1 |
J. Fridrich, D. Soukal, and J. Lukas, "Detection of Copy-move Forgery in Digital Images," Proceeding of Digital Forensic Research Workshop, IEEE Computer Society, pp. 55-61, 2003.
|
2 |
A.C. Popescu and H. Farid, Exposing Digital Forgeries by Detecting Duplicated Image Regions, Technical Report TR2004-515, Department of Computer Science, Dartmouth College, 2004.
|
3 |
V. Christlein, C. Riess, J. Jordan, and E. Angelopoulou, "An Evaluation of Popular Copy-move Forgery Detection Approaches," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 6, pp. 1841-1854, 2012.
DOI
|
4 |
D. Mahalakshmi, S.K. Vijayalakshmi, and S. Priyadharsini, "Digital Image Forgery4detection and Estimation by Exploring Basic Image Manipulations," Digital Investigation, Vol. 8, No. 3, pp. 215-225, 2012.
DOI
|
5 |
E.S. Khan and E.A. Kulkarni, "An Efficient Method for Detection of Copy-move Forgery Using Discrete Wavelet Transform," International Journal of Computer Science and Engineering, Vol. 2, No. 5, pp. 1801-1806, 2010.
|
6 |
H.J. Lin, C.W. Wang, and Y.T. Kao, "Fast Copy-move Forgery Detection," World Scientific and Engineering Academy and Society Transaction on Signal Processing, Vol. 5, Issue 5, pp. 188-197, 2009.
|
7 |
S. Kahn and A. Kulkarni, "Reduced Time Complexity for Detection of Copy-move Forgery Using Discrete Wavelet Transform," International Journal of Computer Applications, Vol. 6, No. 7, pp. 31-36, 2010.
DOI
|
8 |
J. Casey, An Investigation of Block Searching Algorithms for Video Frame Coders, Masters of Science Thesis of Dublin Institute of Technology, 2008.
|
9 |
N. Singhal and S. Gandhani, "Analysis of Copy-move Forgery Image Forensics: A Review," International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 8, No. 7, pp. 265-272, 2015.
DOI
|
10 |
S. Bayram, H.T. Sencar, and N. memon, "A Survey of Copy-move Forgery Detection Techniques," Proceeding of IEEE Western New York Image Processing Workshop, pp. 538-542, 2008.
|
11 |
Y.D. Shin, "Fast Detection of Copy-move Forgery Image Using Three Step Search Algorithm in the Spatial Domain," Proceeding of International Conference on Hybrid Information Technology, pp. 389-395, 2012.
|
12 |
Y.D. Shin, "Fast Detection of Copy-move Forgery Image Using DCT," Journal of Korea Multimedia Society, Vol. 16, No. 4, pp. 411-417, 2013.
DOI
|
13 |
Y.D. Shin, "Analysis of Copy Move Forgery Image Detection," Proceeding of the 13th International Workshop Series, pp. 20-22, 2017.
|
14 |
Y.D. Shin, "Fast Detection of Image Forgery Using Three Step Search Algorithm Based on Discrete Cosine Transform," International Journal of Grid and Distributed Computing, Vol. 11, No. 11, pp. 57-66, 2018.
DOI
|
15 |
T. Koga, K. Iinuma, A. Hirano, Y. Iijima, and T. Ishiguro, "Motion Compensated Interframe Coding for Video Conferencing," Proceeding of National Telecommunication Conference, pp. G5.3.1-5.3.5, 1981.
|
16 |
P. Yip and K.R. Rao, Discrete Cosine Trans form: Algorithms, Advantages, and Applications, Academic Press, San Diego, 1990.
|
17 |
The USC-SIPI Image Database, http://sipi.usc.edu/database (accessed May, 10, 2012).
|