Detection of copy-move image forgery based on discrete cosine transform
暂无分享,去创建一个
[1] Ghazali Sulong,et al. Cursive script segmentation with neural confidence , 2011 .
[2] Osamah M. Al-Qershi,et al. Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.
[3] Mohammad Farukh Hashmi,et al. A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods , 2014, ACIIDS.
[4] Nickson M. Karie,et al. Toward a General Ontology for Digital Forensic Disciplines , 2014, Journal of forensic sciences.
[5] J Granty Regina Elwin,et al. Survey on passive methods of image tampering detection , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).
[6] Amjad Rehman,et al. Annotated comparisons of proposed preprocessing techniques for script recognition , 2014, Neural Computing and Applications.
[7] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[8] Amjad Rehman,et al. An Intelligent Fused Approach for Face Recognition , 2013, J. Intell. Syst..
[9] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[10] Linda E. Pinsky,et al. A picture is worth a thousand words , 2000, Journal of General Internal Medicine.
[11] Mznah Al-Rodhaan,et al. Intelligent fuzzy approach for fast fractal image compression , 2014, EURASIP J. Adv. Signal Process..
[12] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[13] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[14] Ghazali Sulong,et al. Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding , 2014, J. Intell. Syst..
[15] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[16] Amjad Rehman,et al. Writers Identification Based on Multiple Windows Features Mining , 2016 .
[17] Garima Mishra,et al. Robust Method for Detection of Copy-Move Forgery in Digital Images , 2017 .
[18] Mznah Al-Rodhaan,et al. Evaluation of Current Documents Image Denoising Techniques: A Comparative Study , 2014, Appl. Artif. Intell..
[19] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[20] Rubiyah Yusof,et al. Image Segmentation Methods and Applications in MRI Brain Images , 2015 .
[21] Rajib Kumar Jha,et al. An Overview of Robust Digital Image Watermarking , 2015 .
[22] Tiegang Gao,et al. A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.
[23] Saiqa Khan,et al. Robust method for detection of copy-move forgery in digital images , 2010, 2010 International Conference on Signal and Image Processing.
[24] Yiannis Kompatsiaris,et al. Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).
[25] Christian Riess,et al. A Study on Features for the Detection of Copy-Move Forgeries , 2010, Sicherheit.
[26] Amjad Rehman,et al. Improved quadtree image segmentation approach to region information , 2014 .
[27] Yan Zhao,et al. Digital Image Manipulation Forensics , 2015 .
[28] Mznah Al-Rodhaan,et al. Vision-Based Sign Language Classification: A Directional Review , 2014 .
[29] Amjad Rehman,et al. Medical Image Segmentation Methods, Algorithms, and Applications , 2014 .
[30] Yan Zhao,et al. Forensic Methods for Detecting Image Manipulation-Copy Move , 2015 .
[31] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[32] H. Bauchner,et al. A picture is worth a thousand words , 2002, BMJ : British Medical Journal.
[33] Amjad Rehman,et al. Digital Watermarking for Images Security using Discrete Slantlet Transform , 2014 .
[34] Amjad Rehman,et al. Evaluation of artificial intelligent techniques to secure information in enterprises , 2012, Artificial Intelligence Review.
[35] Abdullah Bal,et al. An effective detection algorithm for region duplication forgery in digital images , 2016, SPIE Defense + Security.
[36] Chi-Man Pun,et al. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..
[37] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[38] Rehan Ashraf,et al. Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images , 2016 .
[39] C. Mala,et al. Comparative Study of Image Forgery and Copy-Move Techniques , 2012 .
[40] S. B. Dhok,et al. Digital Forensic of JPEG Images , 2014, 2014 Fifth International Conference on Signal and Image Processing.
[41] Amjad Rehman,et al. An overview of interactive wet cloth simulation in virtual reality and serious games , 2018, Comput. methods Biomech. Biomed. Eng. Imaging Vis..
[42] Mznah Al-Rodhaan,et al. An innovative technique for contrast enhancement of computed tomography images using normalized gamma-corrected contrast-limited adaptive histogram equalization , 2015, EURASIP J. Adv. Signal Process..
[43] Kumar Sunil,et al. DCT-PCA Based Method for Copy-Move Forgery Detection , 2014 .
[44] Min Wu,et al. Multimedia forensic hash based on visual words , 2010, 2010 IEEE International Conference on Image Processing.
[45] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[46] R. Belk. Extended Self in a Digital World , 2013 .
[47] T. Saba,et al. Off-line cursive script recognition: current advances, comparisons and remaining problems , 2012, Artificial Intelligence Review.
[48] Amjad Rehman,et al. Features extraction for soccer video semantic analysis: current achievements and remaining issues , 2012, Artificial Intelligence Review.