
[1] Gul Muzaffer,et al. A New Copy Move Forgery Detection Method Resistant to Object Removal with Uniform Background Forgery , 2016 .
[2] Sonja Grgic,et al. CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.
[3] Vilas M. Thakare,et al. A Scaling Robust Copy-Paste Tampering Detection for Digital Image Forensics , 2016 .
[4] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[5] Sami Bourouis,et al. Copy-move image forgery detection based on SIFT descriptors and SVD-matching , 2014, 2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[6] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[7] Ainuddin Wahid Abdul Wahab,et al. A novel forged blurred region detection system for image forensic applications , 2016, Expert Syst. Appl..
[8] Chien-Ping Chang,et al. Detection of copy-move image forgery using histogram of orientated gradients , 2015, Inf. Sci..
[9] Qin Bo,et al. Improving image copy-move forgery detection with particle swarm optimization techniques , 2016, China Communications.
[10] Guoqiang Han,et al. Copy-move forgery detection based on multi-radius PCET , 2017, IET Image Process..
[11] Mohammad Farukh Hashmi,et al. Copy move forgery detection using DWT and SIFT features , 2013, 2013 13th International Conference on Intellient Systems Design and Applications.
[12] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[13] Weiyao Lin,et al. Survey on blind image forgery detection , 2013, IET Image Processing.
[14] Muhammad Ghulam,et al. Passive detection of image forgery using DCT and local binary pattern , 2016, Signal, Image and Video Processing.
[15] Zhihua Xia,et al. A copy-move forgery detection method based on CMFD-SIFT , 2016, Multimedia Tools and Applications.
[16] Hao-Chiang Hsu,et al. Detection of copy-move forgery image using Gabor descriptor , 2012, Anti-counterfeiting, Security, and Identification.
[17] S. Kulkarni,et al. Speeding-up SIFT based copy move forgery detection using level set approach , 2014, 2014 International Conference on Advances in Electronics Computers and Communications.
[18] Shinfeng D. Lin,et al. An integrated technique for splicing and copy-move forgery image detection , 2011, 2011 4th International Congress on Image and Signal Processing.
[19] Sotiris B. Kotsiantis,et al. Supervised Machine Learning: A Review of Classification Techniques , 2007, Informatica.
[20] Seniha Ketenci,et al. Copy-move forgery detection in images via 2D-Fourier Transform , 2013, 2013 36th International Conference on Telecommunications and Signal Processing (TSP).
[21] David G. Lowe,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.
[22] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[23] Goo-Rak Kwon,et al. Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection , 2016, Multimedia Tools and Applications.
[24] Balasubramanian Raman,et al. A High Performance Copy-Move Image Forgery Detection Scheme on GPU , 2011, SocProS.
[25] Hong-Ying Yang,et al. Robust copy–move forgery detection using quaternion exponent moments , 2018, Pattern Analysis and Applications.
[26] Kaushal K. Shukla,et al. Passive Copy Move Forgery Detection Using SURF, HOG and SIFT Features , 2014, FICTA.
[27] Edoardo Ardizzone,et al. Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis , 2009, ICIAP.
[28] Yao Zhao,et al. Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and CFA Features , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[29] Yijun Yan,et al. Fusion of block and keypoints based approaches for effective copy-move image forgery detection , 2016, Multidimens. Syst. Signal Process..
[30] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[31] R. S. Shaji,et al. A Study on Segmentation-Based Copy-Move Forgery Detection Using DAISY Descriptor , 2016 .
[32] Wu-Chih Hu,et al. Robustness of copy-move forgery detection under high JPEG compression artifacts , 2015, Multimedia Tools and Applications.
[33] Sun Xingming,et al. A Survey of Partition-Based Techniques for Copy-Move Forgery Detection , 2014, TheScientificWorldJournal.
[34] Stefan Winkler,et al. COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[35] Jing Dong,et al. CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[36] Jichang Guo,et al. Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.
[37] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[38] Andrea Fusiello,et al. T-Linkage: A Continuous Relaxation of J-Linkage for Multi-model Fitting , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[39] Ali Akbar Pouyan,et al. Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.
[40] Qi Meng,et al. Detection of Image Forgery Based on Improved PCA-SIFT , 2014 .
[41] Muhammad Ghulam,et al. Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..
[42] Shih-Fu Chang,et al. A Data Set of Authentic and Spliced Image Blocks , 2004 .
[43] Jung-San Lee,et al. Selective scalable secret image sharing with verification , 2015, Multimedia Tools and Applications.
[44] Fan Yang,et al. Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..
[45] Christian Riess,et al. A Study on Features for the Detection of Copy-Move Forgeries , 2010, Sicherheit.
