A hybrid copy-move image forgery detection technique based on Fourier-Mellin and scale invariant feature transforms
暂无分享,去创建一个
[1] Yanfen Gan,et al. Detection of copy–move forgery using discrete analytical Fourier–Mellin transform , 2016 .
[2] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[3] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[4] Amit Kumar Singh,et al. Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications , 2017, Multimedia Tools and Applications.
[5] Yuenan Li. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.
[6] Qi Han,et al. Feature point-based copy-move forgery detection: covering the non-textured areas , 2014, Multimedia Tools and Applications.
[7] Hong-Ying Yang,et al. A new keypoint-based copy-move forgery detection for small smooth regions , 2017, Multimedia Tools and Applications.
[8] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[9] Zhi Zhang,et al. A Survey on Passive Image Copy-Move Forgery Detection , 2018, J. Inf. Process. Syst..
[10] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[11] Vipin Tyagi,et al. Understanding Digital Image Processing , 2018 .
[12] Vipin Tyagi,et al. A copy-move image forgery detection technique based on Gaussian-Hermite moments , 2019, Multimedia Tools and Applications.
[13] Davide Cozzolino,et al. Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[14] S. P. Ghrera,et al. Pixel-Based Image Forgery Detection: A Review , 2014 .
[15] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[16] Pravin Kakar,et al. Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.
[17] I. Elishakoff,et al. Antioptimization of earthquake exitation and response , 1998 .
[18] Yong-Dal Shin. Fast Detection of Copy-Move Forgery Image using DCT , 2013 .
[19] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[20] N. Ohnishi,et al. Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[21] Vipin Tyagi,et al. Image Forgery Detection: Survey and Future Directions , 2019, Data, Engineering and Applications.
[22] Zhi Zhang,et al. Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors , 2017, KSII Trans. Internet Inf. Syst..
[23] Hongli Zhang,et al. Two‐stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images , 2018, Journal of forensic sciences.
[24] Vipin Tyagi,et al. Methods to Distinguish Photorealistic Computer Generated Images from Photographic Images: A Review , 2019, ICACDS.
[25] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[26] Prabir Bhattacharya,et al. Video watermarking using wavelet transform and tensor algebra , 2010, Signal Image Video Process..
[27] Prabir Bhattacharya,et al. MPEG Video Watermarking Using Tensor Singular Value Decomposition , 2007, ICIAR.
[28] Qi Han,et al. PCET based copy-move forgery detection in images under geometric transforms , 2015, Multimedia Tools and Applications.
[29] Ainuddin Wahid Abdul Wahab,et al. Copy-move forgery detection: Survey, challenges and future directions , 2016, J. Netw. Comput. Appl..
[30] Xinpeng Zhang,et al. Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images , 2011, IEEE Signal Processing Letters.
[31] Xinghua Li,et al. Image tamper detection algorithm based on Radon and Fourier-Mellin transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[32] Edoardo Ardizzone,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .
[33] Jie Zhao,et al. Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns , 2013 .
[34] Muhammad Ghulam,et al. Accurate and robust localization of duplicated region in copy–move image forgery , 2014, Machine Vision and Applications.
[35] Qingtang Su,et al. Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection , 2018, IEEE Access.
[36] Fan Yang,et al. Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..
[37] Panpan Niu,et al. Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching , 2018, Multimedia Tools and Applications.
[38] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[39] Dharmendar Sharma,et al. Enhancing information retrieval efficiency using semantic-based-combined-similarity-measure , 2011, 2011 International Conference on Image Information Processing.
[40] Hanqing Lu,et al. BundleNet: Learning with Noisy Label via Sample Correlations , 2018, IEEE Access.
[41] Panpan Niu,et al. A new keypoint-based copy-move forgery detection for color image , 2018, Applied Intelligence.
[42] Wu-Chih Hu,et al. Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes , 2015, Multimedia Tools and Applications.
[43] Ahmad Mahmoudi Aznaveh,et al. Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.