Image copy–move forgery detection based on sped-up robust features descriptor and adaptive minimal–maximal suppression
暂无分享,去创建一个
[1] Ingemar J. Cox,et al. Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.
[2] Fei Peng,et al. A complete passive blind image copy-move forensics scheme based on compound statistics features. , 2011, Forensic science international.
[3] H. Farid. Seeing is not believing , 2009, IEEE Spectrum.
[4] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[5] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[6] Muhammad Ghulam,et al. Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..
[7] Zoltan Kato,et al. Parametric estimation of affine deformations of planar shapes , 2010, Pattern Recognit..
[8] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[9] Jing-Ming Guo,et al. Duplication forgery detection using improved DAISY descriptor , 2013, Expert Syst. Appl..
[10] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[11] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[12] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[13] Dinu Coltuc,et al. Low distortion transform for reversible watermarking , 2012, IEEE Transactions on Image Processing.
[14] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[15] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[16] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[17] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[18] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[19] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[20] Bogdan-Mihai G. Gavriloaia,et al. Exposing copy-move image tampering using forensic method based on SURF , 2013, Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013.
[21] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[22] Luo Juan,et al. A comparison of SIFT, PCA-SIFT and SURF , 2009 .
[23] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[24] Partha S. Vasisht. Computational Analysis of Microarray Data , 2003 .
[25] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[26] Xingming Sun,et al. An Efficient Forensic Method for Copy – move Forgery Detection Based on DWT-FWHT , 2013 .