Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor
暂无分享,去创建一个
Muhannad A. Abu-Hashem | Hamid A. Jalab | Abdelrahman Abuarqoub | Diaa M. Uliyan | H. Jalab | Abdelrahman Abuarqoub
[1] Cordelia Schmid,et al. Scale & Affine Invariant Interest Point Detectors , 2004, International Journal of Computer Vision.
[2] Jiwu Huang,et al. A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[3] Michael S. Lew,et al. Interest points based on maximization of distinctiveness , 2008, MIR '08.
[4] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[5] Hany Farid,et al. Digital image forensics. , 2008, Scientific American.
[6] Shao-Yi Chien,et al. Fast image segmentation based on K-Means clustering with histograms in HSV color space , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[7] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[8] Babak Mahdian,et al. Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..
[9] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[10] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[11] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[12] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[13] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[14] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[15] Sun Xingming,et al. DWT-PCA (EVD) Based Copy-move Image Forgery Detection , 2011 .
[16] Tiegang Gao,et al. A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.
[17] Mengjia Xu,et al. Image region duplication detection based on circular window expansion and phase correlation. , 2012, Forensic science international.
[18] Fan Chen,et al. A semi-fragile image watermarking algorithm with two-stage detection , 2012, Multimedia Tools and Applications.
[19] Leonardo Trujillo,et al. Interest point detection through multiobjective genetic programming , 2012, Appl. Soft Comput..
[20] Pravin Kakar,et al. Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.
[21] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[22] Muhammad Ghulam,et al. Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..
[23] Li Fan,et al. Robust Algorithm for Detection of Copy-Move Forgery in Digital Images Based on Ridgelet Transform , 2012, AICI.
[24] Osamah M. Al-Qershi,et al. Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.
[25] Wei Lu,et al. Region duplication detection based on Harris corner points and step sector statistics , 2013, J. Vis. Commun. Image Represent..
[26] Wu-Chih Hu,et al. Boosting Scheme for Detecting Region Duplication Forgery in Digital Images , 2013, ICGEC.
[27] Chandan Singh,et al. Geometrically invariant and high capacity image watermarking scheme using accurate radial transform , 2013 .
[28] Sanjeev Sharma,et al. Region Duplication Forgery Detection Technique Based on SURF and HAC , 2013, TheScientificWorldJournal.
[29] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[30] Saeed Aghabozorgi,et al. Improving RLRN Image Splicing Detection with the Use of PCA and Kernel PCA , 2014, TheScientificWorldJournal.
[31] Sun Xingming,et al. A Survey of Partition-Based Techniques for Copy-Move Forgery Detection , 2014, TheScientificWorldJournal.
[32] Kumar Sunil,et al. DCT-PCA Based Method for Copy-Move Forgery Detection , 2014 .
[33] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[34] Hamid A. Jalab,et al. Copy move image forgery detection using Hessian and center symmetric local binary pattern , 2015, 2015 IEEE Conference on Open Systems (ICOS).
[35] Ainuddin Wahid Abdul Wahab,et al. Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points , 2016, Symmetry.
[36] Ainuddin Wahid Abdul Wahab,et al. A novel forged blurred region detection system for image forensic applications , 2016, Expert Syst. Appl..
[37] KokSheik Wong,et al. Keypoint Based Authentication And Localization Of Copy-Move Forgery In Digital Image , 2017 .