References
- J. Fridrich, D. Soukal, and J. Lukas, "Detection of Copy-move Forgery in Digital Images," Proceeding of Digital Forensic Research Workshop, IEEE Computer Society, pp. 55-61, Aug. 2003.
- A.C. Popescu and H. Farid, Exposing Digital Forgeries by Detecting Duplicated Image Regions, Dartmouth College, Hanover, New Hampshire, USA:TR2004-515, 2004.
- J. Zhang, Z. Feng, and Y. Su, "A New Approach for Detecting Copy-move Forgery in Digital Images," Proceeding of 11th IEEE Singapore International Conference on Communication Systems, pp. 362-366, 2008.
- R. Singh, A. Oberoi, and N. Goel, "Copy Move Forgery Detection on Digital Images," International Journal of Computer Applications, Vol. 98, No. 9, pp. 17-22, 2014. https://doi.org/10.5120/17211-7437
- E.S. Khan and E.A. Kulkarni, “An Efficient Method for Detection of Copy-move Forgery Using Discrete Wavelet Transform,” International Journal of Computer Science and Engineering, Vol. 2, No. 5, pp. 1801-1806, 2010.
- H.J. Lin, C.W. Wang, and Y.T. Kao, "Fast Copy-move Forgery Detection," World Scientific and Engineering Academy and Society Transaction on Signal Processing, Vol. 5, Issue 5, pp. 188-197, 2009.
- S. Kahn and A. Kulkarni, “Reduced Time Complexity for Detection of Copy-move Forgery Using Discrete Wavelet Transform,” International Journal of Computer Applications, Vol. 6, No. 7, pp. 31-36, 2010. https://doi.org/10.5120/1087-1418
- J. Casey, An Investigation of Block Searching Algorithms for Video Frame Coders, Masters of Science Thesis of Dublin Institute of Technology, 2008.
- N. Singhal and S. Gandhani, “Analysis of Copy-move Forgery Image Forensics: A Review,” International J ournal of Signal Processing, Image Processing and Pattern Recognition, Vol. 8, No. 7, pp. 265-272, 2015.
- Y.D. Shin, “Fast Detection of Copy-move Forgery Image Using Two Step Search Algorithm,” International Journal of Security and Its Applications, Vol. 10, No. 5, pp. 203-214, 2016.
- Y.D. Shin, "Fast Detection of Copy-move Forgery Image Using Three Step Search Algorithm in the Spatial Domain," Proceeding of International Conference on Hybrid Information Technology Convergence and Hybrid Information Technology, pp. 389-395, 2012.
- Y.D. Shin, “Fast Detection of Copy-move Forgery Image Using DCT,” Journal of Korea Multimedia Society, Vol. 16, No. 4, pp. 411-417, 2013. https://doi.org/10.9717/kmms.2013.16.4.411
- P. Yip and K.R. Rao, Discrete Cosine Transform: Algorithms, Advantages, and Applications, Academic Press, San Diego, CA, USA, 1990.
- http://sipi.usc.edu/database (accessed May, 10, 2012).
- http://www.ece.cmu.edu/ee899/project/deepak_mid.htm (accessed May, 11, 2012).
- http://sipl.kjist.ac.kr/about/2-Famous%20ME%20algorithms.pdf (accessed May, 12, 2012).
- T. Koga, K. Iinuma, A. Hirano, Y. Iijima, and T. Ishiguro, "Motion Compensated Interframe Coding for Video Conferencing," Proceeding of National Telecommunication Conference, pp. G5.3.1-5.3.5, 1981.