A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation
暂无分享,去创建一个
Bo Qin | Fei Zhao | Wenchang Shi | Bin Liang | Bin Liang | Wenchang Shi | Bo Qin | Fei Zhao
[1] David G. Lowe,et al. Shape indexing using approximate nearest-neighbour search in high-dimensional spaces , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[2] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[3] Cordelia Schmid,et al. A Comparison of Affine Region Detectors , 2005, International Journal of Computer Vision.
[4] Mauro Barni,et al. Forensic Analysis of SIFT Keypoint Removal and Injection , 2014, IEEE Transactions on Information Forensics and Security.
[5] Mauro Barni,et al. Removal and injection of keypoints for SIFT-based copy-move counter-forensics , 2013, EURASIP J. Inf. Secur..
[6] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[7] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[8] Mauro Barni,et al. Counter-forensics of SIFT-based copy-move detection by means of keypoint classification , 2013, EURASIP J. Image Video Process..
[9] Qin Bo,et al. Improving image copy-move forgery detection with particle swarm optimization techniques , 2016, China Communications.
[10] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[11] Luc Van Gool,et al. SURF: Speeded Up Robust Features , 2006, ECCV.
[12] James Kennedy,et al. Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.
[13] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[14] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[15] R. Storn,et al. On the usage of differential evolution for function optimization , 1996, Proceedings of North American Fuzzy Information Processing.
[16] Rainer Storn,et al. Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..
[17] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[18] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[19] Russell C. Eberhart,et al. A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.
[20] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[21] Jing-Ming Guo,et al. Duplication forgery detection using improved DAISY descriptor , 2013, Expert Syst. Appl..
[22] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[23] Christian Riess,et al. On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[24] Edoardo Ardizzone,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .
[25] Osamah M. Al-Qershi,et al. Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.
[26] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[27] Xunyu Pan,et al. Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[28] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[29] Dervis Karaboga,et al. AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION , 2005 .