Citation: | XIE Wei, WAN Xiaoxia, YAN Wenjing, YE Songtao. Copy-Move Forgery Detection Using Slicing Transform[J]. Geomatics and Information Science of Wuhan University, 2017, 42(9): 1337-1342. DOI: 10.13203/j.whugis20150451 |
[1] |
Birajdar G K, Mankar V H. DigitalImage Forgery Detection Using Passive Techniques:A Survey[J]. Digital Investigation, 2013, 10(3):226-245 doi: 10.1016/j.diin.2013.04.007
|
[2] |
Fridrich A J, Soukal B D, Lukáš A J.Detection of Copy-Move Forgery in Digital Images[C]. Digital Forensic Research Workshop, Cleveland, USA, 2003
|
[3] |
Popescu A C, Farid H. Exposing Tigital Forgeries by Detecting Duplicated Image Regions[R]. Dartmouth Computer Scieuce Technical Report, Dartmouth, USA, 2004.
|
[4] |
Kang X B, Wei S M. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics[C].International Conference on Computer Science and Software Engineering, New York, USA, 2008
|
[5] |
Mahdian B, Saic S. Detection of Copy-Move Forgery Using a Method Based on Blur Moment Invariants[J].Forensic Science International, 2007, 171(2):180-189 http://www.sciencedirect.com/science/article/pii/S0379073806006748
|
[6] |
Li G, Wu Q, Tu D, et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD[C]. IEEE International Conference on Multimedia and Expo, New York, USA, 2007
|
[7] |
Bashar M, Noda K, Ohnishi N, et al.Exploring Duplicated Regions in Natural Images[J]. IEEE Transactions on Image Processing, 2010(99):1-40 http://www.ncbi.nlm.nih.gov/pubmed/20350843
|
[8] |
Ryu S J, Lee M J, Lee H K. Detection of Copy-Rotate-Move Forgery Using Zernike Moments[C]. Information Hiding-international Conference, Berlin, Germany, 2010
|
[9] |
Ardizzone E, Bruno A, Mazzola G.Detecting Multiple Copies in Tampered Images[C]. IEEE International Conference on Image Processing, New York, USA, 2010
|
[10] |
Amerini I, Ballan L, Caldelli R, et al. A Sift-based Forensic Method for Copy-Move Attack Detection and Transformation Recovery[J].IEEE Transactions on Information Forensics and Security, 2011, 6(3):1099-1110 doi: 10.1109/TIFS.2011.2129512
|
[11] |
Shivakumar B L, Baboo L D S S. Detection of Region Duplication Forgery in Digital Images Using SURF[J].IJCSI International Journal of Computer Science Issues, 2011, 8(4):199-205 http://www.oalib.com/paper/2654588
|
[12] |
Christlein V, Riess C, Jordan J, et al. An Evaluation of Popular Copy-Move Forgery Detection Approaches[J].IEEE Transactions on Information Forensics and Security, 2012, 7(6):1841-1854 doi: 10.1109/TIFS.2012.2218597
|
[13] |
Tralic D, Zupancic I, Grgic S, et al. CoMoFoD-New Database for Copy-Move Forgery Detection[C]. The 55th International Symposium ELMAR, New York, USA, 2013
|