Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference41 articles.
1. A secure and robust hash-based scheme for image authentication;Ahmed;Signal Process,2010
2. Image tampering detection based on local texture descriptor and extreme learning machine;Alhussein,2016
3. A sift-based forensic method for copy–move attack detection and transformation recovery;Amerini;IEEE Trans. Inf. Forensics Secur.,2011
4. Copy–move forgery detection by matching triangles of keypoints;Ardizzone;IEEE Trans. Inf. Forensics Secur.,2015
5. Exploring duplicated regions in natural images;Bashar;IEEE Trans. Image Process.,2016
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献