Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference36 articles.
1. Alahmadi A, Hussain M, Aboalsamh H, Muhammad G, Bebis G, Mathkour H (2017) Passive detection of image forgery using DCT and local binary pattern, Signal. Image and Video Processing 11(1):81–88
2. Alhussein M (2016). Image tampering detection based on local texture descriptor and extreme learning machine, Proceedings of18thInternational Conference on Computer Modelling and Simulation (UKSim), [18th: Cambridge, UK: April 2016], pp. 196-199.
3. Al-Qershi OM, Khoo BE (2018) Evaluation of copy-move forgery detection: datasets and evaluation metrics. Multimed Tools Appl 77:31807–31833
4. Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6(3):1099–1110
5. Ardizzone E, Bruno A, and Mazzola G (2010). Copy-move forgery detection via texture description, Proceedings of the 2ndACM Workshop on Multimedia in Forensics, Security and Intelligence, [2nd: Firenze, Italy: October 2010], pp. 59-29.
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献