| 1 |
CHRISTLEIN V, RIESS C, JORDAN J, et al. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1841- 1854.
doi: 10.1109/TIFS.2012.2218597
|
| 2 |
PAN X Y, LYU S W. Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 857- 867.
doi: 10.1109/TIFS.2010.2078506
|
| 3 |
KOUL S, KUMAR M, KHURANA S S, et al. An efficient approach for copy-move image forgery detection using convolution neural network. Multimedia Tools and Applications, 2022, 81(8): 11259- 11277.
doi: 10.1007/s11042-022-11974-5
|
| 4 |
SABEENA M, ABRAHAM L. Convolutional block attention based network for copy-move image forgery detection. Multimedia Tools and Applications, 2024, 83(1): 2383- 2405.
doi: 10.1007/s11042-023-15649-7
|
| 5 |
Abhishek, JINDAL N. Copy move and splicing forgery detection using deep convolution neural network, and semantic segmentation. Multimedia Tools and Applications, 2021, 80(3): 3571- 3599.
doi: 10.1007/s11042-020-09816-3
|
| 6 |
LIU M Y, TUZEL O, RAMALINGAM S, et al. Entropy-rate clustering: cluster analysis via maximizing a submodular function subject to a matroid constraint. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2013, 36(1): 99- 112.
|
| 7 |
任国贞, 江涛. 基于灰度共生矩阵的纹理提取方法研究. 计算机应用与软件, 2014, 31(11): 190-192, 325.
|
|
REN G Z, JIANG T. Study on GLCM-based texture extraction methods. Computer Applications and Software, 2014, 31(11): 190-192, 325.
|
| 8 |
MAINALI P, LAFRUIT G, TACK K, et al. Derivative-based scale invariant image feature detector with error resilience. IEEE Transactions on Image Processing, 2014, 23(5): 2380- 2391.
doi: 10.1109/TIP.2014.2315959
|
| 9 |
MAINALI P, LAFRUIT G, YANG Q, et al. SIFER: scale-invariant feature detector with error resilience. International Journal of Computer Vision, 2013, 104(2): 172- 197.
doi: 10.1007/s11263-013-0622-3
|
| 10 |
LOWE D G. Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision, 2004, 60(2): 91- 110.
doi: 10.1023/B:VISI.0000029664.99615.94
|
| 11 |
BAY H, ESS A, TUYTELAARS T, et al. Speeded-up Robust Features (SURF). Computer Vision and Image Understanding, 2008, 110(3): 346- 359.
doi: 10.1016/j.cviu.2007.09.014
|
| 12 |
WANG X Y, LIU Y N, HAN M M, et al. Local quaternion PHT based robust color image watermarking algorithm. Journal of Visual Communication and Image Representation, 2016, 38, 678- 694.
doi: 10.1016/j.jvcir.2016.04.011
|
| 13 |
REN H, PING Z, BO W, et al. Multidistortion-invariant image recognition with radial harmonic Fourier moments. Journal of the Optical Society of America A-Optics Image Science and Vision, 2003, 20(4): 631- 637.
doi: 10.1364/JOSAA.20.000631
|
| 14 |
WANG C P, WANG X Y, XIA Z Q. Geometrically invariant image watermarking based on fast radial harmonic Fourier moments. Signal Processing: Image Communication, 2016, 45, 10- 23.
doi: 10.1016/j.image.2016.03.007
|
| 15 |
WANG X Y, LI W Y, YANG H Y, et al. Invariant quaternion radial harmonic Fourier moments for color image retrieval. Optics & Laser Technology, 2015, 66, 78- 88.
|
| 16 |
BEIS J, LOWE D. Shape indexing using approximate nearest-neighbour search in high-dimensional spaces[C]//Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Washington D. C., USA: IEEE Press, 1997: 1000-1006.
|
| 17 |
李岩, 刘念, 张斌, 等. 一种基于逆序广义2近邻的图像多重复制粘贴篡改检测算法. 电子与信息学报, 2015, 37(7): 1667- 1673.
|
|
LI Y, LIU N, ZHANG B, et al. Image multiple copy-move forgery detection algorithm based on reversed-generalized 2 nearest-neighbor. Journal of Electronics & Information Technology, 2015, 37(7): 1667- 1673.
|
| 18 |
AMERINI I, BALLAN L, CALDELLI R, et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Processing: Image Communication, 2013, 28(6): 659- 669.
doi: 10.1016/j.image.2013.03.006
|
| 19 |
FISCHLER M A, BOLLES R C. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Communications of the ACM, 1981, 24(6): 381- 395.
doi: 10.1145/358669.358692
|
| 20 |
李超, 于飞, 康晓军. 一种模板匹配的快速实现方法. 航天返回与遥感, 2016, 37(1): 63- 70.
|
|
LI C, YU F, KANG X J. A fast method of template matching. Spacecraft Recovery & Remote Sensing, 2016, 37(1): 63- 70.
|
| 21 |
COZZOLINO D, POGGI G, VERDOLIVA L. Efficient dense-field copy-move forgery detection. IEEE Transactions on Information Forensics and Security, 2015, 10(11): 2284- 2297.
doi: 10.1109/TIFS.2015.2455334
|
| 22 |
ARDIZZONE E, BRUNO A, MAZZOLA G. Copy-move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensics and Security, 2015, 10(10): 2084- 2094.
doi: 10.1109/TIFS.2015.2445742
|
| 23 |
陈文霞, 魏伟一, 陶洪. 基于深度特征提取和图神经网络匹配的图像复制粘贴篡改检测. 光电子·激光, 2023, 34(6): 610- 619.
|
|
CHEN W X, WEI W Y, TAO H. Image copy-move forgery detection based on depth feature extraction and graph neural network matching. Journal of Optoelectronics ·Laser, 2023, 34(6): 610- 619.
|
| 24 |
魏伟一, 赵毅凡, 陈帼. 基于深度特征提取和DCT变换的图像复制粘贴篡改检测. 计算机工程与科学, 2023, 45(1): 163- 170.
|
|
WEI W Y, ZHAO Y F, CHEN G. Image copy-move forgery detection based on deep feature extraction and DCT transform. Computer Engineering & Science, 2023, 45(1): 163- 170.
|
| 25 |
AMERINI I, BALLAN L, CALDELLI R, et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1099- 1110.
doi: 10.1109/TIFS.2011.2129512
|
| 26 |
BRAVO-SOLORIO S, NANDI A K. Exposing duplicated regions affected by reflection, rotation and scaling[C]//Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. Washington D. C., USA: IEEE Press, 2011: 1880-1883.
|
| 27 |
PUN C M, YUAN X C, BI X L. Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1705- 1716.
doi: 10.1109/TIFS.2015.2423261
|
| 28 |
BANDARU R, NAIK D. Retrieve the similar matching images using reduced SIFT with CED algorithm[C]//Proceedings of 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies. Washington D. C., USA: IEEE Press, 2014: 1242-1247.
|
| 29 |
XU B, WANG J W, LIU G J, et al. Image copy-move forgery detection based on SURF[C]//Proceedings of 2010 International Conference on Multimedia Information Networking and Security. Washington D. C., USA: IEEE Press, 2010: 889-892.
|
| 30 |
WANG J W, LIU G J, LI H Y, et al. Detection of image region duplication forgery using model with circle block[C]//Proceedings of the International Conference on Multimedia Information Networking and Security. Washington D. C., USA: IEEE Press, 2009: 25-29.
|