Author:
Emam Mahmoud,Han Qi,Niu Xiamu
Funder
National Natural Science Foundation of China
Fundamental Research Funds for the Central Universities
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference22 articles.
1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A sift-based forensic method for copyCmove attack detection and transformation recovery. IEEE Trans Inf Forensic Secur 6(3):1099–1110
2. Bayram S, Sencar HT, Memon N (2009) An efficient and robust method for detecting copy-move forgery. In: Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on (pp 1053-1056). IEEE
3. Christlein V, Riess C, Angelopoulou E (2010) A Study on Features for the Detection of Copy-Move Forgeries. In: Sicherheit, vol 2010, pp 105–116
4. Christlein V, Riess C, Jordan J, Angelopoulou E (2012) An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensic Secur 7 (6):1841–1854
5. Christlein V, Riess C, Jordan J, Angelopoulou E (2012) Supplemental Material to an Evaluation of Popular Copy-Move Forgery Detection Approaches Aug. 2012 [Online]. Available: http://www.arxiv.org/abs/1208.3665
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献