Copy-move forgery detection using combined features and transitive matching
暂无分享,去创建一个
Wei Lu | Wei Sun | Hanhui Lin | Ke Liu | Zhiyuan Tan | Cong Lin | Xinchao Huang | Wei Sun | Zhiyuan Simon Tan | Wei Lu | Hanhui Lin | Cong Lin | Xinchao Huang | Ke Liu
[1] Wei Lu,et al. Binary image steganalysis based on pixel mesh Markov transition matrix , 2015, J. Vis. Commun. Image Represent..
[2] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[3] Wei Lu,et al. Binary Image Steganalysis Based on Distortion Level Co-occurrence Matrix , 2018 .
[4] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[5] Naixue Xiong,et al. Dynamic propagation characteristics estimation and tracking based on an EM-EKF algorithm in time-variant MIMO channel , 2017, Inf. Sci..
[6] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[7] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[8] Jian-Huang Lai,et al. Region duplication detection based on image segmentation and keypoint contexts , 2017, Multimedia Tools and Applications.
[9] Naixue Xiong,et al. Visual topic discovering, tracking and summarization from social media streams , 2017, Multimedia Tools and Applications.
[10] Jian Weng,et al. Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[11] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[12] Alin C. Popescu,et al. Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .
[13] Naixue Xiong,et al. Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.
[14] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[15] Naixue Xiong,et al. On the throughput-energy tradeoff for data transmission between cloud and mobile devices , 2014, Inf. Sci..
[16] Asoke K. Nandi,et al. Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] Lan Chen,et al. Semantic Link Network-Based Model for Organizing Multimedia Big Data , 2014, IEEE Transactions on Emerging Topics in Computing.
[18] Naixue Xiong,et al. ViMediaNet: an emulation system for interactive multimedia based telepresence services , 2017, The Journal of Supercomputing.
[19] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[20] Wei Lu,et al. Novel steganographic method based on generalized K-distance N-dimensional pixel matching , 2014, Multimedia Tools and Applications.
[21] Pan Lin,et al. Dual-Tree Complex Wavelet Transform and Image Block Residual-Based Multi-Focus Image Fusion in Visual Sensor Networks , 2014, Sensors.
[22] Naixue Xiong,et al. Non-Local Regularized Variational Model for Image Deblurring under Mixed Gaussian-Impulse Noise , 2015 .
[23] Naixue Xiong,et al. Post-cloud computing paradigms: a survey and comparison , 2017 .
[24] Ahmad Faraahi,et al. DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[25] Bill Nelson,et al. Guide to Computer Forensics and Investigations , 2003 .
[26] Xingming Sun,et al. An Efficient Forensic Method for Copy – move Forgery Detection Based on DWT-FWHT , 2013 .
[27] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[28] Jung-San Lee,et al. Selective scalable secret image sharing with verification , 2015, Multimedia Tools and Applications.
[29] Feiniu Yuan,et al. Optimized Multioperator Image Retargeting Based on Perceptual Similarity Measure , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[30] Naixue Xiong,et al. EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing , 2017, Inf. Sci..
[31] Adrien Bartoli,et al. KAZE Features , 2012, ECCV.
[32] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[33] Naixue Xiong,et al. A Novel Objective Quality Assessment for Super-Resolution Images , 2016 .
[34] Wei Lu,et al. Joint image splicing detection in DCT and Contourlet transform domain , 2016, J. Vis. Commun. Image Represent..
[35] Xiaoxia Wan,et al. An improved method for SIFT-based copy-move forgery detection using non-maximum value suppression and optimized J-Linkage , 2017, Signal Process. Image Commun..
[36] Christopher G. Harris,et al. A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.
[37] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[38] Fan Yang,et al. Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..
[39] Pascal Fua,et al. SLIC Superpixels Compared to State-of-the-Art Superpixel Methods , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[40] Wei Lu,et al. Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.
[41] Jian Weng,et al. Multi-Gait Recognition Based on Attribute Discovery , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[42] Christian Riess,et al. On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[43] Hai Jin,et al. Differentially Private Online Learning for Cloud-Based Video Recommendation With Multimedia Big Data in Social Networks , 2015, IEEE Transactions on Multimedia.
