Segmentation-Based Image Copy-Move Forgery Detection Scheme
暂无分享,去创建一个
Xingming Sun | Jian Li | Xiaolong Li | Bin Yang | Xingming Sun | Xiaolong Li | Bin Yang | Jian Li
[1] Saiqa Khan,et al. Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform , 2011, ICWET.
[2] Jeff A. Bilmes,et al. A gentle tutorial of the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models , 1998 .
[3] Andrew Zisserman,et al. Multiple View Geometry in Computer Vision (2nd ed) , 2003 .
[4] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[5] Paul J. Besl,et al. A Method for Registration of 3-D Shapes , 1992, IEEE Trans. Pattern Anal. Mach. Intell..
[6] Charless C. Fowlkes,et al. Contour Detection and Hierarchical Image Segmentation , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Pascal Fua,et al. SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Vladimir Itsykson,et al. Clone detection: Why, what and how? , 2010, 2010 6th Central and Eastern European Software Engineering Conference (CEE-SECR).
[9] Christian Riess,et al. On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[10] Hany Farid,et al. Exposing digital forgeries in scientific images , 2006, MM&Sec '06.
[11] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[12] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[13] Edoardo Ardizzone,et al. Copy-move forgery detection via texture description , 2010, MiFor '10.
[14] Alexander M. Bronstein,et al. Partial Similarity of Shapes Using a Statistical Significance Measure , 2009, IPSJ Trans. Comput. Vis. Appl..
[15] Asoke K. Nandi,et al. Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[17] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[18] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[19] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[20] Qi Liu,et al. Implementation of automatic gas monitoring in a domestic energy management system , 2012, IEEE Transactions on Consumer Electronics.
[21] Ahmad Faraahi,et al. DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[22] Pravin Kakar,et al. Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.
[23] Chi-Man Pun,et al. Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies , 2014, TheScientificWorldJournal.
[24] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[25] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[26] Alexander M. Bronstein,et al. Regularized Partial Matching of Rigid Shapes , 2008, ECCV.
[27] Qi Liu,et al. DEHEMS: creating a digital environment for large-scale energy management at homes , 2013, IEEE Transactions on Consumer Electronics.
[28] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[29] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[30] Jiwu Huang,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[31] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[32] Alexander M. Bronstein,et al. Not only size matters: Regularized partial matching of nonrigid shapes , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[33] Cordelia Schmid,et al. A Comparison of Affine Region Detectors , 2005, International Journal of Computer Vision.
[34] Stefano Soatto,et al. Quick Shift and Kernel Methods for Mode Seeking , 2008, ECCV.
[35] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[36] Andrea Vedaldi,et al. Vlfeat: an open and portable library of computer vision algorithms , 2010, ACM Multimedia.
[37] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[38] Jitendra Malik,et al. Learning to detect natural image boundaries using local brightness, color, and texture cues , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.