[1] REDI J A, TAKTAK W, DUGELAY J. Digital image forensics:a booklet for beginners[J]. Multimedia Tools and Applications, 2011, 51(1):133-162.
[2] 周萌萌,杨鸿波,高晶敏,等. 基于快速分块的复制-粘贴图像检测算法[J]. 计算机应用, 2016, 36(S1):117-121. (ZHOU M M, YANG H B, GAO J M, et al. Copy-move image detection algorithm based on fast blocking[J]. Journal of Computer Applications, 2016, 36(S1):117-121.)
[3] CHRISTLEIN V, RIESS C, JORDAN J, et al. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6):1841-1854.
[4] AMERINI I, BALLAN L, CALDELLI R, et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):1099-1110.
[5] LI J, LI X, YANG B, et al. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3):507-518.
[6] RYU S, KIRCHNER M, LEE M, et al. Rotation invariant localization of duplicated image regions based on zernike moments[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8):1355-1370.
[7] 林晶,黄添强,赖玥聪,等.采用量化离散余弦变换系数检测视频单帧连续多次复制粘贴篡改[J].计算机应用,2016,36(5):1356-1361.(LIN J, HUANG T Q, LAI Y C, et al. Detection of continuously and repeated copy-move forgery to single frame in videos by quantized DCT coefficients[J]. Journal of Computer Applications, 2016, 36(5):1356-1361.)
[8] ZIMBA M, SUN X. DWT-PCA (EVD) based copy-move image forgery detection[J]. International Journal of Digital Content Technology and Its Applications, 2011, 5(1):251-258.
[9] KANG X, WEI S. Identifying tampered regions using singular value decomposition in digital image forensics[C]//Proceedings of the 2008 International Conference on Computer Science and Software Engineering. Piscataway, NJ:IEEE, 2008:926-930.
[10] KAKAR P, SUDHA N. Exposing postprocessed copy-paste forgeries through transform-invariant features[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):1018-1028.
[11] 柴建伟,刘婷.改进的SIFT耦合特征点集群的图像伪造检测算法[J]. 西南师范大学学报(自然科学版),2018,43(3):34-41.(CHAI J W, LIU T. Image forgery detection algorithm based on improved SIFT coupled feature point clustering[J]. Journal of Southwest China Normal University (Natural Science Edition), 2018, 43(3):34-41.)
[12] SHIVAKUMAR B L, BABOO S S. Detection of region duplication forgery in digital images using SURF[J]. International Journal of Computer Science Issues, 2011, 8(4):199-205.
[13] 陈辉映,张大兴,杨珊珊,等.基于SURF的图像多区域复制粘贴篡改检测[J].计算机工程与设计,2018,39(8):2593-2597.(CHEN H Y, ZHANG D X, YANG S S, et al. Image multiple copy-move forgery detection based on SURF algorithm[J]. Computer Engineering and Design, 2018, 39(8):2593-2597.)
[14] WANG Z, FAN B, WU F. Local intensity order pattern for feature description[C]//Proceedings of the 2011 International Conference on Computer Vision. Piscataway, NJ:IEEE, 2011:603-610.
[15] 邹玮刚,周志辉,王洋.基于非降采样轮廓波变换的图像修复算法[J].计算机应用,2017,37(2):553-558.(ZOU W G, ZHOU Z H, WANG Y. Image inpainting algorithm based on non-subsampled contourlet transform[J]. Journal of Computer Applications, 2017, 37(2):553-558.)
[16] MATAS J, CHUM O, URBAN M, et al. Robust wide-baseline stereo from maximally stable extremal regions[J]. Image and Vision Computing, 2004, 22(10):761-767.
[17] FAN B, WU F, HU Z. Rotationally invariant descriptors using intensity order pooling[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012, 34(10):2031-2045.
[18] 勾承甫,陈斌,赵雪专,等.基于随机一致性采样估计的目标跟踪算法[J]. 计算机应用,2016,36(9):2566-2569.(GOU C F, CHEN B, ZHAO X Z, et al. Object tracking algorithm based on random sampling consensus estimation[J]. Journal of Computer Applications, 2016, 36(9):2566-2569.) |