[44] Guoqiang Li,et al. Double JPEG compression detection based on block statistics , 2018, Multimedia Tools and Applications.
[45] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[46] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[47] Andrea Vedaldi,et al. Vlfeat: an open and portable library of computer vision algorithms , 2010, ACM Multimedia.
[48] Naixue Xiong,et al. A Game-Based Localized Multi-Objective Topology Control Scheme in Heterogeneous Wireless Networks , 2017, IEEE Access.
[49] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[50] Wei Zhang,et al. A Unified Framework for Street-View Panorama Stitching , 2016, Sensors.
[51] Naixue Xiong,et al. Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks , 2017, Sensors.
[52] Kuang-Ching Wang,et al. Review of Internet of Things (IoT) in Electric Power and Energy Systems , 2018, IEEE Internet of Things Journal.
[53] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[54] Yuenan Li. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.
[55] Wei Lu,et al. Region duplication detection based on Harris corner points and step sector statistics , 2013, J. Vis. Commun. Image Represent..
[56] Wei Lu,et al. Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation , 2016, Signal Process. Image Commun..
[57] L. S. S. Baboo,et al. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[58] Bin Fan,et al. Local Intensity Order Pattern for feature description , 2011, 2011 International Conference on Computer Vision.
[59] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[60] Naixue Xiong,et al. A Pretreatment Workflow Scheduling Approach for Big Data Applications in Multicloud Environments , 2016, IEEE Transactions on Network and Service Management.
[61] Ridong Zhang,et al. Improved Control for Industrial Systems Over Model Uncertainty: A Receding Horizon Expanded State Space Control Approach , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[62] Fei Xue,et al. Natural image deblurring based on L0-regularization and kernel shape optimization , 2018, Multimedia Tools and Applications.
[63] Guoqiang Li,et al. Digital image splicing detection based on Markov features in block DWT domain , 2018, Multimedia Tools and Applications.
[64] Ainuddin Wahid Abdul Wahab,et al. SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack , 2017, J. Vis. Commun. Image Represent..
[65] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[66] Anderson Rocha,et al. Behavior Knowledge Space-Based Fusion for Copy–Move Forgery Detection , 2016, IEEE Transactions on Image Processing.
[67] Shiguo Lian,et al. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.
[68] Shiguo Lian,et al. A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..
[69] Naixue Xiong,et al. Effective Alternating Direction Optimization Methods for Sparsity-Constrained Blind Image Deblurring , 2017, Sensors.
[70] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[71] Di Wu,et al. Non-Convex Total Generalized Variation with Spatially Adaptive Regularization Parameters for Edge-Preserving Image Restoration , 2016 .
[72] Jie Li,et al. Blind image motion deblurring with L0-regularized priors , 2016, J. Vis. Commun. Image Represent..
[73] Lars Rosgaard Jensen,et al. Influence of functionalization on the structural and mechanical properties of graphene , 2017 .
[74] Naixue Xiong,et al. A novel self-tuning feedback controller for active queue management supporting TCP flows , 2010, Inf. Sci..
[75] Jian Weng,et al. Steganalysis of content-adaptive binary image data hiding , 2017, J. Vis. Commun. Image Represent..
[76] Naixue Xiong,et al. Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems , 2015, Cluster Computing.
[77] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[78] N. Ohnishi,et al. Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[79] Naixue Xiong,et al. A Kernel-Based Compressive Sensing Approach for Mobile Data Gathering in Wireless Sensor Network Systems , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[80] Naixue Xiong,et al. A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[81] Jialiang Chen,et al. Binary image steganalysis based on local texture pattern , 2018, J. Vis. Commun. Image Represent..
[82] P. Rakesh Kumar,et al. Image Forgery Detection Using Adaptive Over Segmentation and Feature Point Matching , 2016 .
[83] Chien-Ping Chang,et al. Detection of copy-move image forgery using histogram of orientated gradients , 2015, Inf. Sci..
[84] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[85] Jian Weng,et al. Multiple Watermarking Using Multilevel Quantization Index Modulation , 2016, IWDW.
[86] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[87] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[88] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[89] Fan Yang,et al. Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching , 2017, Multimedia Tools and Applications.
[90] Xiangyang Luo,et al. Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[91] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .