1 |
Mahdian, Babak, and Stanislav Saic. “Blind authentication usingperiodic properties of interpolation.” IEEE Transactions onInformation Forensics and Security, vol., no. 3, pp. 529-538, 2008.
|
2 |
Amerini, Irene, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra. “A sift-based forensic method for copy-move attack detection and transformation recovery”, IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011.
DOI
ScienceOn
|
3 |
CASIA Tampering Detection Dataset V1.0, 2009.
|
4 |
Huang, Yanping, Wei Lu, Wei Sun, and Dongyang Long. “Improved DCT-based detection of copy-move forgery in images.” Forensic science international, vol. 206, no. 1, pp. 178-184, 2011.
DOI
ScienceOn
|
5 |
Hashmi, Mohammad F., Aaditya R. Hambarde and Avinash G. Keskar “Image Authentication Based on HMM and SVM Classifier”, Engineering Letters, vol. 22, no. 4, pp. 183-193, 2014.
|
6 |
Li, Yuenan. “Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching.” Forensic science inter-national, vol. 224, no. 1, pp. 59-67, 2013.
DOI
ScienceOn
|
7 |
Akbarpour Sekeh, Mohammad, Mohd Aizaini Maarof, Mohd Foad Rohani, and Babak Mahdian. “Efficient image duplicated region detection model using sequential block clustering.” Digital Investigation, vol. 10, no. 1, pp. 73-84, 2013.
DOI
ScienceOn
|
8 |
Lynch, Gavin, Frank Y. Shih, and Hong-Yuan Mark Liao. “An efficient expanding block algorithm for image copy-move forgery detection.” Information Sciences, vol. 239, pp. 253-265, 2013.
DOI
ScienceOn
|
9 |
Zhao, Jie, and JichangGuo. “Passive forensics for copy-move image forgery using a method based on DCT and SVD.” Forensic science international, vol. 233, no. 1, pp. 158-166, 2013.
DOI
ScienceOn
|
10 |
Ketenci, Seniha, and Guzin Ulutas. “Copy-move forgery detection in images via 2D-Fourier Transform.” In Proceedings of 36th IEEE International Conference on Telecommunications and Signal Processing (TSP-2013), pp. 813-816, 2013.
|
11 |
Farid, Hany. “Exposing digital forgeries from JPEG ghosts.” IEEETransactions on Information Forensics and Security, vol. 4, no. 1, pp. 154-160, 2009.
DOI
ScienceOn
|
12 |
Li, Weihai, Yuan Yuan, and Nenghai Yu. “Passive detection ofdoctored JPEG image via block artifact grid extraction.” SignalProcessing, vol. 89, no. 9, pp. 1821-1829, September 2009.
|
13 |
Bianchi, T., De Rosa, A., Piva, A., “Improved DCT coefficientanalysis for forgery localization in JPEG images” In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-2011), pp. 2444-2447, May 2011.
|
14 |
Popescu, Alin C., and Hany Farid. “Exposing digital forgeries by detecting duplicated image regions.” Dept. Comput.Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.
|
15 |
Li, Guohui, Qiong Wu, Dan Tu, and Shaojie Sun. “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD.” In Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 1750-1753, 2007.
|
16 |
Huang, Yanping, Wei Lu, Wei Sun, and Dongyang Long. “Improved DCT-based detection of copy-move forgery in images.” Forensic science international, vol. 206, no. 1, pp.178-184, 2011.
DOI
ScienceOn
|
17 |
Wang, Yang, Kaitlyn Gurule, Jacqueline Wise, and Jun Zheng. “Wavelet based region duplication forgery detection.” In Proceedings of Ninth International Conference on Information Technology: New Generations (ITNG-2012), pp. 30-35, 2012.
|
18 |
Fridrich, A. Jessica, B. David Soukal, and A. Jan Luká. “Detection of copy-move forgery in digital images.” In Proceedings of IEEE Digital Forensic Research Workshop, Cleveland, OH, USA, pp. 55-61, August 2003.
|
19 |
Wu Qiong, Shao-Jie SUN, Wei ZHU, Guo-Hui LI, Dan TU, Chao-Sheng HE, “A blind forensic algorithm for detecting doctored image region by application of exemplar-based image completion.” Acta Automatica Silica, vol. 35, no. 3, pp. 239-243, March 2009.
DOI
|
20 |
Cao, Yanjun, TiegangGao, Li Fan, and Qunting Yang. “A robust detection algorithm for copy-move forgery in digital images.” Forensic science international, vol. 214, no. 1, pp. 33-43, 2012.
DOI
ScienceOn
|
21 |
Muhammad, Ghulam, Muhammad Hussain, and George Bebis. “Passive copy move image forgery detection using undecimated dyadic wavelet transform.” Digital Investigation, vol. 9, no. 1, pp. 49-57, 2012.
DOI
ScienceOn
|
22 |
Mahdian, Babak, and StanislavSaic. “A bibliography on blind methods for identifying image forgery.” Signal Processing: Image Communication, vol.25, no. vol. 6, pp.389-399, 2010.
DOI
ScienceOn
|
23 |
Murali, S., Govindraj B. Chittapur, and Basavaraj S. Anami. “Comparison and analysis of photo image forgery detection techniques.” arXiv preprint arXiv: 1302.3119, 2013.
|
24 |
Barni, Mauro, and Andrea Costanzo. “A fuzzy approach to deal with uncertainty in image forensics.” Signal Processing: Image Communication, vol. 27, no. 9, pp. 998-1010, 2012.
DOI
ScienceOn
|
25 |
Qazi, Tanzeela, Khizar Hayat, Samee U. Khan, Sajjad A. Madani, Imran A. Khan, Joanna Kołodziej, Hongxiang Li, Weiyao Lin, Kin Choong Yow, and CZ. Xu. “Survey on blind image forgery detection.” IET Image Processing, vol. 7, no. 7, pp. 660-670, 2013.
DOI
|
26 |
Al-Qershi, Osamah M., and Bee EeKhoo. “Passive detection of copy-move forgery in digital images: State-of-the-art.” Forensic science international, vol. 231, no. 1, pp. 284-295, 2013.
DOI
ScienceOn
|
27 |
Cozzolino, Davide, Francesco Gargiulo, Carlo Sansone, and Luisa Verdoliva. “Multiple classifier systems for image forgery detection.” In Proceedings of Image Analysis and Processing (ICIAP -2013), pp. 259-268, Springer Berlin Heidelberg, 2013.
|
28 |
Christlein, Vincent, Christian Riess, Johannes Jordan, and E. Angelopoulou. “An evaluation of popular copy-move forgery detection approaches.” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.
DOI
ScienceOn
|
29 |
Ketenci, Seniha, Guzin Ulutas, and Mustafa Ulutas. “Detection of duplicated regions in images using 1D-Fourier transform.” In Proceedings of International Conference on Systems, Signals and Image Processing (IWSSIP-2014), vol. 2, pp. 171-174, 2014.
|
30 |
Stamm, Matthew C., and KJ Ray Liu. “Forensic detection of image manipulation using statistical intrinsic fingerprints.” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 492-506, 2010.
DOI
ScienceOn
|