1. Censure: Center surround extremas for realtime feature detection and matching;Agrawal,2008
2. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011a). Micc dataset. http://lci.micc.unifi.it/labd/2015/01/copy-move-forgery-detection-and-localization/.
3. A sift-based forensic method for copy–move attack detection and transformation recovery;Amerini;IEEE Transactions on Information Forensics and Security,2011
4. Ardizzone, E., Bruno, A., & Mazzola, G. (2015a). Ardizzone dataset. http://www.diid.unipa.it/cvip/?pageid=48.
5. Copy–move forgery detection by matching triangles of keypoints;Ardizzone;IEEE Transactions on Information Forensics and Security,2015