A survey on image tampering and its detection in real-world photos
暂无分享,去创建一个
[1] Muhammad Ghulam,et al. Splicing image forgery detection based on DCT and Local Binary Pattern , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[2] Jiwu Huang,et al. Image Forgery Localization via Integrating Tampering Possibility Maps , 2017, IEEE Transactions on Information Forensics and Security.
[3] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[4] Hany Farid,et al. Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[5] Andrea Fusiello,et al. Robust Multiple Structures Estimation with J-Linkage , 2008, ECCV.
[6] Ying Zhang,et al. Automated face swapping and its detection , 2017, 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP).
[7] Jiwu Huang,et al. Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.
[8] Yong Ho Moon,et al. Image splicing detection based on inter-scale 2D joint characteristic function moments in wavelet domain , 2016, EURASIP J. Image Video Process..
[9] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[10] Christine Fernandez-Maloigne,et al. Image splicing detection with local illumination estimation , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[11] Xunyu Pan,et al. Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[12] Hongyuan Li,et al. Image Forgery Forensics Based on Manual Blurred Edge Detection , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[13] Andrea Fusiello,et al. T-Linkage: A Continuous Relaxation of J-Linkage for Multi-model Fitting , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[14] Anderson Rocha,et al. Behavior Knowledge Space-Based Fusion for Copy–Move Forgery Detection , 2016, IEEE Transactions on Image Processing.
[15] Roberto Caldelli,et al. Splicing forgeries localization through the use of first digit features , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[16] Bo Su,et al. Enhanced state selection Markov model for image splicing detection , 2014, EURASIP J. Wirel. Commun. Netw..
[17] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[18] Shih-Fu Chang,et al. Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection , 2010, IEEE Transactions on Information Forensics and Security.
[19] Manuel Menezes de Oliveira Neto,et al. Image forgery detection confronts image composition , 2017, Comput. Graph..
[20] Junfeng He,et al. Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.
[21] Davide Cozzolino,et al. Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[22] Luisa Verdoliva,et al. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.
[23] Chien-Ping Chang,et al. Detection of copy-move image forgery using histogram of orientated gradients , 2015, Inf. Sci..
[24] Davide Cozzolino,et al. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[25] Davide Cozzolino,et al. Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[26] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[27] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[28] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[29] El-Sayed M. El-Alfy,et al. Combining spatial and DCT based Markov features for enhanced blind detection of image splicing , 2014, Pattern Analysis and Applications.
[30] Yiannis Kompatsiaris,et al. Large-scale evaluation of splicing localization algorithms for web images , 2017, Multimedia Tools and Applications.
[31] Mauro Barni,et al. Counter-forensics of SIFT-based copy-move detection by means of keypoint classification , 2013, EURASIP J. Image Video Process..
[32] Wei Su,et al. Steganalysis Versus Splicing Detection , 2008, IWDW.
[33] Alessandro Piva,et al. Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[34] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[35] Mauro Barni,et al. A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.
[36] Jing Dong,et al. Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.
[37] Wen Zhang,et al. Smartphone Photography in Urban China , 2017 .
[38] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[39] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[40] David G. Lowe,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.
[41] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[42] Kimberley A. Wade,et al. Can people identify original and manipulated photos of real-world scenes? , 2017, Cognitive Research: Principles and Implications.
[43] Andrew C. Gallagher. Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).
[44] Hongtao Lu,et al. Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..
[45] Sonja Grgic,et al. CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.
[46] Davide Cozzolino,et al. Detection of GAN-Generated Fake Images over Social Networks , 2018, 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
[47] S. Govindarajulu,et al. A Comparison of SIFT, PCA-SIFT and SURF , 2012 .
[48] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[49] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[50] Wang Zhi-quan,et al. Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .
[51] Z. Jane Wang,et al. Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.
[52] Rainer Böhme,et al. The Dresden Image Database for Benchmarking Digital Image Forensics , 2010, J. Digit. Forensic Pract..
[53] Muhammad Ghulam,et al. Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors , 2015, Int. J. Artif. Intell. Tools.
[54] Luis Mateus Rocha,et al. Singular value decomposition and principal component analysis , 2003 .
[55] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[56] Jan Flusser,et al. Degraded Image Analysis: An Invariant Approach , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[57] Luc Van Gool,et al. SURF: Speeded Up Robust Features , 2006, ECCV.
[58] Shih-Fu Chang,et al. A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[59] Cong Geng,et al. Face recognition using sift features , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[60] Yun Q. Shi,et al. A natural image model approach to splicing detection , 2007, MM&Sec.
[61] Azeddine Beghdadi,et al. Blind inpainting forgery detection , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[62] Christine Guillemot,et al. Image Inpainting : Overview and Recent Advances , 2014, IEEE Signal Processing Magazine.
[63] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[64] Jing Dong,et al. Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[65] Adam Finkelstein,et al. PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, SIGGRAPH 2009.
[66] K. Sitara,et al. Digital video tampering detection: An overview of passive techniques , 2016, Digit. Investig..
[67] Yan Ke,et al. PCA-SIFT: a more distinctive representation for local image descriptors , 2004, CVPR 2004.
[68] Christian Riess,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2013, IEEE Transactions on Information Forensics and Security.
[69] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[70] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[71] Mauro Barni,et al. Removal and injection of keypoints for SIFT-based copy-move counter-forensics , 2013, EURASIP J. Inf. Secur..
[72] Patrick Pérez,et al. Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.
[73] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[74] Jing Dong,et al. Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[75] Jiwu Huang,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[76] P. Langley. Intelligent Behavior in Humans and Machines , 2012 .
[77] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[78] Paolo Bestagini,et al. Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks , 2017, J. Vis. Commun. Image Represent..
[79] C.G. Patil,et al. Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[80] Jonathan Goh,et al. A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection , 2015, Int. J. Electron. Secur. Digit. Forensics.
[81] Ming-Kuei Hu,et al. Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.
[82] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[83] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[84] Muhammad Ghulam,et al. Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.
[85] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[86] Hong-Yuan Mark Liao,et al. An efficient expanding block algorithm for image copy-move forgery detection , 2013, Inf. Sci..
[87] Davide Cozzolino,et al. Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[88] Yiming Pi,et al. Image-splicing forgery detection based on local binary patterns of DCT coefficients , 2015, Secur. Commun. Networks.
[89] Tsuhan Chen,et al. Image authentication by detecting traces of demosaicing , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[90] Jiwu Huang,et al. Localization of Diffusion-Based Inpainting in Digital Images , 2017, IEEE Transactions on Information Forensics and Security.
[91] Can Chen,et al. Image Splicing Detection via Camera Response Function Analysis , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[92] XiaoBing Kang,et al. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.
[93] Xingming Sun,et al. A robust forgery detection algorithm for object removal by exemplar-based image inpainting , 2017, Multimedia Tools and Applications.
[94] Yong Ho Moon,et al. Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion , 2016, J. Electronic Imaging.
[95] Jing Dong,et al. Optimized 3D Lighting Environment Estimation for Image Forgery Detection , 2017, IEEE Transactions on Information Forensics and Security.
[96] B. S. Manjunath,et al. Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[97] John F. Roddick,et al. An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..
[98] Asoke K. Nandi,et al. Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[99] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[100] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[101] Adobe Creative Team. Adobe Photoshop CC Classroom in a Book , 2013 .
[102] Muhammad Ghulam,et al. Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..
[103] I-Cheng Chang,et al. A forgery detection algorithm for exemplar-based inpainting images using multi-region relation , 2013, Image Vis. Comput..
[104] Juan E. Gilbert,et al. Human Trust Factors in Image Analysis , 2018, Advances in Human Error, Reliability, Resilience, and Performance.
[105] A. Piva. An Overview on Image Forensics , 2013 .
[106] Wei Su,et al. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.
[107] Paolo Bestagini,et al. Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[108] Jianhua Li,et al. Passive Image-Splicing Detection by a 2-D Noncausal Markov Model , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[109] Manuel Menezes de Oliveira Neto,et al. Humans are easily fooled by digital images , 2017, Comput. Graph..
[110] Jiwu Huang,et al. Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.
