[1] WU Y,ABDALMAGEED W,NATARAJAN P.BusterNet:detecting copy-move image forgery with source/target localization[C]//Proceedings of the 15th European Conference on Computer Vision.Berlin,Germany:Springer,2018:8-14. [2] PAN X Y,LYU S W.Region duplication detection using image feature matching[J].IEEE Transactions on Information Forensics and Security,2010,5(4):857-867. [3] AMERINI I,BALLAN L,CALDELLI R,et al.A SIFT-based forensic method for copy-move attack detection and transformation recovery[J].IEEE Transactions on Information Forensics and Security,2011,6(3):1099-1110. [4] LI J,LI X L,YANG B,et al.Segmentation-based image copy-move forgery detection scheme[J].IEEE Transactions on Information Forensics and Security,2015,10(3):507-518. [5] SHIVAKUMAR B L,SANTHOSH B S.Detection of region duplication forgery in digital images using SURF[J].International Journal of Computer Science Issues,2011,8(4):199-205. [6] SILVA E,CARVALHO T,FERREIRA A,et al.Going deeper into copy-move forgery detection:exploring image telltales via multi-scale analysis and voting processes[J].Journal of Visual Communication and Image Representation,2015,29(5):16-32. [7] WANG C Y,ZHANG Z,LI Q W,et al.An image copy-move forgery detection method based on SURF and PCET[J].IEEE Access,2019,7:170032-170047. [8] MAHDIAN B,SAIC S.Detection of copy-move forgery using a method based on blur moment invariants[J].Forensic Science International,2007,171(2):180-189. [9] 胡涛,佃松宜,蒋荣华.基于长短时记忆神经网络的硬件木马检测[J].计算机工程,2020,46(7):110-115. HU T,DIAN S Y,JIANG R H.Hardware trojan detection based on long short-term memory neural network[J].Computer Engineering,2020,46(7):110-115.(in Chinese) [10] LI G H,WU Q,TU D,et al.A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C]//Proceedings of 2007 IEEE International Conference on Multimedia and Expo.Washington D.C.,USA:IEEE Press,2007:1-10. [11] RYU S J,KIRCHNER M,LEE M J,et al.Rotation invariant localization of duplicated image regions based on zernike moments[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1355-1370. [12] COZZOLINO D,POGGI G,VERDOLIVA L.Efficient dense-field copy-move forgery detection[J].IEEE Transactions on Information Forensics and Security,2015,10(11):2284-2297. [13] LI L D,LI S S,ZHU H C.An efficient scheme for detecting copy-move forged images by local binary patterns[J].Journal of Information Hiding and Multimedia Signal Processing,2013,4(1):46-56. [14] PUN C M,YUAN X C,BI X L.Image forgery detection using adaptive oversegmentation and feature point matching[J].IEEE Transactions on Information Forensics and Security,2015,10(8):1705-1716. [15] LIN Y,DOLLAR P,GIRSHICK R,et al.Feature pyramid networks for object detection[C]//Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition.Washington D.C.,USA:IEEE Press,2017:1-15. [16] WU Y,ABD-ALMAGEED W,NATARAJAN P.Image copy-move forgery detection via an end-to-end deep neural network[C]//Proceedings of 2018 IEEE Winter Conference on Applications of Computer Vision.Washington D.C.,USA:IEEE Press,2018:1-10. [17] TRALIC D,ZUPANCIC I,GRGIC S,et al.CoMoFoD-new database for copy-move forgery detection[C]//Proceedings of ELMAR-2013.Washington D.C.,USA:IEEE Press,2013:1-12. [18] LIU Y,GUAN Q,ZHAO X.Copy-move forgery detection based on convolutional kernel network[J].Multimedia Tools and Applications,2017(11):1-25. [19] WU Y,ABD-ALMAGEED W,NATARAJAN P.Deep matching and validation network:an end-to-end solution to constrained image splicing localization and detection[C]//Proceedings of the 25th ACM international conference on Multimedia.New York,USA:ACM Press,2017:1480-1502. [20] WU Y,ABDALMAGEED W,NATARAJAN P.ManTra-Net:manipulation tracing network for detection and localization of image forgeries with anomalous features[C]//Proceedings of 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition.Washington D.C.,USA:IEEE Press,2019:1-10. |