On rotation invariance in copy-move forgery detection
暂无分享,去创建一个
Christian Riess | Elli Angelopoulou | Vincent Christlein | C. Riess | E. Angelopoulou | V. Christlein
[1] Shih-Fu Chang,et al. Passive-blind Image Forensics , 2006 .
[2] Junfeng He,et al. Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.
[3] Alin C. Popescu,et al. Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .
[4] Luc Van Gool,et al. SURF: Speeded Up Robust Features , 2006, ECCV.
[5] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[6] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[7] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[8] Asoke K. Nandi,et al. Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling , 2009, 2009 17th European Signal Processing Conference.
[9] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[10] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[11] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[12] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[13] Md. Khayrul Bashar,et al. Wavelet-Based Multiresolution Features for Detecting Duplications in Images , 2007, MVA.
[14] Luo Wei,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .
[15] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[16] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[17] Jiwu Huang,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[18] Hwei-Jen Lin,et al. Fast copy-move forgery detection , 2009 .
[19] H. Farid. A Survey of Image Forgery Detection , 2008 .
[20] Hongyuan Li,et al. Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[21] Tsuhan Chen,et al. Image authentication by detecting traces of demosaicing , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[22] XiaoBing Kang,et al. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.
[23] Alex ChiChung Kot,et al. Accurate Detection of Demosaicing Regularity for Digital Image Forensics , 2009, IEEE Transactions on Information Forensics and Security.
[24] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[25] Wang Zhi-quan,et al. Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .
[26] Christian Riess,et al. A Study on Features for the Detection of Copy-Move Forgeries , 2010, Sicherheit.
[27] Husrev T. Sencar,et al. Overview of State-of-the-Art in Digital Image Forensics , 2007 .
[28] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[29] Thomas Gloe,et al. Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics , 2010, Electronic Imaging.
[30] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[31] Minglun Gong,et al. An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).
[32] Jiwu Huang,et al. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[33] Christian Riess,et al. Scene Illumination as an Indicator of Image Manipulation , 2010, Information Hiding.