Funder
National Natural Science Foundation of China
Reference56 articles.
1. A sift-based forensic method for copy–move attack detection and transformation recovery;Amerini;IEEE Transactions on Information Forensics and Security,2011
2. Copy–move forgery detection by matching triangles of keypoints;Ardizzone;IEEE Transactions on Information Forensics and Security,2015
3. Exploring duplicated regions in natural images;Bashar;IEEE Transactions on Image Processing,2010
4. Chen, K., Pang, J., Wang, J., Xiong, Y., Li, X., Sun, S., et al. (2019). Hybrid task cascade for instance segmentation. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 4974–4983).
5. A serial image copy-move forgery localization scheme with source/target distinguishment;Chen;IEEE Transactions on Multimedia,2020
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献