Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching
暂无分享,去创建一个
Fan Yang | Jingwei Li | Wei Lu | Wei Sun | Fan Yang | Wei Sun | Wei Lu | Jingwei Li
[1] Zenon Chaczko,et al. Hyper Edge Detection with Clustering for Data Hiding , 2016, J. Inf. Hiding Multim. Signal Process..
[2] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[3] Cordelia Schmid,et al. A Performance Evaluation of Local Descriptors , 2005, IEEE Trans. Pattern Anal. Mach. Intell..
[4] David G. Lowe,et al. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.
[5] Hany Farid,et al. Photo Fakery and Forensics , 2009, Adv. Comput..
[6] Trevor Hastie,et al. The Elements of Statistical Learning , 2001 .
[7] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[8] Babak Mahdian,et al. Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.
[9] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[10] Andrea Vedaldi. An Implementation of Multi-Dimensional Maximally Stable Extremal Regions , 2007 .
[11] M. Teague. Image analysis via the general theory of moments , 1980 .
[12] Alin C. Popescu,et al. Exposing Digital Forgeries by Detecting Duplicated Image Regions Exposing Digital Forgeries by Detecting Duplicated Image Regions , 2004 .
[13] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[14] Ahmad Faraahi,et al. DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[15] Jiri Matas,et al. Robust wide-baseline stereo from maximally stable extremal regions , 2004, Image Vis. Comput..
[16] Heung-Kyu Lee,et al. Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.
[17] Hsiang-Cheh Huang,et al. Coevolutionary genetic watermarking for owner identification , 2014, Neural Computing and Applications.
[18] S. Sons. Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .
[19] Yu Zhang,et al. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[20] Jeng-Shyang Pan,et al. An Embedding Algorithm for Multiple Watermarks , 2003, J. Inf. Sci. Eng..
[21] Lifa Wu,et al. Double Reversible Watermarking Algorithm for Image Tamper Detection , 2016, J. Inf. Hiding Multim. Signal Process..
[22] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[23] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[24] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[25] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[26] Wenjuan Ma,et al. Shift Invariance Level Comparison of Several Contourlet Transforms and Their Texture Image Retrieval Systems , 2016 .
[27] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[28] H. Farid. A Survey of Image Forgery Detection , 2008 .
[29] Per-Erik Forssén,et al. Maximally Stable Colour Regions for Recognition and Matching , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.