[1] 周琳娜,张茹,郭云彪.数字图像内容取证[M].北京:高等教育出版社,2011.
[2] 周琳娜,王东明,郭云彪,杨义先.基于数字图像边缘特性的形态学滤波取证技术[J].电子学报,2008,36(6):1047-1051. Zhou Lin-na,Wang Dong-ming,Guo Yun-biao,Yang Yi-xian.Exposing digital forgeries by detecting image blurred mathematical morphology edge[J].Acta Electronica Sinaca,2008,36(6):1047-1051. (in Chinese)
[3] 王波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(S1):2451-2454. Wang Bo,Sun Lu-lu,et al.Image forensics technology using abnormity of local hue for blur detection[J].Acta Electronica Sinaca,2006,34(S1):2451-2454. (in Chinese)
[4] B Wang,XW Kong,B Elisa et al.,Exposing Copy-Paste-Blur forgeries based on color coherence[J].Chinese Journal of Electronics,2009,18(3):487-490.
[5] Fridrich J,Soukal D,Lukáš J.Detection of copy-move forgery in digital images[A].Proceedings of Digital Forensic Research Workshop[C].Cleveland:IEEE Press,2003. http://ws2.binghamton.edu/fridrich/Research/copymove.pdf.
[6] Wang X F,Zhang X N,Li Z,et al.A DWT-DCT based passive forensics method for copy-move attacks[A].Third International Conference on Multimedia Information Networking and Security (MINES)[A],Shanghai:IEEE Press,2011. 304-308.
[7] Cao Y J,Gao T G,Li F,et al.A robust detection algorithm for copy-move forgery in digital images[J].Forensic Science International,2012,214(1):33-43.
[8] Hu J,Zhang H,Gao Q.An improved lexicographical sort algorithm of copy-move forgery detection[A].Second International Conference on Networking and Distributed Computing (ICNDC)[C].Beijing:IEEE Press,2011. 23-27.
[9] Popescu A C,Farid H.Exposing digital forgeries by detecting duplicated image regions[R].TR2004-515 Department of Computer Science,Dartmouth College,Hanover,New Hampshire,USA,2004.
[10] Mahdian B,Saic S.Detection of copy-move forgery using a method based on blur moment invariants[J].Forensic Science International,2007,171(2):180-189.
[11] Ryu S J,Lee M J,Lee H K.Detection of copy-rotate-move forgery using Zernike moments[A].12th International Conference on Information Hiding[C].Canada:Springer Press,2010. 51-65.
[12] Ryu S J,Kirchner M,Lee M J,et al.Rotation invariant localization of duplicated image regions based on zernike moments[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1355-1370.
[13] Liu G,Wang J,Lian S.A passive image authentication scheme for detecting region-duplication forgery with rotation[J].Journal of Network and Computer Applications,2011,34(5):1557-1565.
[14] Davarzani R,Yaghmaie K,Mozaffari S,et al.Copy-move forgery detection using multiresolution local binary patterns[J].Forensic Science International,2013,231(1):61-72.
[15] Leida Li,Shushang Li,Hancheng Zhu,Xiaoyue Wu.Detecting copy-move forgery under affine transforms for image Forensics[J].Computers & Electrical Engineering,2014,40(6):1951-1962.
[16] Huang H J,Guo W Q,Zhang Y.Detection of copy-move forgery in digital images using SIFT algorithm[A].IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application[C].Wuhan:IEEE Press,2008. 272-276.
[17] Amerini I,Ballan L,Caldelli R,et al.A SIFT-based forensic method for copy-move attack detection and transformation recovery[J].IEEE Transactions on Information Forensics and Security,2011,6(3):1099-1110.
[18] Xu B,Wang J W,Liu G J.Image copy-move forgery detection based on SURF[A].IEEE International on Multimedia Information Networking and Security[C].Nanjing:IEEE Press,2010. 889-892.
[19] Guo J M,Liu Y F,Wu Z J.Duplication forgery detection using improved DAISY descriptor[J].Expert Systems with Applications,2013,40(2):707-714.
[20] Hashmi M F,Anand V,Keskar A G.Copy move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform[J].Aasri Procedia,2014,9:84-91.
[21] Jian Li,Xiaolong Li,Bin Yang,and Xingming Sun.Segmentation-based image copy-move forgery detection scheme[J].IEEE Transactions on Information Forensics and Security,2015,10(3):507-518.
[22] Ewerton Silva,Tiago Carvalho,Anselmo Ferreira,Anderson Rocha.Going deeper into copy-move forgery detection:Exploring image telltales via multi-scale analysis and voting processes[J].Journal of Visual Communication and Image Representation,2015,29:16-32. |