Author:
Monika ,Bansal Dipali,Passi Abhiruchi
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference80 articles.
1. Bashar, M. K., Noda, K., Ohnishi, N., & Mori, K. (2010). Exploring duplicated regions in natural images. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIP.2010.2046599
2. Pun, C., Member, S., Yuan, X., & Bi, X. (2015). Over—Segmentation and feature point matching. IEEE Transactions on Information Forensics and Security, 6013(c), 1–12.
3. Christlein, V., Member, S., Riess, C., Member, A., Jordan, J., Member, S., et al. (2012). An evaluation of popular copy-move forgery detection approaches. IEEE Transactions Information Forensics and Security, 7(6), 1841–1854.
4. Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.
5. Pan, X., & Lyu, S. (2010). Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security, 5(4), 857–867.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献