Region Duplication Detection Using Image Feature Matching
暂无分享,去创建一个
[1] Junfeng He,et al. Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.
[2] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[3] C.G. Patil,et al. Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[4] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[5] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[6] Hany Farid,et al. Photo Fakery and Forensics , 2009, Adv. Comput..
[7] Weihong Wang,et al. Exposing digital forgeries in video by detecting duplication , 2007, MM&Sec.
[8] H.M. Wechsler,et al. Digital image processing, 2nd ed. , 1981, Proceedings of the IEEE.
[9] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[10] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[11] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[12] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[13] Keiichi Abe,et al. Topological structural analysis of digitized binary images by border following , 1985, Comput. Vis. Graph. Image Process..
[14] A. Balakrishnan. Learning Student Models through an Ontology of Learning Strategies , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[15] Aseem Agarwala,et al. Efficient gradient-domain compositing using quadtrees , 2007, ACM Trans. Graph..
[16] Min Wu,et al. Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.
[17] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[18] Hwei-Jen Lin,et al. Fast copy-move forgery detection , 2009 .
[19] Paul Wintz,et al. Digital image processing (2nd ed.) , 1987 .
[20] XiaoBing Kang,et al. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.
[21] Tony Lindeberg,et al. Scale-Space Theory in Computer Vision , 1993, Lecture Notes in Computer Science.
[22] Zeev Farbman,et al. Coordinates for instant image cloning , 2009, ACM Trans. Graph..
[23] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[24] Siwei Lyu,et al. How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.
[25] Yan Ke,et al. PCA-SIFT: a more distinctive representation for local image descriptors , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..
[26] Andrew Zisserman,et al. Multiple View Geometry in Computer Vision (2nd ed) , 2003 .
[27] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[28] Asoke K. Nandi,et al. Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling , 2009, 2009 17th European Signal Processing Conference.
[29] David Letscher,et al. Detecting filtered cloning in digital images , 2007, MM&Sec.
[30] Alin C. Popescu,et al. Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .
[31] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[32] Edoardo Ardizzone,et al. Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis , 2009, ICIAP.
[33] Xunyu Pan,et al. Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[34] Bernhard P. Wrobel,et al. Multiple View Geometry in Computer Vision , 2001 .
[35] Jitendra Malik,et al. A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.
[36] Li Kang,et al. Copy-move forgery detection in digital image , 2010, 2010 3rd International Congress on Image and Signal Processing.
[37] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[38] Luo Wei,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .
[39] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[40] David G. Lowe,et al. Shape indexing using approximate nearest-neighbour search in high-dimensional spaces , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[41] Todor Georgiev. Photoshop Healing Brush : a Tool for Seamless Cloning , 2004 .
[42] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[43] Patrick Pérez,et al. Poisson image editing , 2003, ACM Trans. Graph..
[44] Min Wu,et al. Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images , 2009, IEEE Transactions on Information Forensics and Security.
[45] Jian Sun,et al. Drag-and-drop pasting , 2006, SIGGRAPH 2006.
[46] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[47] Jiwu Huang,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[48] Minglun Gong,et al. An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).
[49] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[50] Alberto Del Bimbo,et al. Geometric tampering estimation by means of a SIFT-based forensic analysis , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[51] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.