] Vargas-Munoz JE, Dos Santos JA, Rocha

             Amerini,I., Ballan, L., Caldelli, R., Bimbo, A. Del, Serra G. “A SIFT-BasedForensic Method for Copy – Move Attack Detection and Transformation Recovery”.

IEEE Trans Inf Forensics Secur , vol. 6, pp.1099–1110, 2011.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

2         Amerini I,Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G. “Copy-moveforgery detection and localization by means of robust clustering with J-Linkage”.Signal Process Image Commun , vol.

28, pp.659–669, 2013.3         Ardizzone E,Bruno A, Mazzola G. “Copy-Move Forgery Detection by Matching Trianglesof Keypoints”.

IEEE Trans Inf Forensics Secur , vol. 10,pp.2084–2094, 2015.

4         Bashar M,Noda K, Ohnishi N, Mori K. “Exploring duplicated regions in naturalimages”. IEEE Trans image Process , vol. PP, pp.1–40, 2010.5         Bi X, Pun C,Yuan X.

“Multi-Level Dense Descriptor and Hierarchical Feature Matchingfor Copy – Move Forgery Detection”. Inf Sci (Ny) , vol. 345,pp.1–17, 2016.6         Bi X, PunCM, Yuan XC. “Multi-Level Dense Descriptor and Hierarchical FeatureMatching for Copy-Move Forgery Detection”. Inf Sci (Ny) , vol.

345, pp.226–242, 2016.7         Cao Y, GaoT, Fan L, Yang Q. “A robust detection algorithm for copy-move forgery indigital images”.

Forensic Sci Int , vol. 214, pp.33–43, 2012.8         ChristleinV, Riess C, Jordan J, Riess C, Angelopoulou E. “An evaluation ofpopular copy-move forgery detection approaches”. IEEE Trans InfForensics Secur , vol.

7, pp.1841–1854, 2012.9         Cozzolino D,Poggi G, Verdoliva L. “Copy-move forgery detection based on PatchMatch”.,pp. 5312–5316, 2014.

10       Cozzolino D,Poggi G, Verdoliva L. “Efficient Dense-Field Copy-Move ForgeryDetection”. IEEE Trans Inf Forensics Secur , vol.

10,pp.2284–2297, 2015.11       Ferreira A,Felipussi SC, Alfaro C, Fonseca P, Vargas-Munoz JE, Dos Santos JA, Rocha A.”Behavior Knowledge Space-Based Fusion for Copy-Move Forgery Detection”.

IEEE Trans Image Process , vol. 25, pp.4729–4742, 2016.12       Fridrich J,Soukal D, Lukáš J.

“Detection of Copy-Move Forgery in Digital Images”.Digit Forensic Res Work , vol. 3, pp.652–663, 2003.13       Gürbüz E,Uluta? G, Uluta? M.

“Rotation Invariant Copy Move Forgery DetectionMethod”. ,pp. 202–206, 2015.14       Huang Y, LuW, Sun W, Long D. “Improved DCT-based detection of copy-move forgery inimages”. Forensic Sci Int , vol. 206, pp.178–184, 2011.

15       Krommweh J.”Tetrolet transform?: A new adaptive Haar wavelet algorithm for sparseimage representation”. J Vis Commun Image Represent , vol. 21,pp.364–374, 2010.16       Lee JC.”Copy-move image forgery detection based on Gabor magnitude”.

JVis Commun Image Represent , vol. 31, pp.320–334, 2015.17       Lee JC, ChangCP, Chen WK.

“Detection of copy-move image forgery using histogram oforientated gradients”. Inf Sci (Ny) , vol. 321, pp.250–262,2015.18       Li J, Li X,Yang B, Sun X. “Segmentation-based image copy-move forgery detectionscheme”. IEEE Trans Inf , vol.

10, pp.507–518, 2015.19       Li J, Li X,Yang B, Sun X. “Segmentation-based image copy-move forgery detectionscheme”. IEEE Trans Inf Forensics Secur , vol.

10, pp.507–518,2015.20       Liu Y, GuanQ, Zhao X. “Copy-move forgery detection based on convolutional kernelnetwork”. ,pp.

1–25, 2017.21       Lu C, LiaoHM, Member S. “Structural Digital Signature for Image Authentication?:An Incidental Distortion Resistant Scheme”. IEEE Trans Multimed, vol. 5, pp.161–173, 2003.22       Luo W, JiwuH. “Robust Detection of Region-Duplication Forgery in Digital Image”.

18th Int Conf Pattern Recognit , vol. 4, pp.746–749, 2006.23       Ng T-T, ChangS-F.

“A Data Set of Authentic and Spliced Image Blocks”. ,2004.24       Pan X, Lyu S.”Region duplication detection using image feature matching”.

IEEETrans Inf Forensics Secur , vol. 5, pp.857–867, 2010.25       Popescu A,Farid H. “Exposing Digital Forgeries by Detecting Duplicated ImageRegions”. Dartmouth College, Computer Science, Tech.

Rep. TR2004-515:2004.26       Pun C, MemberS, Yuan X, Bi X. “Oversegmentation and Feature Point Matching”.IEEE Trans Inf Forensics Secur , vol. 10, pp.

1705–1716, 2015.27       RaghuwanshiG, Tyagi V. “Texture image retrieval using adaptive tetrolet transforms”.

Digit Signal Process , vol. 48, pp.50–57, 2016.

28       Ryu SJ,Kirchner M, Lee MJ, Lee HK. “Rotation invariant localization ofduplicated image regions based on zernike moments”. IEEE Trans InfForensics Secur , vol. 8, pp.1355–1370, 2013.29       SergioSolorio Bravo, K.Nandi A.

“Automated detection and localisation ofduplicated regions affected by reflection, rotation and scaling in imageforensics”. ,pp. 1880–1883, 2011.30       ShivakumarBL, Baboo S. “Detection of Region Duplication Forgery in Digital ImagesUsing SURF”. Int J Comput Sci Issues, , vol.

8, pp.199–205,2011.31       Silva E,Carvalho T, Ferreira A, Rocha A.

“Going deeper into copy-move forgerydetection: Exploring image telltales via multi-scale analysis and votingprocesses”. J Vis Commun Image Represent , vol. 29, pp.16–32,2015.

32       Solomon W.Golomb. “Polyominoes”.

Princeton University Press,Princeton: 1994.33       Tralic D,Grgic S, Sun X, Rosin PL. “Combining cellular automata and local binarypatterns for copy-move forgery detection”. Multimed Tools Appl, vol. 75, pp.

16881–16903, 2016.34       Tralic D,Rosin PL, Sun X, Grgic S. “Detection of Duplicated Image Regions usingCellular Automata”. ,pp.

167–170, 2014.35       Tralic D,Zupancic I, Grgic S, Grgic M. “CoMoFoD – New Database for Copy-MoveForgery Detection”. ,pp. 25–27, 2013.

36       Ustubioglu B,Ulutas G, Ulutas M, Nabiyev V V. “A new copy move forgery detectiontechnique with automatic threshold determination”. AEU – Int JElectron Commun , vol. 70, pp.1076–1087, 2016.37       Wang S, ZhengD, Zhao J, Tam WJ, Speranza F. “An Image Quality Evaluation MethodBased on DigitalWatermarking”. IEEE Trans Circuits Syst VideoTechnol , vol.

17, pp.98–105, 2007.38       Wang X, Li S,Liu Y. “A new keypoint-based copy-move forgery detection for smallsmooth regions”.

Multimed Tools Appl , vol. 76, pp.23353–23382,2016.

39       Wenchang S,Fei Z, Bo Q, Bin L. “Improving image copy-move forgery detection withparticle swarm optimization techniques”. China Commun , vol.10, pp.139–149, 2016.40       Yang B, SunX, Guo H, Xia Z, Chen X.

“A copy-move forgery detection method based onCMFD-SIFT”. Multimed Tools Appl , 2017.41       Zandi M,Mahmoudi-Aznaveh A, Talebpour A. “Iterative Copy-Move Forgery DetectionBased on a New Interest Point Detector”.

IEEE Trans Inf ForensicsSecur , vol. 11, pp.2499–2512, 2016.42       Zhao F, ZhangR, Guo H, Zhang Y. “Effective Digital Image Copy-Move LocationAlgorithm Robust to Geometric Transformations”. In: IEEEInternational Conference on Signal Processing, Communications and Computing(ICSPCC). 2015.43       Zhao J, GuoJ.

“Passive forensics for copy-move image forgery using a method basedon DCT and SVD”. Forensic Sci Int , vol. 233, pp.158–166, 2013.

44       Zhu Y, ShenX, Chen H. “Copy-move forgery detection based on scaled ORB”. MultimedTools Appl , vol.

75, pp.3221–3233, 2016.

x

Hi!
I'm Ruth!

Would you like to get a custom essay? How about receiving a customized one?

Check it out