[1] |
QAZI T , HAYAT K , KHAN S U , et al. Survey on blind image forgery detection[J]. IET Image Process, 2013,7(7): 660-670.
|
[2] |
AL-QERSHI O M , KHOO B E . Passive detection of copy-move for-gery in digital images:state-of-the-art[J]. Forensic Science International, 2013,231(1-3): 284-295.
|
[3] |
KEE E , O'BRIEN J , FARID H . Exposing photo manipulation with inconsistent shadows[J]. ACM Transactions on Graphics (TOG), 2013,32(3): 1-12.
|
[4] |
FRIDRICH A J , SOUKAL B D , LUK ? A J . Detection of copy-move forgery in digital images[A]. Proceeding of the Digital Forensic Research Workshop[C]. Cleveland,Ohio,USA, 2003. 1-10.
|
[5] |
POPESCU A C , FARID H , Exposing digital forgeries by detecting duplicated image regions[R]. Dept Comput Sci,Dartmouth College,Tech, 2004.
|
[6] |
CHRISTLEIN V , RIESS C , ANGELOPOULOU E . On rotation invariance in copy-move forgery detection[A]. Proceeding of the Information Forensics and Security (WIFS)[C]. Seattle, 2010. 1-6.
|
[7] |
AMERINI I , BALLAN L , CALDELLI R , et al. Copy-move forgery detection and localization by means of robust clustering with J-linkage[J]. Signal Processing:Image Communication, 2013,28: 659-669.
|
[8] |
LOWE D G . Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004,60(2): 91-110.
|
[9] |
BAY H , ESS A , TUYTELAARS T , et al. Speeded-up robust features (SURF)[J]. Computer Vision and Image Understanding, 2008,110(3): 346-359.
|
[10] |
SHIVAKUMAR B , SANTHOSH BABOO S . Detection of region duplication forgery in digital images using SURF[J]. International Journal of Computer Science Issues (IJCSI), 2011,8(4): 199-205.
|
[11] |
BO X , JUNWEN W , GUANGJIE L , et al. Image copy-move forgery detection based on SURF[A]. Proceeding of the Multimedia Information Networking and Security (MINES),2010 International Conference on[C]. 2010. 889-892.
|
[12] |
QI F , WEIHONG X , QIANG L . Research of image matching based on improved SURF algorith[J]. Telkomnika Indonesian Journal of Elec-trical Engineering, 2014,12(2): 1395-1402.
|
[13] |
PANG Y , LI W , YUAN Y , et al. Fully affine invariant SURF for image matching[J]. Neurocomputing, 2012,85: 6-10.
|
[14] |
PAN X , LYU S . Region duplication detection using image feature matching[J]. Information Forensics and Security,IEEE Transactions on, 2010,5(4): 857-867.
|
[15] |
GUO X , CAO X . MIFT:A framework for feature descriptors to be mirror reflection invariant[J]. Image and Vision Computing, 2012,30: 546-556.
|
[16] |
KAKAR P , SUDHA N . Exposing postprocessed copy paste forgeries through transform-invariant features[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3): 1018-1028.
|
[17] |
AMERINI I , BALLAN L , CALDELLI R , et al. A sift-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 1099-1110.
|
[18] |
FISCHLER M A , BOLLES R C . Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography[J]. Communications of the ACM, 1981,24(6): 381-395.
|
[19] |
SUZUKI S . Topological structural analysis of digitized binary images by border following[J]. Computer Vision,Graphics,and Image Processing, 1985,30(1): 32-46.
|
[20] |
JEGOU H , DOUZE M , SCHMID C . Hamming embedding and weak geometric consistency for large scale image search[A]. Proceeding of the 10th European conference on Computer vision[C]. Berlin Heidelberg, 2008. 304-317.
|