[1]GALLAGHER A C. Detection of linear and cubic interpolation in JPEG compressed images[C]// Proceedings of the Second Canadian Conference on Computer and Robot Vision. Piscataway: IEEE Press, 2005: 65-72.
[2]SONG G S, YUN Y I, LEE W H. A new estimation approach of resampling factors using threshold-based peak detection[C]// Proceedings of the 2011 IEEE International Conference on Consumer Electronics. Piscataway: IEEE Press, 2011: 731-732.
[3]PFENNIG S, KIRCHNER M. Spectral methods to determine the exact scaling factor of resampled digital images[C]// Proceedings of the Fifth International Symposium on Communications Control and Signal Processing. Piscataway: IEEE Press, 2012: 1-6.
[4]RYU S J, LEE H K. Estimation of linear transformation by analyzing the periodicity of interpolation [J]. Pattern Recognition Letters, 2014,36: 89-99.
[5]BRAVO S S, NANDI A K. Automated detection and localization of duplicated regions affected by reflection, rotation and scaling in image forensics [J]. Signal Processing, 2011, 91(8): 1759-1770.
[6]KELLER Y, AVERBUCH A, ISRAELI M. Pseudo-polar based estimation of large translations rotations and scalings in images[C]// Proceedings of the Seventh IEEE Workshops on Application of Computer Vision. Piscataway: IEEE Press, 2005,1: 201-206.
[7]WU Q, WANG S, ZHANG X. Log-polar based scheme for revealing duplicated regions in digital images [J]. Signal Processing Letters, 2011, 18(10): 559-562.
[8]VAZQUEZ P D, PEREZ G F. Prefilter design for forensic resampling estimation[C]// Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security. Piscataway: IEEE Press, 2011: 1-6.
[9]FENG X, COX I J, DOERR G. Normalized energy density-based forensic detection of resampled images [J]. IEEE Transactions on Multimedia, 2012, 14(3): 536-545.
[10]RYU S J, KIRCHNER M, LEE M J, et al. Rotation invariant localization of duplicated image regions based on Zernike moments [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1355-1370.
[11]HSU H C, WANG M S. Detection of copy-move forgery image using Gabor descriptor[C]// Proceedings of the 2012 International Conference on Anti-Counterfeiting, Security and Identification. Piscataway: IEEE Press,2012: 1-4.
[12]AVERBUCH A, COIFMAN R R, DONOHO D L, et al. Fast and accurate polar Fourier transform [J]. Applied and Computational Harmonic Analysis, 2006, 21(2): 145-167.
[13]LIU Q, SUNG A H, RIBEIRO B, et al. Image complexity and feature mining for steganalysis of least significant bit matching steganography[J]. Information Sciences, 2008, 178(1): 21-36. |