Author:
Rathore Neeraj Kumar,Jain Neelesh Kumar,Shukla Prashant Kumar,Rawat UmaShankar,Dubey Rachana
Publisher
Springer Science and Business Media LLC
Subject
Engineering (miscellaneous)
Reference34 articles.
1. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110
2. Rathore N, Chana I (2014) Load balancing and job migration techniques in grid: a survey of recent trends. Wirel Pers Commun 79(3):2089–2125
3. Kuznetsov AV, Myasnikov VV (2016) A copy-move detection algorithm based on binary gradient contours. Comput Opt 40:284–293
4. Ranjani MB, Poovendran R (2016) Image duplication copy move forgery detection using discrete cosine transforms method. Int J Appl Eng Res 11(4):2671–2674
5. Ustubioglu B, Ulutas G, Ulutas M, Nabiyev VV (2016) A new copy move forgery detection technique with automatic threshold determination. Int J Electron Commun 70(8):1076–1087
Cited by
68 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献