References
- T. Qazi, K. Hayat, S. U. Khan, et al, "Survey on blind image forgery detection", IET Image Process., Vol. 7, No. 7, pp. 660-670, 2013. http://dx.doi.org/10.1049/iet-ipr.2012.0388
- G. K. Birajdar and V. H. Mankar, "Digital image forgery detection using passive techniques: a survey", Digit. Invest., Vol. 10, No. 3, pp. 226-245, 2013. https://doi.org/10.1016/j.diin.2013.04.007
- M. D. Ansari, S. P. Ghrera, and V. Tyagi, "Pixel-based image forgery detection: a review", IETE J. Educ., Vol. 55, No. 1, pp. 40-46, 2014. https://doi.org/10.1080/09747338.2014.921415
- W. N. N. Diane, S. Xingming, and F. K. Moise, "A survey of partition-based techniques for copy-move forgery detection", Sci. World J., Vol. 55, No. 1, pp. 1-13, 2014. http://dx.doi.org/10.1155/2014/975456
- B. Soni, P. K. Das, and D. M. Thounaojam, "CMFD: A detailed review of block based and key feature based techniques in image copy-move forgery detection," IET Image Processing, Vol. 12, No. 2, pp. 167-178, 2017. http://dx.doi.org/10.1049/iet-ipr.2017.0441
- A. Fridrich, B. Jessica, David Soukal, and A. Jan Lukas, "Detection of copy-move forgery in digital images", Digital Forensic Research Workshop, 2003. http://dx.doi.org/10.1109/PACIIA.2008.240
- B. Mahdian and S. Saic S, "Detection of copy-move forgery using a method based on blur moment invariants", Forensic Sci. Int., Vol. 171, No. 2, pp. 180-189, 2007. https://doi.org/10.1016/j.forsciint.2006.11.002
- A. Popescu and H. Farid, "Exposing digital forgeries by detecting duplicated image regions, Department of Computer Science", Dartmouth College, Tech. Rep. TR2004-515, 2004. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2374
- J. Wang, G. Liu, Z. Zhang, Y. Dai, and Z. Wang, "Fast and robust forensics for image Region-Duplication forgery", Acta Automatica Sinica, Vol. 35, No. 12, pp. 1488-1495, 2009. http://dx.doi.org/10.3724/SP.J.1004.2009.01488
- Er. S. Khan, and Er. A. Kulkarni, "An efficient method for detection of copy-move forgery using discrete wavelet transform", Int. J. Comput. Sci Eng., Vol. 2, No. 5, pp. 1801-1806, 2010. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.3263&rank=1
- Y. Huang, W. Lu, W. Sun, D. Long, "Improved DCT-based detection of copy-move forgery in images", Forensic Sci Int., Vol. 206, No. 1, pp. 178-184, 2011. https://doi.org/10.1016/j.forsciint.2010.08.001
- S. Ryu, M. Lee, H. Lee, "Detection of copyrotate-move forgery using Zernike moments", Lect. Notes Comput. Sci., Vol. 6387, pp. 51-65, 2010. https://doi.org/10.1007/978-3-642-16435-4_5
- C. S. Park, C. Kim, J. Lee, and G. R. Kwon, "Rotation and scale invariant upsampled log-polar fourier descriptor for copy-move forgery detection", Multimedia Tools and Applications, Vol. 75, No. 23, pp. 16577-16595, 2016. https://doi.org/10.1007/s11042-016-3575-z
- D. G. Lowe, "Distinctive image features from scaleinvariant keypoints", Int. J. Comput. Vis., Vol. 60, No. 2, pp. 91-110, 2004. https://doi.org/10.1023/B:VISI.0000029664.99615.94
- H. Bay, A. