A bibliography of pixel-based blind image forgery detection techniques
暂无分享,去创建一个
[1] K. J. Ray Liu,et al. Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.
[2] Muhammad Ghulam,et al. Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.
[3] K. J. Ray Liu,et al. Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.
[4] Davide Cozzolino,et al. Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[5] Wei Weimin,et al. Notice of RetractionEstimation of rescaling factor and detection of image splicing , 2008, 2008 11th IEEE International Conference on Communication Technology.
[6] Babak Mahdian,et al. A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..
[7] Yao Zhao,et al. Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.
[8] Hao-Chiang Hsu,et al. Detection of copy-move forgery image using Gabor descriptor , 2012, Anti-counterfeiting, Security, and Identification.
[9] Zaoshan Liang,et al. An efficient forgery detection algorithm for object removal by exemplar-based image inpainting , 2015, J. Vis. Commun. Image Represent..
[10] Thirapiroon Thongkamwitoon,et al. An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles , 2015, IEEE Transactions on Information Forensics and Security.
[11] Jason Weston,et al. Gene Selection for Cancer Classification using Support Vector Machines , 2002, Machine Learning.
[12] Rainer Böhme,et al. Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.
[13] Liu Guang-jie,et al. Robust forensics for image regional duplication and forgery based on DWT and Zernike moment , 2009 .
[14] Ting Zhang,et al. Copy-Move Forgery Detection Based on SVD in Digital Image , 2009, 2009 2nd International Congress on Image and Signal Processing.
[15] Yao Zhao,et al. Forensic detection of median filtering in digital images , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[16] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[17] Stefano Tubaro,et al. Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.
[18] Pier Luigi Dragotti,et al. An investigation into aliasing in images recaptured from an LCD monitor using a digital camera , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[19] Vivek Kumar Singh. Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method , 2011 .
[20] XiaoBing Kang,et al. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.
[21] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[22] Saiqa Khan,et al. Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform , 2010 .
[23] K. J. Ray Liu,et al. Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[24] Zhang Xiong,et al. JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.
[25] Weiyao Lin,et al. Survey on blind image forgery detection , 2013, IET Image Processing.
[26] John F. Roddick,et al. An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..
[27] Asoke K. Nandi,et al. Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[28] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[29] Yun Q. Shi,et al. A natural image model approach to splicing detection , 2007, MM&Sec.
[30] Azeddine Beghdadi,et al. Blind inpainting forgery detection , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[31] David Vazquez-Padin,et al. Prefilter design for forensic resampling estimation , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[32] Ahmad Faraahi,et al. DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[33] Rainer Böhme,et al. Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.
[34] Wei Su,et al. Rake transform and edge statistics for image forgery detection , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[35] Yao Zhao,et al. Forensic estimation of gamma correction in digital images , 2010, 2010 IEEE International Conference on Image Processing.
[36] M. Shamim Hossain,et al. Robust copy-move image forgery detection using undecimated wavelets and Zernike moments , 2011, ICIMCS '11.
[37] Luisa Verdoliva,et al. PRNU-based forgery detection with regularity constraints and global optimization , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[38] FanZhigang,et al. Identification of bitmap compression history , 2003 .
[39] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[40] Jing Dong,et al. Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.
[41] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[42] Alpana A. Borse,et al. Exploring Duplicated Regions in Natural Images , 2012 .
[43] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[44] Stefano Tubaro,et al. Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.
[45] Andrew C. Gallagher. Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).
[46] Gaobo Yang,et al. Anti-Forensics for Unsharp Masking Sharpening in Digital Images , 2013, Int. J. Digit. Crime Forensics.
[47] Zhang Xiong,et al. A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[48] Shiguo Lian,et al. A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..
[49] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[50] Babak Mahdian,et al. Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics , 2008, 2008 International Conference on Computational Sciences and Its Applications.
[51] Babak Mahdian,et al. On Periodic Properties of Interpolation and Their Application To Image Authentication , 2007 .
[52] Jessica J. Fridrich,et al. On detection of median filtering in digital images , 2010, Electronic Imaging.
[53] Nenghai Yu,et al. Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.
[54] Matthias Kirchner,et al. Linear row and column predictors for the analysis of resized images , 2010, MM&Sec '10.
[55] Tao Jing,et al. Image splicing detection based on moment features and Hilbert-Huang Transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[56] Hai-Dong Yuan. Identification of global histogram equalization by modeling gray-level cumulative distribution , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[57] Korris Fu-Lai Chung,et al. Revealing digital fakery using multiresolution decomposition and higher order statistics , 2011, Eng. Appl. Artif. Intell..
[58] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[59] Matthias Kirchner,et al. Spectral methods to determine the exact scaling factor of resampled digital images , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.
[60] Asoke K. Nandi,et al. Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics , 2011, Signal Process..
[61] Xunyu Pan,et al. Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[62] Mohamadian Zahra. Image Duplication Forgery Detection using Two Robust Features , 2012 .
[63] Fernando Pérez-González,et al. Multiple JPEG compression detection by means of Benford-Fourier coefficients , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[64] Babak Mahdian,et al. A cyclostationarity analysis applied to image forensics , 2009, 2009 Workshop on Applications of Computer Vision (WACV).
[65] B L Shivakumar,et al. Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors , 2011 .
[66] Alex ChiChung Kot,et al. Splicing detection in out-of-focus blurred images , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[67] Nasir D. Memon,et al. Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.
[68] Yao Zhao,et al. Forensic detection of noise addition in digital images , 2014, J. Electronic Imaging.
[69] Yiming Pi,et al. Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients , 2012 .
[70] Muhammad Ghulam,et al. Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors , 2015, Int. J. Artif. Intell. Tools.
[71] Shih-Fu Chang,et al. A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[72] Hongtao Lu,et al. Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..
[73] Yun Q. Shi,et al. Edge Perpendicular Binary Coding for USM Sharpening Detection , 2015, IEEE Signal Processing Letters.
[74] Hany Farid,et al. Detecting Photographic Composites of People , 2008, IWDW.
[75] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[76] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[77] Edoardo Ardizzone,et al. Copy-move forgery detection via texture description , 2010, MiFor '10.
[78] Paul Lester. Photojournalism: An Ethical Approach/MacIntosh Disk and Workbook , 1991 .
[79] Paul Martin Lester,et al. Photojournalism: An Ethical Approach , 1991 .
[80] Roberto Caldelli,et al. Splicing forgeries localization through the use of first digit features , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[81] Rainer Böhme,et al. Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.
[82] Mauro Barni,et al. Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.
[83] Yong-In Yun,et al. A new estimation approach of resampling factors using threshold-based peak detection , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[84] Muhammad Ghulam,et al. Splicing image forgery detection based on DCT and Local Binary Pattern , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[85] Bin Li,et al. Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[86] El-Sayed M. El-Alfy,et al. Combining spatial and DCT based Markov features for enhanced blind detection of image splicing , 2014, Pattern Analysis and Applications.
[87] Eero P. Simoncelli,et al. On Advances in Statistical Modeling of Natural Images , 2004, Journal of Mathematical Imaging and Vision.
[88] Fernando Pérez-González,et al. On the role of differentiation for resampling detection , 2010, 2010 IEEE International Conference on Image Processing.
[89] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[90] S. Prasad,et al. On Resampling Detection and its Application to Detect Image Tampering , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[91] Hamid Abdulla Jallb Al-Tulea. Improving RLRN Image Splicing Detection with the Use of PCA and Kernel PCA , 2014 .
[92] Yun Q. Shi,et al. A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern , 2013, IWDW.
[93] Pier Luigi Dragotti,et al. Modelling radial distortion chains for video recapture detection , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).
[94] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[95] Jing Zhang,et al. A new approach for detecting Copy-Move forgery in digital images , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[96] Stefano Tubaro,et al. The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[97] Min Wu,et al. Information Forensics: An Overview of the First Decade , 2013, IEEE Access.
[98] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[99] Mohamed Deriche,et al. An Image Quality Index Based on Mutual Information and Neural Networks , 2013, Arabian Journal for Science and Engineering.
[100] Adam Finkelstein,et al. PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, SIGGRAPH 2009.
[101] Yuenan Li. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.
[102] K. J. Ray Liu,et al. Forensic estimation and reconstruction of a contrast enhancement mapping , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[103] H. Farid. Image Forgery Detection -- A survey , 2009 .
[104] Yan Ke,et al. PCA-SIFT: a more distinctive representation for local image descriptors , 2004, CVPR 2004.
[105] N. Sudha,et al. Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur , 2011, IEEE Transactions on Multimedia.
[106] Alberto Del Bimbo,et al. Geometric tampering estimation by means of a SIFT-based forensic analysis , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[107] Jiwu Huang,et al. Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.
[108] Muhammad Ghulam,et al. Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..
[109] I-Cheng Chang,et al. A forgery detection algorithm for exemplar-based inpainting images using multi-region relation , 2013, Image Vis. Comput..
[110] Shih-Fu Chang,et al. A Data Set of Authentic and Spliced Image Blocks , 2004 .
[111] A. Dantcheva. Female facial aesthetics based on soft biometrics and photo-quality , 2011 .
[112] Hany Farid,et al. A perceptual metric for photo retouching , 2011, Proceedings of the National Academy of Sciences.
[113] Hai-Dong Yuan,et al. Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.
[114] Hwei-Jen Lin,et al. Fast copy-move forgery detection , 2009 .
[115] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[116] Stefano Tubaro,et al. Discriminating multiple JPEG compressions using first digit features , 2012, APSIPA Transactions on Signal and Information Processing.
[117] Miao Liao,et al. Tampered region detection of inpainting JPEG images , 2013 .
[118] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[119] Hany Farid,et al. Detecting Digital Forgeries Using Bispectral Analysis , 1999 .
[120] N. Ohnishi,et al. Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[121] Min Wu,et al. Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images , 2009, IEEE Transactions on Information Forensics and Security.
[122] Babak Mahdian,et al. Detection and description of geometrically transformed digital images , 2009, Electronic Imaging.
[123] Sun Xingming,et al. DWT-PCA (EVD) Based Copy-move Image Forgery Detection , 2011 .
[124] Katrin Franke,et al. Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance , 2007 .
[125] Hui Zeng,et al. Countering anti-forensics of median filtering , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[126] Mauro Barni,et al. Countering anti-forensics by means of data fusion , 2014, Electronic Imaging.
[127] Javad Alirezaie,et al. Robust detection of copy-move forgery using texture features , 2011, 2011 19th Iranian Conference on Electrical Engineering.
[128] Yao Zhao,et al. Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis , 2011, IEEE Signal Processing Letters.
[129] K. J. Ray Liu,et al. Wavelet-based image compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.
[130] K. J. Ray Liu,et al. Anti-forensics of median filtering , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[131] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[132] Christian Riess,et al. On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[133] Matthias Kirchner. On the detectability of local resampling in digital images , 2008, Electronic Imaging.
[134] Matthias Kirchner,et al. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.
[135] Osamah M. Al-Qershi,et al. Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.
[136] Jan Lukás,et al. Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.
[137] Christian Riess,et al. A Study on Features for the Detection of Copy-Move Forgeries , 2010, Sicherheit.
[138] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[139] Matthias Kirchner,et al. On resampling detection in re-compressed images , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[140] Shih-Fu Chang,et al. Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[141] Micah K. Johnson,et al. Metric Measurements on a Plane from a Single Image , 2006 .
[142] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[143] Katrin Eismann. Photoshop Restoration and Retouching , 2001 .
[144] Alessandro Neri,et al. Image forgery detection by means of no-reference quality metrics , 2012, Other Conferences.
[145] Azeddine Beghdadi,et al. A perceptual image completion approach based on a hierarchical optimization scheme , 2014, Signal Process..
[146] Paolo Bestagini,et al. Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[147] Wei Lu,et al. Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..
[148] Xu Bo,et al. Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[149] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[150] Roberto Caldelli,et al. Exploiting perceptual quality issues in countering SIFT-based Forensic methods , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[151] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[152] Jie Xu,et al. SCUT-FBP: A Benchmark Dataset for Facial Beauty Perception , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.
[153] Alex ChiChung Kot,et al. Identification of recaptured photographs on LCD screens , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[154] K BirajdarGajanan,et al. Digital image forgery detection using passive techniques , 2013 .
[155] Jing Zhang,et al. A new approach merging markov and DCT features for image splicing detection , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[156] Azadeh Mansouri,et al. Adaptive matching for copy-move Forgery detection , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[157] Fei Peng,et al. Identification of Natural Images and Computer‐Generated Graphics Based on Statistical and Textural Features , 2015, Journal of forensic sciences.
[158] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[159] Gopu Darsan,et al. Blind Detection Method for Video Inpainting Forgery , 2012 .
[160] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[161] A. Piva. An Overview on Image Forensics , 2013 .
[162] Wei Su,et al. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.
[163] Minglun Gong,et al. An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).
[164] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[165] Davide Cozzolino,et al. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[166] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[167] Azeddine Beghdadi,et al. Perceptual quality assessment for color image inpainting , 2013, 2013 IEEE International Conference on Image Processing.
[168] Hatice Gunes,et al. Assessing facial beauty through proportion analysis by image processing and supervised learning , 2006, Int. J. Hum. Comput. Stud..
[169] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[170] Wang Zhi-quan,et al. Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .
[171] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[172] Zhiquan Wang,et al. Fast and Robust Forensics for Image Region-duplication Forgery: Fast and Robust Forensics for Image Region-duplication Forgery , 2010 .
[173] Chen Haipeng. Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .
[174] Matthias Kirchner. Notes on Digital Image Forensics and Counter-Forensics , 2012 .
[175] Rainer Böhme,et al. Counter-Forensics: Attacking Image Forensics , 2013 .
[176] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[177] Hongyuan Li,et al. Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[178] Md. Khayrul Bashar,et al. Wavelet-Based Multiresolution Features for Detecting Duplications in Images , 2007, MVA.
[179] Luo Wei,et al. Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .
[180] Hany Farid,et al. Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.
[181] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[182] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[183] Adam Finkelstein,et al. The Generalized PatchMatch Correspondence Algorithm , 2010, ECCV.
[184] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[185] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[186] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[187] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[188] Yao Zhao,et al. Detection of image sharpening based on histogram aberration and ringing artifacts , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[189] Muhammad Ghulam,et al. Accurate and robust localization of duplicated region in copy–move image forgery , 2014, Machine Vision and Applications.
[190] Davide Cozzolino,et al. Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[191] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[192] Min Wu,et al. Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.
[193] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[194] Mohamed A. Deriche,et al. A review on copy move image forgery detection techniques , 2014, 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14).
[195] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[196] Xuan-jing Shen,et al. Blind identification algorithm for retouched images based on Bi-Laplacian: Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .
[197] Mohamed A. Deriche,et al. A fast no reference image quality assessment using laws texture moments , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[198] Patrick Pérez,et al. Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.
[199] Ingemar J. Cox,et al. Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.
[200] Jun Wang,et al. Copy-move forgery detection based on PHT , 2012, 2012 World Congress on Information and Communication Technologies.
[201] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[202] Jianhua Li,et al. A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection , 2011, IWDW.
[203] Jing Dong,et al. Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[204] Tieniu Tan,et al. Image tampering detection based on stationary distribution of Markov chain , 2010, 2010 IEEE International Conference on Image Processing.
[205] Yao Zhao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.
[206] Mauro Barni,et al. Watermarking Systems Engineering (Signal Processing and Communications, 21) , 2004 .
[207] Wei Su,et al. Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.
[208] Xiaochun Cao,et al. Detecting photographic composites using two-view geometrical constraints , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[209] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[210] Anderson Rocha,et al. Image Phylogeny by Minimal Spanning Trees , 2012, IEEE Transactions on Information Forensics and Security.
[211] Oscar C. Au,et al. Alternative Anti-Forensics Method for Contrast Enhancement , 2011, IWDW.
[212] David Vazquez-Padin,et al. Two-dimensional statistical test for the presence of almost cyclostationarity on images , 2010, 2010 IEEE International Conference on Image Processing.
[213] K. Vijayalakshmi,et al. Digital image forgery detection and estimation by exploring basic image manipulations , 2012, Digit. Investig..
[214] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[215] Francesco G. B. De Natale,et al. Discrimination between computer generated and natural human faces based on asymmetry information , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[216] Xinpeng Zhang,et al. Detection of Image Region-Duplication with Rotation and Scaling Tolerance , 2010, ICCCI.
[217] A FischlerMartin,et al. Random sample consensus , 1981 .
[218] Rainer Böhme,et al. Can we trust digital image forensics? , 2007, ACM Multimedia.
[219] Jing Dong,et al. New developments in color image tampering detection , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[220] K. J. Ray Liu,et al. Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[221] Jing Dong,et al. CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[222] Anderson Rocha,et al. Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.
[223] Luisa Verdoliva,et al. On the influence of denoising in PRNU based forgery detection , 2010, MiFor '10.
[224] Mohd Aizaini Maarof,et al. Efficient image duplicated region detection model using sequential block clustering , 2013, Digit. Investig..
[225] Jianhua Li,et al. Detecting Digital Image Splicing in Chroma Spaces , 2010, IWDW.
[226] Rongrong Ni,et al. Forensic identification of resampling operators: A semi non-intrusive approach. , 2012, Forensic science international.
[227] Hany Farid,et al. Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[228] Jan P. Allebach,et al. Forensic techniques for classifying scanner, computer generated and digital camera images , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[229] Mauro Barni,et al. Forensic Analysis of SIFT Keypoint Removal and Injection , 2014, IEEE Transactions on Information Forensics and Security.
[230] K. J. Ray Liu,et al. Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.