[1]FARID H.Seeing is not believing[J].IEEE Spectrum,2009,46(8):44-51.
[2]LI Jian,LI Xiaolong,YANG Bin,et al.Segmentation-based image copy-move forgery detection scheme[J].IEEE Transactions on Information Forensics & Security,2015,10(3):507-518.
[3]JIANG Xinghao,WANG Wan,SUN Tanfeng,et al.Detection of double compression in MPEG-4 videos based on markov statistics[J].IEEE Signal Processing Letters,2013,20(5):447-450.
[4]HE Peisong,JIANG Xinghao,SUN Tanfeng,et al.Double compression detection based on local motion vector field analysis in static-background videos[J].Journal of Visual Communication & Image Representation,2016,35:55-66.
[5]黄美玲,王让定,徐健,等.基于DCT系数统计特性的HEVC视频双压缩检测算法[J].光电子·激光,2015(4):733-739.
[6]SHANABLEH T.Detection of frame deletion for digital video forensics[J].Digital Investigation,2013,10(4):350-360.
[7]ZHANG Zhenzhen,HOU Jianjun,MA Qinglong,et al.Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames[J].Security & Communication Networks,2015,8(2):311-320.
[8]李晓梅.基于残留噪声相关性的视频篡改检测算法[J].信息技术,2013(10):103-105.
[9]苗立刚.视频监控中的图像拼接与合成算法研究[J].仪器仪表学报,2009,30(4):857-861.
[10]杨婧,任延珍,汪肇翔,等.基于差异能量的监控视频篡改检测算法[J].信息网络安全,2013(9):55-59.
[11]宋怡.基于空时域联合匹配的视频篡改检测算法[D].天津:天津大学,2012.
[12]MATHAI M,RAJAN D,EMMANUEL S.Video forgery detection and localization using normalized cross-correlation of moment features[C]//Proceedings of Image Analysis and Interpretation.Washington D.C.,USA:IEEE Press,2016:149-152.
[13]LI L,WANG X,ZHANG W,et al.Detecting removed object from video with stationary background[C]//Proceedings of International Conference on Digital Forensics and Watermaking.Berlin,Germany:Spinger-Verlay,2012:242-252.
[14]李倩,王让定,徐达文.基于视频修复的运动目标删除篡改行为的检测算法[J].光电子·激光,2016(2):182-190.
[15]王嘉萱,苏育挺.基于时序特征聚类的对象删除篡改检测[Z].2012.
[16]袁秀娟,黄添强,苏立超,等.基于边缘异常与压缩跟踪的视频抠像篡改检测[J].计算机工程,2014,40(7):267-271.
[17]刘雨青,黄添强.基于时空域能量可疑度的视频篡改检测与篡改区域定位[J].南京大学学报(自然科学),2014(1):61-71.
[18]郑红,李钊,李俊.灰度共生矩阵的快速实现和优化方法研究[J].仪器仪表学报,2012,33(11):2509-2515.
[19]薄华,马缚龙,焦李成.图像纹理的灰度共生矩阵计算问题的分析[J].电子学报,2006,34(1):155-158.
|