[1] HSU Y F, CHANG S F. Camera response functions for image forensics: an automatic algorithm for splicing detection [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 816-825. [2] CHEN M, FRIDRICH J, GOLJAN M, et al. Determining image origin and integrity using sensor noise [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 74-90. [3] FARID H, KEE E, BRIEN J. Exposing photo manipulation with inconsistent shadows [J]. ACM Transactions on Graphics, 2013, 32(4): 1-12. [4] LUO W, QU Z, HUANG J, et al. A novel method for detecting cropped and recompressed image block [C]//ICASSP 2007: Proceedings of the 2007 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ: IEEE, 2007, 2: 217-220. [5] SHI Y Q, CHEN C, CHEN W. A natural image model approach to splicing detection [C]//MM&Sec 2007: Proceedings of the 9th Workshop on Multimedia & Security. New York: ACM, 2007: 51-62. [6] HE Z, SUN W, LU W. Digital image splicing detection based on approximate run length [J]. Pattern Recognition Letters, 2011, 32(12): 1591-1597. [7] 王波, 孔维祥, 尤新刚. 利用颜色滤波矩阵估计原图的拼接定位盲取证[J]. 电子与信息学报, 2012, 34(1): 200-206. (WNAG B, KONG W X, YOU X G. A blind forensics method for image splicing based on original image estimation using color filter array interpolation [J]. Journal of Electronics & Information Technology, 2012, 34(1): 200-206.) [8] LU L, RONGRONG N, YAO Z, et al. Improved SIFT-based copy-move detection using BFSN clustering and CFA features[C]//Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway, NJ: IEEE, 2014, 2: 626-629. [9] 段新涛, 彭涛, 李飞飞, 等. 基于JPEG双量化效应的图像盲取证[J]. 计算机应用, 2015, 35(11): 3198-3202. (DUAN X T, PENG T, LI F F, et al. Blind image forensics based on JPEG double quantization effect[J]. Journal of Computer Applications, 2015, 35(11): 3198-3202.) [10] 高健, 李喜艳, 任孝锋. 基于CFA去马赛克的图像篡改检测技术研究[J]. 信息通信, 2015, 1(9): 1-3. (GAO J, LI X Y, REN X F. Research on image tamper detection technology based on CFA demosaicing [J]. Information & Communications, 2015, 1(9): 1-3.) [11] ALIN C, POPESCU, HANY F. Exposing digital forgeries in color filter array interpolated images[J]. IEEE Transactions on Signal Processing, 2005, 53(10): 3948-3959. [12] 李贺新. 图像篡改检测算法研究[D]. 保定: 河北大学, 2014: 1-52. (LI H X. Research on image forgery detection algorithm[D]. Haoding: Hebei University, 2014: 1-52.) [13] FERRARA P, BIANCHI T. Image forgery localization via fine-grained analysis of CFA artifacts[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(5): 1566-1577. [14] TENGFEI L, WEILI J. Automatic line segment registration using Gaussian mixture model and expectation-maximization algorithm[J]. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2014, 7(5): 1688-1699. [15] DVMM laboratory of columbia university. Columbia uncompressed image splicing detection evaluation dataset[EB/OL]. [2017-01-10]. http://www.ee.columbia.edu/ln/dvmm/downloads/authsplcuncmp/. [16] SIWEI L, XUNYU P, XING Z. Exposing region splicing forgeries with blind local noise estimation[J]. International Journal of Computer Vision, 2014, 110(2): 202-221. |