[46] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[47] Muhammad Ghulam,et al. Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.
[48] Dong ping Tian,et al. A Review on Image Feature Extraction and Representation Techniques , 2013 .
[49] Mohammad Farukh Hashmi,et al. A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods , 2014, ACIIDS.
[50] Ting Zhang,et al. Copy-Move Forgery Detection Based on SVD in Digital Image , 2009, 2009 2nd International Congress on Image and Signal Processing.
[51] Sanjeev Sharma,et al. Region Duplication Forgery Detection Technique Based on SURF and HAC , 2013, TheScientificWorldJournal.
[52] Hong-Yuan Mark Liao,et al. An efficient expanding block algorithm for image copy-move forgery detection , 2013, Inf. Sci..
[53] Hwei-Jen Lin,et al. Fast copy-move forgery detection , 2009 .
[54] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[55] Yong-Dal Shin. Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm , 2016 .
[56] Hamid A. Jalab,et al. Copy move image forgery detection using Hessian and center symmetric local binary pattern , 2015, 2015 IEEE Conference on Open Systems (ICOS).
[57] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[58] Mohammad Farukh Hashmi,et al. Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform , 2014 .
[59] Ainuddin Wahid Abdul Wahab,et al. Copy-move forgery detection: Survey, challenges and future directions , 2016, J. Netw. Comput. Appl..
[60] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[61] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[62] S. Mozaffari,et al. Copy-move forgery detection using multiresolution local binary patterns. , 2013, Forensic science international.
[63] N. Ohnishi,et al. Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[64] XiaoBing Kang,et al. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.
[65] Li Jing,et al. Image Copy-Move Forgery Detecting Based on Local Invariant Feature , 2012, J. Multim..
[66] S. P. Ghrera,et al. Pixel-Based Image Forgery Detection: A Review , 2014 .
[67] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[68] Baina Su,et al. Detection of Copy Forgery in Digital Images Based on LPP-SIFT , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.
[69] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[70] John F. Roddick,et al. An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..
[71] Asoke K. Nandi,et al. Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[72] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[73] Qingzhong Liu,et al. A Novel Approach for Detection of Copy-Move Forgery , 2011 .
[74] Muhammad Ghulam,et al. Improving the detection and localization of duplicated regions in copy-move image forgery , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[75] Q. Ruan,et al. Combined SIFT and bi-coherence features to detect image forgery , 2014, 2014 12th International Conference on Signal Processing (ICSP).
[76] Nenghai Yu,et al. Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.
[77] Mohammad Farukh Hashmi,et al. A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).
[78] G. Bebis,et al. Blind copy move image forgery detection using dyadic undecimated wavelet transform , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[79] Yuenan Li. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.
[80] Wei Lu,et al. Region duplication detection based on Harris corner points and step sector statistics , 2013, J. Vis. Commun. Image Represent..
[81] Hong-Ying Yang,et al. A new keypoint-based copy-move forgery detection for small smooth regions , 2017, Multimedia Tools and Applications.
[82] Musaed Alhussein,et al. Image Tampering Detection Based on Local Texture Descriptor and Extreme Learning Machine , 2016, 2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim).
[83] Bogdan-Mihai G. Gavriloaia,et al. Exposing copy-move image tampering using forensic method based on SURF , 2013, Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013.
[84] Sanjay Kumar Singh,et al. Fast and robust passive copy-move forgery detection using SURF and SIFT image features , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).
[85] C. Shahnaz,et al. A scheme for copy-move forgery detection in digital images based on 2D-DWT , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[86] Edoardo Ardizzone,et al. Copy-move forgery detection via texture description , 2010, MiFor '10.
[87] Ahmad Mahmoudi Aznaveh,et al. Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.
[88] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[89] Muhammad Ghulam,et al. Copy move image forgery detection method using steerable pyramid transform and texture descriptor , 2013, Eurocon 2013.
[90] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[91] Guangqun Zhang,et al. SURF-based Detection of Copy-Move Forgery in Flat Region , 2012 .
[92] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[93] Ahmad Faraahi,et al. DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[94] Edoardo Ardizzone,et al. Detecting multiple copies in tampered images , 2010, 2010 IEEE International Conference on Image Processing.
[95] Vilas M. Thakare,et al. A Survey on Keypoint Based Copy-paste Forgery Detection Techniques , 2016 .
[96] Jun Wang,et al. Copy-move forgery detection based on PHT , 2012, 2012 World Congress on Information and Communication Technologies.
[97] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[98] Gonzalo Pajares,et al. Computational Intelligence in Image Processing 2018 , 2013, Mathematical Problems in Engineering.
[99] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.