[1] |
CHEN W , SHI Y Q , SU W . Image splicing detection using 2-D phase congruency and statistical moments of characteristic function[C]// Security,Steganography,& Watermarking of Multimedia Contents IX.International Society for Optics and Photonics. 2007, 6505:65050R.
|
[2] |
WANG W , DONG J , TAN T . Effective image splicing detection based on image chroma[C]// IEEE International Conference on Image Processing. IEEE, 2009: 1257-1260.
|
[3] |
ZHAO X , LI J , LI S ,et al. Detecting digital image splicing in chroma spaces[J]. Lecture Notes in Computer Science, 2010,6526: 12-22.
|
[4] |
GOU H , SWAMINATHAN A , WU M . Noise features for image tampering detection and steganalysis[C]// IEEE International Conference on Image Processing. IEEE, 20076: VI-97.
|
[5] |
HSU Y F , CHANG S F . Detecting image splicing using geometry invariants and camera characteristics consistency[C]// IEEE International Conference on Multimedia & Expo. IEEE, 2006: 549-552.
|
[6] |
MAHDIAN B , SAIC S . Detection of resampling supplemented with noise inconsistencies analysis for image forensics[C]// International Conference on Computational Sciences and its Applications. 2008: 546-556.
|
[7] |
JOHNSON M K , FARID H . Exposing digital forgeries through specular highlights on the eye[C]// Information Hiding,Lecture Notes in Computer Science. Springer, 2007: 311-325.
|
[8] |
JOHNSON M K , FARID H . Exposing digital forgeries in complex lighting environments[J]. IEEE Transactions on Information Forensics and Security, 2007,2(3): 450-461.
|
[9] |
YE S , SUN Q , CHANG E C . Detecting digital image forgeries by measuring inconsistencies of blocking artifact[C]// IEEE International Conference on Multimedia & Expo. IEEE, 2007: 12-15.
|
[10] |
LIN Z , HE J , TANG X ,et al. Fast,automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis[J]. Pattern Recognition, 2009,42(11): 2492-2501.
|
[11] |
LUO W , HUANG J , QIU G . JPEG error analysis and its applications to digital image forensics[J]. IEEE Transactions on Information Forensics and Security, 2010,5(3): 480-491.
|
[12] |
BIANCHI T , DE ROSA A , PIVA A . Improved DCT coefficient analysis for forgery localization in JPEG images[C]// IEEE International Conference on Acoustics. IEEE, 2011: 2444-2447.
|
[13] |
ZHAO Y , WANG S , ZHANG X ,et al. Robust hashing for image authentication using zernike moments and local features[J]. IEEE Transactions on Information Forensics and Security, 2013,8(1): 55-63.
|
[14] |
WANG X , PANG K , ZHOU X ,et al. A visual model-based perceptual image hash for content authentication[J]. IEEE Transactions on Information Forensics and Security, 2015,10(7): 1336-1349.
|
[15] |
TANG Z , ZHANG X , LI X ,et al. Robust image hashing with ring partition and invariant vector distance[J]. IEEE Transactions on Information Forensics and Security, 2015,11(1): 200-214.
|
[16] |
YAN C P , PUN C M , YUAN X C . Quaternion-based image hashing for adaptive tampering localization[J]. IEEE Transactions on Information Forensics and Security, 2016,12(9): 2144-2158.
|
[17] |
RAO Y , NI J . A deep learning approach to detection of splicing and copy-move forgeries in images[C]// IEEE International Workshop on Information Forensics & Security. IEEE, 2017: 1-6.
|
[18] |
ZHANG Y , WIN L L , GOH J ,et al. Image region forgery detection:a deep learning approach[C]// The Singapore Cyber-Security Conference (SG-CRC). 2016: 1-11.
|
[19] |
BAPPY J H , ROYCHOWDHURY A K , BUNK J ,et al. Exploiting spatial structure for localizing manipulated image regions[C]// IEEE International Conference on Computer Vision. IEEE Computer Society, 2017: 4970-4979.
|
[20] |
YANG W , BI X L , XIAO B . C2R net:the coarse to refined network for image forgery detection[C]// The International Conference on Big Data Science and Engineering. IEEE, 2018: 1656-1659.
|
[21] |
RONNEBERGER O , FISCHER P , BROX T . U-Net:convolutional networks for biomedical image segmentation[C]// International Conference on Medical Image Computing & Computer-assisted Intervention. IEEE, 2015: 234-241.
|
[22] |
KR H H , KOLTUN V . Efficient inference in fully connected CRFs with Gaussian edge potentials[C]// Conference and Workshop on Neural Information Processing Systems. 2012: 109-117.
|
[23] |
IOFFE S , SZEGEDY C . Batch normalization:accelerating deep network training by reducing internal covariate shift[J]. arXiv:1502.03167,
|
[24] |
LIN T Y , GOYAL P , GIRSHICK R ,et al. Focal loss for dense object detection[C]// The IEEE International Conference on Computer Vision. 2017: 2980-2988.
|
[25] |
SHORE J , JOHNSON R . Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy[J]. IEEE Transactions on Information Theory, 1980,26(1): 26-37.
|
[26] |
CASIA. CASIA tampered image detection evaluation database(TIDE):v2.0[S]. Institute of Automation,Chinese Academy of Sciences, 2015.
|
[27] |
LI W , YUAN Y , YU N . Passive detection of doctored JPEG image via block artifact grid extraction[J]. Signal Processing, 2009,89(9): 1821-1829.
|
[28] |
FARID H . Exposing digital forgeries from JPEG ghosts[J]. IEEE Transactions on Information Forensics & Security, 2009,4(1): 154-160.
|
[29] |
DIRIK A E , MEMON N D . Image tamper detection based on demosaicing artifacts[C]// The International Conference on Image Processing. IEEE, 2009: 1497-1500.
|
[30] |
BIANCHI T , PIVA A . Image forgery localization via block-grained analysis of JPEG artifacts[J]. IEEE Transactions on Information Forensics & Security, 2012,7(3): 1003-1017.
|
[31] |
ZAMPOGLOU M , PAPADOPOULOS S , KOMPATSIARIS Y . Large-scale evaluation of splicing localization algorithms for web images[J]. Multimedia Tools & Applications, 2017,76(1): 1-34.
|