1 |
T.-T. Do, E. Kijak, T. Furon, L. Amsaleg, "Understanding the Security and Robustness of SIFT," In Proc. of the International Conference on Multimedia, MM'10, pp. 1195-1198, 2010.
|
2 |
X. Pan, S. Lyu, "Detecting image region duplication using SIFT features," In Proc. ICASSP, Dallas, TX, 2010.
|
3 |
I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, G. Serra. "Geometric tampering estimation by means of a SIFT-based forensic analysis," In Proc. ICASSP, Dallas, TX, 2010.
|
4 |
C.Y. Hsu, C.-S. Lu, S.-C. Pei, "Secure and robust SIFT," In ACM Multimedia Conf., pp.637-640, 2009.
|
5 |
T.-T. Do, E. Kijak, T. Furon, L. Amsaleg, "Deluding Image Recognition in SIFT-Based CBIR Systems," In Proc. of the 2nd ACM Workshop on Multimedia Forensics, Security and Intelligence, MiFor'10, pp.7-12, 2010.
|
6 |
R. Caldelli, I. Amerini, L. Ballan, G. Serra, A. Costanzo, "On the Effectiveness of Local Warping Against SIFT-Based Copy-Move Detection," In Proc. of Int'l Symposium on Communications, Control and Signal Processing (ISCCSP), May, 2012.
|
7 |
A. Vealdi, B. Fulkerson, VLFeat: An open and portable library of computer vision algorithms. (http://www.vlfeat.org/), 2008.
|
8 |
I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, G. Serra, "A SIFT-based forensic method for copy move attack and transformation recovery," IEEE Transactions on Information Forensics And Security, Vol.6, No.3, pp.1099-1110, 2011.
DOI
ScienceOn
|
9 |
J. Redi, W. Taktak, J.-L. Dugelay, "Digital image forensics: a booklet for beginners," Multimedia Tools and Applications, 51, pp.133-162, 2011.
DOI
|
10 |
L. Chen, S. Wang, S. Li, J. Li,."Countering Universal Image Tampering Detection with Histogram Restoration," International Workshop on Digital Forensics and Watermarking, IWDW 2012, LNCS 7128, pp.282-289, 2012.
|
11 |
R. Harris, "Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problem," Digit. Investig. 3(Supplement 1), pp.44-49, 2006.
DOI
ScienceOn
|
12 |
R. Bohme, M. Kirchner, "Counter-Forensics: Attacking Image Forensics," In Digital Image Forensics, ed. by H.T. Sencar, N. Memon, Springer, New York, pp.327-366, 2013.
|
13 |
H. Huang, W. Guo, Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," In Proc. IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008.
|
14 |
Y.Q. Shi, C. Chen, G. Xuan, W. Su, "Steganalysis Versus Splicing Detection," In IWDW 2007, LNCS 5041, pp.158-172, 2008.
|
15 |
M. Kirchner, R. Bohme, "Tamper hiding: Defeating image forensics," In Information Hiding, LNCS 4567, pp.326-341, 2007.
|
16 |
M. Kirchner, R. Bohme, "Hiding Traces of Resampling in Digital Images," IEEE Transactions on Information Forensics and Security, Vol.3, No.4, pp.582-592, 2008.
DOI
ScienceOn
|
17 |
D. Lowe, "Distinctive image features from scale-invariant keypoints, "International Journal Computer. Vision, Vol.60, No.2, pp.91-110, 2004.
DOI
ScienceOn
|