[1]MISHRA M, ADHIKARY F. Digital image tamper detection techniques〖CD*2〗a comprehensive study [J]. International Journal of Computer Science and Business Informatics, 2013,2(1):73-85.
[2]COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing, 1997,6(12):1673-1687.
[3]NIKOLAIDIS N, PITAS I. Copyright protection of images using robust digital signatures [C]// Proceedings of the 1996 International Conference on Acoustics, Speech, and Signal Processing. Washington, DC: IEEE Computer Society, 1996,4:2168-2171.
[4]BATTISTI F, CARLI M, NERI A. Image forgery detection by means of no-reference quality metrics [C]// Proceedings of the 2012 SPIE Conference on Media Watermarking, Security, and Forensics. Bellingham: SPIE, 2012: 8303-8317.
[5]DOYODDORJ M, RHEE K. A blind forgery detection scheme using image compatibility metrics [C] // Proceedings of the 2013 IEEE International Symposium on Industrial Electronics. Piscataway: IEEE Press, 2013:1-6.
[6]CIPTASARI R W, RHEE K H, SAKURAI K. Image splicing verification based on pixel-based alignment method [C]// IWDW '12: Proceedings of the 11th International Conference on Digital Forensics and Watermarking. Berlin: Springer-Verlag, 2013:198-212.
[7]SHAO H, YU T, XU M, et al. Image region duplication detection based on circular window expansion and phase correlation [J]. Forensic Science International, 2012,222(1/2/3):71-82.
[8]SHI Y Q, CHEN C, CHEN W. A natural image model approach to splicing detection [C]// MM&Sec '07: Proceedings of the 9th Workshop on Multimedia and Security. New York: ACM, 2007:51-62.
[9]Columbia DVMM Research Lab. Columbia image splicing detection evaluation dataset [EB/OL]. [2013-05-10]. http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm.
[10]HE Z, LU W, SUN W, et al. Digital image splicing detection based on Markov features in DCT and DWT domain [J]. Pattern Recognition, 2012,45(12):4292-4299.
[11]WU Q, FU Z. Robust image sequence auto-mosaic method [J]. Journal of Computer Applications, 2012,32(2):499-503.(吴庆双,付仲良.一种鲁棒的序列图像自动拼接方法[J].计算机应用,2012,32(2):499-503.)
[12]DAUBECHIES I. Ten lectures on wavelets [M]. Philadelphia: The Society for Industrial and Applied Mathematics, 1992.
[13]HU R, ZHANG T, GAO H. Blind extraction algorithm of spread-spectrum watermark based on discrete wavelet transform and discrete cosine transform domain [J]. Journal of Computer Applications, 2013,33(1):138-141. (胡然,张天琪,高鸿兴.基于离散小波变换和离散余弦变换域的扩频水印盲提取算法[J].计算机应用,2013,33(1):138-141.)
[14]CROUSE M S, NOWAK R D, BARANIUK R G. Wavelet-based statistical signal processing using hidden Markov models [J]. IEEE Transactions on Signal Processing, 1998,46(4):886-902.
[15]FU D, SHI Y Q, SU W. Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition [C]// IWDW '06: Proceedings of the 5th International Workshop on Digital Watermarking. Berlin: Springer-Verlag, 2006:177-187.
[16]FARID H, LYU S. Higher-order wavelet statistics and their application to digital forensics [C]// CVPRW '03: Proceedings of the 2003 Conference on Computer Vision and Pattern Recognition Workshop. Piscataway: IEEE Press, 2003:94-101.
[17]Columbia DVMM Research Lab. Columbia uncompressed image splicing detection evaluation dataset [EB/OL]. [2013-06-02]. http://www.ee.columbia.edu/ln/dvmm/downloads/authsplcuncmp/.
[18]HSU Y F, CHANG S F. Detecting image splicing using geometry invariants and camera characteristics consistency [C]// Proceedings of the 2006 International Conference on Multimedia and Expo. Piscataway: IEEE Press, 2006:549-552.
[19]CHANG C C, LIN C J. LIBSVM: a library for support vector machines [J]. ACM Transactions on Intelligent Systems and Technology, 2011,2(3):1-27. |