[1] Popescu A C, Farid H.Exposing Digital Forgeries by Detecting Duplicated Image Regions[R].Hanover:Dartmouth College Department of Computer Science Technical, 2004, TR2004-515.
[2] Amerini I, Ballan L, Caldelli R, et al.A sift-based forensic method for copy-move attack detection and transformation recovery[J].IEEE Transactions on Information Forensics and Security, 2011, 6(3):1099-1110.
[3] Pan X, Lyu S.Region duplication detection using image feature matching[J].IEEE Transactions on Information Forensics and Security, 2010, 5(4):857-867.
[4] Wu Q, Wang S, Zhang X.Log-polar based scheme for revealing duplicated regions in digital images[J].IEEE Signal Processing Letters, 2011, 18(10):559-562.
[5] Avidan S, Shamir A.Seam carving for content-aware image resizing[J].ACM Transactions on Graphics, 2007, 26(3):10.
[6] 王波, 孙璐璐, 孔祥维, 等.图像伪造中模糊操作的异常色调率取证技术[J].电子学报, 2006, 34(12A):2451-2454. Wang Bo, Sun Lu-lu, Kong Xiang-wei, et al.Image forensics technology using abnormity of local hue for blur detection[J].Acta Electronica Sinica, 2006, 34(12A):2451-2454.(in Chinese)
[7] 周琳娜, 王东明, 郭云彪, 等.基于数字图像边缘特性的形态学滤波取证技术[J].电子学报, 2008, 36(6):1047-1051. Zhou Lin-na, Wang Dong-ming, Guo Yun-biao, et al.Exposing digital forgeries by detecting image blurred mathematical morphology edge[J].Acta Electronica Sinica, 2008, 36(6):1047-1051.(in Chinese)
[8] Cao G, Zhao Y, Ni R, et al.Contrast enhancement-based forensics in digital images[J].IEEE Transactions on Information Forensics and Security, 2014, 9(3):515-525.
[9] Luo W, Huang J, Qiu G.JPEG error analysis and its applications to digital image forensics[J].IEEE Transactions on Information Forensics and Security, 2010, 5(3):480-491.
[10] Farid H.Detecting Digital Forgeries Using Bispectral Analysis[R]. Cambridge:Massachusetts Institute of technology, 1999, AIM-1657.
[11] Ng T T, Chang S F, Sun Q.A Data Set of Authentic and Spliced Image Blocks[R].Columbia:Columbia University, ADVENT Technical, 2004.203.
[12] Ng T T, Chang S F.Blinddetection of digital photomontage using higher order statistics[DB/OL].http://www.ee.columbia.edu/dvmm/, 2004-01.
[13] Fu D, Shi Y Q, Su W.Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition[A].Proceedings of the 5th International Workshop on Digital Watermarking[C].Berlin:Springer, 2006.177-187.
[14] Chen W, Shi Y Q, Su W.Imagesplicing detection using 2-D phase congruency and statistical moments of characteristic function[A].Proceedings of SPIE Electronic Imaging[C].California:SPIE, 2007.65050R-1.
[15] Shi Y Q, Chen C, Chen W.A natural image model approach to splicing detection[A].Proceedings of the 9th Workshop on Multimedia & Security[C].New York:ACM, 2007.51-62.
[16] Sutthiwan P, Shi Y Q, Dong J, et al.New developments in color image tampering detection[A].Proceedings of IEEE International Symposium on Circuits and Systems[C].New York:IEEE, 2010.3064-3067.
[17] He Z, Lu W, Sun W, et al.Digital image splicing detection based on Markov features in DCT and DWT domain[J].Pattern Recognition, 2012, 45(12):4292-4299.
[18] Saleh S Q, Hussain M, Muhammad G, et al.Evaluation ofimage forgery detection using multi-scale weber local descriptors[A].Proceedings of Advances in Visual Computing[C].Berlin:Springer, 2013.416-424.
[19] Shi Y Q, Chen C, Chen W.A markov process based approach to effective attacking JPEG steganography[A].Proceedings of the 8th Information Hiding Workshop[C].Berlin:Springer, 2006.249-264.
[20] Qian-Lan D.The blind detection of information hiding in color image[A].Proceedings of the 2nd International Conference on Computer Engineering and Technology[C].New York:IEEE, 2010.V7-346-V7-348.
[21] Shabanifard M, Shayesteh M G, Akhaee M A.Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram[J].IET Image Processing, 2013, 7(9):817-828.
[22] Jing Dong.CASIA tampered image detection evaluation database[DB/OL].http://forensics.idealtest.org, 2011.
[23] Chang C C, Lin C J.LIBSVM:a library for support vector machines[J].ACM Transactions on Intelligent Systems and Technology, 2011, 2(3):1-25.
[24] Qiu X, Li H, Luo W, et al.A universal image forensic strategy based on steganalytic model[A].Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security[C].New York:ACM, 2014.165-170.
[25] ARocha, A Piva, J Huang.Images corpus of the 1st IEEE IFS-TC image forensics challenge[DB/OL].http://ifc.recod.ic.unicamp.br/fc.website/index.py?sec=5, 2013-06. |