Selective Feature Extraction Method Between Markov Transition Probability and Co-occurrence Probability for Image Splicing Detection |
Han, Jong-Goo
(Department of Electronics Engineering, Busan National University)
Eom, Il-Kyu (Department of Electronics Engineering, Busan National University) Moon, Yong-Ho (Department of Aerospace & Software Engineering, ERI, Gyeongsang Nat. University) Ha, Seok-Wun (Department of Aerospace & Software Engineering, ERI, Gyeongsang Nat. University) |
1 | T. T. Ng, S. F. Chang and Q. Sun, "Blind detection of photomontage using higher order statistics", Proceedings of IEEE International Symposium on Circuits and Systems, vol. 5, pp. 688-691, May. 2004. |
2 | D. Fu, Y. Q. Shi, and W. Su, "Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition," LNCS, vol. 4283, pp. 177-187, Feb. 2006. |
3 | W. Chen, Y. Q. Shi, and W. Su, "Image splicing detection using 2-D phase congruency and statistical moments of characteristic function," Proceedings of SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, pp. 1-8, Jul. 2007. |
4 | Z He, W Lu, W Sun, J Huang, "Digital image splicing detection based on Markov features in DCT and DWT domain," Pattern Recognition, vol. 45, no. 12, pp. 4292 - 4299, Dec. 2012. DOI |
5 | B. Su, Q. Yuan, S. Wang, C. Zhao and S. Li, "Enhanced state selection Markov model for image splicing detection," EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, pp. 1-10, Dec. 2014. DOI |
6 | S. Kullback and R. A. Leibler, "On information and sufficiency," The Annals of Mathematical Statistics, vol. 22, no. 1, pp. 79-86. Mar. 1951. DOI |
7 | G. Muhammad, and M. H. Al-Hammadi, "Image forgery detection using steerable pyramid transform and local binary pattern," Machine Vision and Applications, vol. 25, no. 4, pp. 985-995, May. 2014. DOI |
8 | Columbia DVMM Research Lab. Columbia image splicing detection evaluation dataset[Internet], Available: http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm. |
9 | J. Dong, and W. Wang, CASIA tampered image detection evaluation (TIDE) database[Internet], Available: CASIA v1.0 and v2.0, http://forensics.idealtest.org/. |
10 | J. Dong, W. Wang, T. Tan, and Y. Q. Shi, "Run-Length and edge statistics based approach for image splicing detection," LNCS, vol. 5450, pp. 76-87, Mar. 2009. |
11 | Z. He, W. Lu, and W, Sun, "Improved run length based detection of digital image splicing," LNCS, vol. 7218, pp. 349-360, Jan. 2012. |
12 | H. Farid, "A survey of image forgery detection," IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, Sep. 2009. DOI |