References
- H. Farid, "A survey of image forgery detection," IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, 2009. https://doi.org/10.1109/MSP.2008.931079
- H. Farid, "A picture tells a thousand lies", New Scientist, vol. 2411, pp. 38-41, 2003.
- W. Chen, Y. Q. Shi, and W. Su, "Image splicing detection using 2-D phase congruency and statistical moments of characteristic function," Proceedings of SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, pp. 6505R.1-6505R.8., 2007.
- T. T. Ng, S. F. Chang and Q. Sun, "Blind detection of photomontage using higher order statistics", Proceedings of IEEE International Symposium on Circuits and Systems, vol. 5, pp. 688-691, 2004.
- D. Fu, Y. Q. Shi, and W. Su, "Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition," LNCS, vol. 4283, pp. 177-187, 2006.
- J. Dong, W. Wang, T. Tan, and Y. Q. Shi, "Run-Length and edge statistics based approach for image splicing detection," LNCS, vol. 5450, pp. 76-87, 2009.
- Z. He, W. Lu, and W, Sun, "Improved run length based detection of digital image splicing," Digital Forensics and Watermarking, pp. 349-360, Springer Berlin Heidelberg, 2012
- Z. He, W. Sun, W. Lu, H. Lu, "Digital image splicing detection based on approximate run length," Pattern Recognition Letters, vol. 32, no. 12, pp. 1591-1597, 2011. https://doi.org/10.1016/j.patrec.2011.05.013
- Z He, W Lu, W Sun, J Huang, "Digital image splicing detection based on Markov features in DCT and DWT domain," Pattern Recogn, vol. 45, no. 12, pp. 4292 - 4299, 2012. https://doi.org/10.1016/j.patcog.2012.05.014
- B. Su, Q. Yuan, S. Wang, C. Zhao and S. Li, "Enhanced state selection Markov model for image splicing detection," EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, 2014.
- B. Mahdian, and S. Saic, "A bibliography on blind methods for identifying image forgery," Signal Processing: Image Communication, vol. 25, no. 6, pp. 389-399, 2010 https://doi.org/10.1016/j.image.2010.05.003
- T. Penvy, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics and Securty, vol. 5, no. 2, pp. 215-224, 2010. https://doi.org/10.1109/TIFS.2010.2045842
- Columbia DVMM Research Lab. "Columbia Image Splicing Detection Evaluation Dataset," http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm.
- C. C. Chang and C. J. Lin, "LIBSVM: A library for support vector machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, 2011.
- Y. Q Shi, C. Chen, and W. Chen, "A natural image model approach to splicing detection," Workshop on Multimedia and Security, pp. 51-62, 2007.
- J.G. Han and I.K. EOM, "Spliced image detection using block Markov probability," Workshop on Image Processing and Image Understanding, vol. 26, 2014.