Behavior Knowledge Space-Based Fusion for Copy–Move Forgery Detection
暂无分享,去创建一个
Anderson Rocha | Jefersson Alex dos Santos | Anselmo Ferreira | John E. Vargas-Muñoz | Siovani C. Felipussi | Carlos Alfaro | Pablo Fonseca | John E. Vargas-Munoz | A. Rocha | J. A. D. Santos | S. Felipussi | Anselmo Ferreira | Pablo Fonseca | Carlos Alfaro
[1] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[2] Zhiquan Wang,et al. Fast and Robust Forensics for Image Region-duplication Forgery: Fast and Robust Forensics for Image Region-duplication Forgery , 2010 .
[3] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[4] Hongyuan Li,et al. Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[5] M. Friedman. The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .
[6] Adam Finkelstein,et al. PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, SIGGRAPH 2009.
[7] Edoardo Ardizzone,et al. Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis , 2009, ICIAP.
[8] Thomas G. Dietterich. Approximate Statistical Tests for Comparing Supervised Classification Learning Algorithms , 1998, Neural Computation.
[9] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[10] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[11] N. Ohnishi,et al. Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[12] Bernhard Schölkopf,et al. A tutorial on support vector regression , 2004, Stat. Comput..
[13] Asoke K. Nandi,et al. Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[14] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[15] Ching Y. Suen,et al. A Method of Combining Multiple Experts for the Recognition of Unconstrained Handwritten Numerals , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[17] F. Wilcoxon. Individual Comparisons by Ranking Methods , 1945 .
[18] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[19] Y. Benjamini,et al. THE CONTROL OF THE FALSE DISCOVERY RATE IN MULTIPLE TESTING UNDER DEPENDENCY , 2001 .
[20] Wang Zhi-quan,et al. Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .
[21] Senén Barro,et al. Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..
[22] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[23] Alin C. Popescu,et al. Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .
[24] S. Holm. A Simple Sequentially Rejective Multiple Test Procedure , 1979 .
[25] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[26] Xunyu Pan,et al. Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[27] Noura A. Semary,et al. Copy-rotate-move forgery detection based on spatial domain , 2014, 2014 9th International Conference on Computer Engineering & Systems (ICCES).
[28] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[30] Davide Cozzolino,et al. Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[31] L. S. S. Baboo,et al. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[32] Noura A. Semary,et al. A proposed accelerated image copy-move forgery detection , 2014, 2014 IEEE Visual Communications and Image Processing Conference.
[33] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[34] Jing Zhang,et al. A new approach for detecting Copy-Move forgery in digital images , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[35] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[36] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[37] Jen-Chun Lee,et al. An Efficient Detection Algorithm for Copy-Move Forgery , 2015, 2015 10th Asia Joint Conference on Information Security.
[38] O. J. Dunn. Estimation of the Medians for Dependent Variables , 1959 .
[39] Adam Krzyżak,et al. Methods of combining multiple classifiers and their applications to handwriting recognition , 1992, IEEE Trans. Syst. Man Cybern..
[40] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[41] XiaoBing Kang,et al. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.
[42] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[43] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[44] Adam Finkelstein,et al. The Generalized PatchMatch Correspondence Algorithm , 2010, ECCV.
[45] Edoardo Ardizzone,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .
[46] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[47] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[48] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[49] Hwei-Jen Lin,et al. Fast copy-move forgery detection , 2009 .