[1] |
Ikhlayel M,Hariadi M,Pumama I.Modified multi-scale feature extraction for copy-move forgery detection based on CMD-SIFT[C]∥Proc of 2018 International Conference on Computer Engineering,Network and Intelligent Multimedia,2018:260-264.
|
[2] |
Alhammadi M M, Emmanuel S. Improving SURF based copy-move forgery detection using super resolution[C]∥Proc of IEEE International Symposium on Multimedia,2016:341-344.
|
[3] |
Donoser M, Schmalstieg D.Discriminative feature-to-point matching in image-based localization[C]∥Proc of 2014 IEEE Conference on Computer Vision and Pattern Recognition,2014:516-523.
|
[4] |
Yang H Y,Qi S R,Niu Y,et al.Copy-move forgery detection based on adaptive keypoints extraction and matching[J].Multimedia Tools and Applications,2019,78:34585-34612.
|
[5] |
Niyishaka P,Bhagvati C.Copy-move forgery detection using image blobs and BRISK feature[J].Multimedia Tools and Applications,2020,79:26045-26059.
|
[6] |
Li Y,Zhou J.Fast and effective image copy-move forgery detection via hierarchical feature point matching[J].IEEE Transactions on Information Forensics and Security,2019,14(5):1307-1322.
|
[7] |
Lin C,Lu W,Huang X C,et al.Copy-move forgery detection using combined features and transitive matching[J].Multimedia Tools and Applications,2019,78:30081-30096.
|
[8] |
Liu An-an, Wang Hong-tao.A blind copy-move forensics method based on truncated DCT domain coefficients:CN201710365547.5[P].2017-09-26.(in Chinese)
|
[9] |
Jwaid M F,Baraskar T N.Detection of copy-move image forgery using local binary pattern with discrete wavelet transform and principle component analysis[C]∥Proc of International Conference on Computing,Communication,Control and Automation,2017:1-6.
|
[10] |
Pun C M, Chuang J L. A two-stage localization for copy-move forgery detection[J].Information Sciences,2018,463-464:33-35.
|
[11] |
Chen C C,Lu W Y,Chou C H.Rotational copy-move forgery detection using SIFT and region growing strategies[J].Multimedia Tools and Applications,2019,78:18293-18308.
|
[12] |
Muja M, Lowe D G. Scalable nearest neighbor algorithms for high dimensional data[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2014, 36(11):2227-2240.
|
[13] |
Ryu S J,Kirchner M,Lee M J,et al.Rotation invariant localization of duplicated image regions based on Zernike moments[J].IEEE Transactions on Information Forensics & Security,2013,8(8):1355-1370.
|
[14] |
Barnes C,Shechtman E,Goldman D B,et al.The generalized PatchMatch correspondence algorithm[C]∥Proc of European Conference on Computer Vision,2010:29-43.
|
[15] |
Chen B J, Gao Y, Yu M, et al.An effective copy-move forgery detection algorithm using fractional quaternion Zernike moments and improved PatchMatch algorithm[J].Journal of Southeast University(English Edition),2019,35(4):431-439.
|
[16] |
Bi X L,Pun C M,Yuan X C.Multi-scale feature extraction and adaptive matching for copy-move forgery detection[J].Multimedia Tools and Applications,2018,77:363-385.
|
[17] |
Liu Y Q,Guan Q X,Zhao X F.Copy-move forgery detection based on convolutional kernel network[J].Multimedia Tools and Applications,2018,77:18269-18293.
|
[18] |
Agarwal R,Verma O P.An efficient copy move forgery detection using deep learning feature extraction and matching algorithm[J].Multimedia Tools and Applications,2020,79:1-22.
|
[19] |
Cozzolino D, Poggi G, Verdoliva L. Efficient dense-field copy-move forgery detection[J].IEEE Transactions on Information Forensics and Security,2015,10(11):2284-2297.
|
[20] |
DeTone D,Malisiewicz T,Rabinovich A.SuperPoint:Self-supervised interest point detection and description[C]∥Proc of 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops,2018:337-349.
|
[21] |
Tralic D,Zupancic I,Grgic S,et al.CoMoFoD—New database for copy-move forgery detection[C]∥Proc of Croatian Society Electronics in Marine International Symposium,2013:49-54.
|
|
附中文参考文献:
|
[8] |
刘安安,王洪涛.一种基于截断DCT域系数的复制粘贴盲取证方法:CN201710365547.5[P].2017-09-26.
|