[1] 李亚琴.利用图像纹理和边缘特征的数字水印方法[J].计算机工程与应用,2010,46(22):124-125.[2] 段保护,王键.数字签名技术的新探讨[J].计算机工程与科学,2009,31(4):84-86.[3] FRIDRICH J, SOUKAL D, LUKAS J. Detection of copy-move forgery in digital images [C]// Proceedings of Digital Forensic Research Workshop. Washington, DC: IEEE Computer Society, 2003: 55-61.[4] POPESCU A C, FARID H. Exposing digital forgeries by detecting duplicated image regions, TR2004-515 [R]. Hanover, NH, USA: Dartmouth College, 2004.[5] MAHDIAN B, SAIC S. Detection of copy-move forgery using a method based on blur moment invariants [J]. Forensic Science International, 2007, 171 (2/3): 180-189.[6] 骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007.[7] HUANG H, GUO W, ZHANG Y. Detection of copy-move forgery in digital images using SIFT algorithm [C]// IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Washington, DC: IEEE Computer Society, 2008: 272-276.[8] AMERINI I, BALLAN L, CALDELLI R, et al. Geometric tampering estimation by means of a SIFT-based forensic analysis [C]// Proceeding of IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ: IEEE Press, 2010: 1702-1705.[9] 张志,董福安,伍友利.二维灰度图像的分形维数计算[J].计算机应用,2005,25(12):2853-2854.[10] SARKAR N, CHAUDHURI B B. An efficient differential box-counting approach to compute fractal dimension of image [J]. IEEE Transactions on Systems, Man and Cybernetics, 1994, 24(1): 115-120.[11] BISWAS M K, GHOSE T. Fractal dimension estimation for texture image: A parallel approach [J]. Pattern Recognition Letters, 1998, 19(3/4): 309-313.[12] 曹伟国.旋转与缩放的纹理不变量研究[D].山东东营:中国石油大学,2007.[13] 张伟,何金国.HU不变矩的构造与推广[J].计算机应用,2010,30(9):2449-2452.[14] FARID H. Exposing digital forgeries in scientific images [C]// Proceeding of the 8th Workshop on Multimedia and Security. New York: ACM Press, 2006: 29-36. |