References
- H. Farid, "A picture tells a thousand lies", New Scientist, vol. 2411, pp. 38-41, 2003.
- I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking, San Francisco, CA: Morgan Kaufmann, 2002.
- M. Schneider and S. F. Chang, "A robust content based digital signature for image authentication", Proc. of IEEE International Conference on Image Processing, vol. 3, pp. 227-230, 1996.
- T. T. Ng, S. F. Chang and Q. Sun, "Blind detection of photomontage using higher order statistics", Proceedings of IEEE International Symposium on Circuits and Systems, vol. 5, pp. 688-691, 2004
- W. Chen, Y. Q. Shi, and W. Su, "Image splicing detection using 2-D phase congruency and statistical moments of characteristic function," Proceedings of SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, vol. 6505, pp. 6505R.1-6505R.8., 2007.
- M. K. Johnson and H. Farid, "Exposing digital forgeries in complex lighting environments," IEEE Trans. Inform. Forensics Security, vol. 3, no. 2, pp. 450-461, 2007.
- Y. F. Hsu and S. F. Chang, "Detecting image splicing using geometry invariants and camera characteristics consistency", Proceedings of IEEE International Conference on Multimedia and Expo, pp. 549-552, 2006.
- D. Fu, Y. Q. Shi, and W. Su, "Detection of image splicing based on hilbert-huang transform and moments of characteristic functions with wavelet decomposition," IWDW 2006. LNCS, vol. 4283, pp. 177-187. Springer, Heidelberg, 2006.
- B. Mahdian, and S. Saic, "A bibliography on blind methods for identifying image forgery," Signal Processing: Image Communication, vol. 25, no. 6, pp. 389-399, 2010. https://doi.org/10.1016/j.image.2010.05.003
- H. Farid, "A survey of image forgery detection," IEEE Signal Processing Magazine, vol. 26, no. 2, pp. 16-25, 2009. https://doi.org/10.1109/MSP.2008.931079
- J. Dong, W. Wang, T. Tan, and Y. Q. Shi, "Run-Length and edge statistics based approach for image splicing detection," LNCS, vol. 5450, pp. 76-87, 2009.
- Z. He, W. Lu, and W, Sun, "Improved run length based detection of digital image splicing," Digital Forensics and Watermarking, pp. 349-360, Springer Berlin Heidelberg, 2012
- Z. He, W. Sun, W. Lu, H. Lu, "Digital image splicing detection based on approximate run length," Pattern Recognition Letters, vol. 32, no. 12, pp. 1591-1597, 2011. https://doi.org/10.1016/j.patrec.2011.05.013
- M. M. Galloway, "Texture analysis using gray level run lengths," Cornput. Graph. Image Proc., vol. 4, pp. 171-179, 1975.
- W. N. Lie and G. S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Transactions on Multimedia, vol. 7, no. 6, pp. 1007-1020, 2005. https://doi.org/10.1109/TMM.2005.858377
- G. Gul and F. Kurugollu, "SVD-based universal spatial domain image steganalysis," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2 pp. 349-353, 2010.. https://doi.org/10.1109/TIFS.2010.2041826
- T. T. Ng, and S. F. Chang, "A data set of authentic and spliced image blocks," Tech. Rep. 203-2004-3, Columbia University, 2004.
- C. C. Chang and C. J. Lin, "LIBSVM: A library for support vector machines," ACM Transaction s on Intelligent Systems and Technology, vol. 2, no. 3, 2011.
- O. M. Al-Qershi, and B. E. Khoo, "Passive detection of copy-move forgery in digital images: State-of-the-art," Forensic Science International, vol. 231, pp. 284-295, 2013. https://doi.org/10.1016/j.forsciint.2013.05.027