[111] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[112] Muhammad Ghulam,et al. Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors , 2013, Int. J. Artif. Intell. Tools.
[113] Edoardo Ardizzone,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .
[114] Alex ChiChung Kot,et al. Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.
[115] Jing Zhang,et al. A new approach merging markov and DCT features for image splicing detection , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[116] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[117] Saeed Aghabozorgi,et al. Improving RLRN Image Splicing Detection with the Use of PCA and Kernel PCA , 2014, TheScientificWorldJournal.
[118] James F. O'Brien,et al. Exposing photo manipulation with inconsistent shadows , 2013, TOGS.
[119] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[120] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[121] Shih-Fu Chang,et al. Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[122] Yu Chen,et al. An Improved Double Compression Detection Method for JPEG Image Forensics , 2012, 2012 IEEE International Symposium on Multimedia.
[123] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[124] Qing Wang,et al. Double JPEG compression forensics based on a convolutional neural network , 2016, EURASIP J. Inf. Secur..
[125] B. Rotman. Becoming beside ourselves , 2008 .
[126] Stefan Winkler,et al. COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[127] Anderson Rocha,et al. Image Splicing Detection Through Illumination Inconsistencies and Deep Learning , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[128] Gilbert L. Peterson. Forensic Analysis of Digital Image Tampering , 2005, IFIP Int. Conf. Digital Forensics.
[129] Jing Dong,et al. CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[130] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[131] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[132] Jichang Guo,et al. Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.
[133] Ying Zhang,et al. Image Region Forgery Detection: A Deep Learning Approach , 2016, SG-CRC.
[134] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[135] Philipp Koehn,et al. Statistical Significance Tests for Machine Translation Evaluation , 2004, EMNLP.
[136] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[137] Hongyuan Li,et al. Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[138] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[139] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[140] Ahmad Mahmoudi Aznaveh,et al. Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.
[141] Jing Dong,et al. A Survey of Passive Image Tampering Detection , 2009, IWDW.
[142] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[143] Sebastiano Battiato,et al. Multimedia Forensics: discovering the history of multimedia contents , 2016, CompSysTech.
[144] Jing Dong,et al. Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.
[145] Qiong Wu,et al. Detection of digital doctoring in exemplar-based inpainted images , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[146] Jessica J. Fridrich,et al. On detection of median filtering in digital images , 2010, Electronic Imaging.
[147] Tao Jing,et al. Image splicing detection based on moment features and Hilbert-Huang Transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[148] Michael Riegler,et al. A Crowdsourced Data Set of Edited Images Online , 2014, CrowdMM '14.
[149] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[150] Xuemin Wu,et al. Image Splicing Detection Using Illuminant Color Inconsistency , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[151] N. Ohnishi,et al. Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[152] Mohamed Deriche,et al. A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..
[153] Paolo Bestagini,et al. First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.
[154] Miao Liao,et al. Detection of tampered region for JPEG images by using mode-based first digit features , 2012, EURASIP J. Adv. Signal Process..
[155] Bin Li,et al. Copy-move forgery detection in the presence of similar but genuine objects , 2017, 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP).
[156] Wei Su,et al. Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.
[157] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[158] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[159] Jing Dong,et al. Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise , 2010, IWDW.
[160] Soo-Chang Pei,et al. Detecting digital tampering by blur estimation , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).
[161] A. De Rosa,et al. Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[162] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[163] Yiannis Kompatsiaris,et al. Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[164] Rongrong Wang,et al. Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[165] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[166] Hwei-Jen Lin,et al. Fast copy-move forgery detection , 2009 .
[167] Miao Liao,et al. Tampered region detection of inpainting JPEG images , 2013 .
[168] Zaoshan Liang,et al. An efficient forgery detection algorithm for object removal by exemplar-based image inpainting , 2015, J. Vis. Commun. Image Represent..
[169] Guillermo Sapiro,et al. Image inpainting , 2000, SIGGRAPH.
[170] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[171] Paolo Bestagini,et al. Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[172] Wei Lu,et al. Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..
[173] K. Vijayalakshmi,et al. Digital image forgery detection and estimation by exploring basic image manipulations , 2012, Digit. Investig..
[174] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[175] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .