Author:
Zheng Jiangbin,Liu Yanan,Ren Jinchang,Zhu Tingge,Yan Yijun,Yang Heng
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Artificial Intelligence,Computer Science Applications,Hardware and Architecture,Information Systems,Signal Processing,Software
Reference46 articles.
1. Achanta, R., Shaji, A., Smith, K., Lucchi, A., Fua, P., & Susstrunk, S. (2012). SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(11), 2274–2282.
2. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A sift-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security, 6(3), 1099–1110.
3. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., & Serra, G. (2013). Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Processing: Image Communication, 28(6), 659–669.
4. Bashar, M., Noda, K., Ohnishi, N., & Mori, K. (2010). Exploring duplicated regions in natural images. IEEE Transactions on Image Processing. doi: 10.1109/TIP.2010.2046599 .
5. Bayram, S., Sencar, H. T., & Memon, N. (2009). An efficient and robust method for detecting copy-move forgery. In IEEE international conference on acoustics, speech and signal processing (pp. 1053–1056).
Cited by
76 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献