Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference30 articles.
1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copy-move attack detection and transformation recovery. Information Forensics and Security. IEEE Transactions on 6:1099–1110. https://doi.org/10.1109/TIFS.2011.2129512
2. Behnaz E, Ahad H, Amirhossein T (2019) A probabilistic framework for copy-move forgery detection based on markov random field. Multimedia Tools and Applications
3. Christlein V, Riess C, Jordan J, Riess C, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. arXiv:1208.3665
4. Dijana T, Ivan Z, Sonja G, Mislay G (2013) Comofod - new database for copy-move forgery detection
5. Emre G, Guzin u, Mustafa U (2019), Detection of free-form copy-move forgery on digital images. Security and Communication Networks
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献