Robust copy-move image forgery detection using undecimated wavelets and Zernike moments
暂无分享,去创建一个
M. Shamim Hossain | Muhammad Ghulam | Muhammad Ghulam | M. S. Hossain | Ghulam Muhammad | Shamim Hossain
[1] Zhengding Qiu,et al. Multipurpose Watermarking Based on Multiscale Curvelet Transform , 2008, IEEE Transactions on Information Forensics and Security.
[2] Wei Lu,et al. Digital image forensics using statistical features and neural network classifier , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[3] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[4] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[5] G. Bebis,et al. Blind copy move image forgery detection using dyadic undecimated wavelet transform , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[6] Babak Mahdian,et al. Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..
[7] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[8] Nasir D. Memon,et al. Tamper Detection Based on Regularity of Wavelet Transform Coefficients , 2007, 2007 IEEE International Conference on Image Processing.
[9] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[10] R. Mukundan,et al. Moment Functions in Image Analysis: Theory and Applications , 1998 .
[11] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[12] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[13] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[14] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[15] Martin F. H. Schuurmans,et al. Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.
[16] Jean-Luc Dugelay,et al. A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..
[17] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[18] Stéphane Mallat,et al. Characterization of Signals from Multiscale Edges , 2011, IEEE Trans. Pattern Anal. Mach. Intell..
[19] Ming-Kuei Hu,et al. Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.
[20] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[21] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[22] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.