Author:
Rajput G. G.,Dabhole Smruti Dilip
Publisher
Springer Nature Singapore
Reference33 articles.
1. Christlein V, Riess C, Angelopoulou E (2010) On rotation invariance in copy-move forgery detection. In: 2010 IEEE international workshop on information forensics and security, 12–15
2. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inform Forensics and Secur 6(3)
3. Putro PAW (2019) An authentic and secure printed document from forgery attack by combining perceptual hash and optical character recognition. In: 2019 International conference on informatics, multimedia, cyber and information system (ICIMCIS), IEEE. 978-1-7281-2930-3/19/$31.00 ©2019
4. Li L, Bao J, Zhang T, Yang H, Chen D, Wen F, Guo B (2020) Face X-ray for more general face forgery detection. In: 2020 IEEE/CVF conference on computer vision and pattern recognition (CVPR), 2575–7075/20/$31.00 ©2020 IEEE. https://doi.org/10.1109/CVPR42600.2020.00505
5. Zheng L, Zhang Y, Thing VLL (2019) A survey on image tampering and its detection in real-world photos. J Visual Commun Image Represent 58:380–399
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Keypoint Based Tampered Image Identification;Lecture Notes in Networks and Systems;2024