[1] |
胡永健, 刘琲贝, 贺前华 . 数字多媒体取证技术综述[J]. 计算机应用, 2010,30(3): 657-662.
|
|
HU Y J , LIU B B , HE Q H . Review of digital multimedia forensics[J]. Journal of Computer Applications, 2010,30(3): 657-662.
|
[2] |
王俊文, 刘光杰, 张湛 ,等. 基于模式噪声的数字视频篡改取证[J]. 东南大学学报(自然科学版), 2008(S2): 13-17.
|
|
WANG J W , LIU G J , ZHANG Z ,et al. Digital video tampering with evidence based on modal noise[J]. Journal of Southeast University (Natural Science), 2008(S2): 13-17.
|
[3] |
袁秀娟, 黄添强, 陈智文 ,等. 基于纹理特征的数字视频篡改检测[J]. 计算机系统应用, 2012,21(6): 91-95.
|
|
YUAN X J , HUANG T Q , CHEN Z W ,et al. Digital video tamper detection based on texture feature[J]. Computer Systems &Applications, 2012,21(6): 91-95.
|
[4] |
黄添强, 陈智文, 苏立超 ,等. 利用内容连续性的数字视频篡改检测[J]. 南京大学学报(自然科学), 2011,47(5): 493-503.
|
|
HUANG T Q , ZHEN Z W,SULC ,et al. Digital video tamper detection with Content continuity[J]. Journal of Nanjing University (Natural Science), 2011,47(5): 493-503.
|
[5] |
YIN L , BAI Z , YANG R . Video forgery detection based on nonnegative tensor factorization[C]// The 4th IEEE International Conference on Information Science and Technology(ICIST). 2014: 148-151.
|
[6] |
KOLDA T G , BADER B W . Tensor decompositions and applications[J]. SIAM Review, 2009,51(3): 455-500.
|
[7] |
TUCKER L R . Some mathematical notes on three-mode factor analysis[J]. Psychometrika, 2006,31(3): 279-311.
|
[8] |
LATHAUWER L D , MOOR B D , VANDEWALLE J . A multilinear singular value decomposition[J]. Siam Journal on Matrix Analysis&Applications, 2000,21(4): 1253-1278.
|
[9] |
BADER B W , KOLDA T G . Algorithm 862:Matlab tensor classes for fast algorithm prototyping[J]. ACM Transactions on Mathematical Software, 2006,32(4): 635-653.
|
[10] |
林晶, 黄添强, 赖玥聪 ,等. 采用量化离散余弦变换系数检测视频单帧连续多次复制-粘贴篡改[J]. 计算机应用, 2016,36(5): 1356-1361.
|
|
LIN J , HUANG T Q , LAI Y C ,et al. Detect a siagle frame video’s continuous copy and paste by using Quantitative discrete cosine transform coefficients[J]. Compute Application, 2016,36(5): 1356-1361.
|
[11] |
贺忠 . 基于 Lip-切比雪夫方法的数据流异常检测分析[J]. 计算机系统应用, 2009,18(10): 61-64.
|
|
HE Z . The data flow anomaly detection analysis based on LipChebyshev method[J]. Computer System Application, 2009,18(10): 61-64.
|
[12] |
QADIR G , YAHAYA S , HO A T S . Surrey university library for forensic analysis(SULFA) of video content[C]// The 2012 IET Conference on Image Processing. 2012: 1-6.
|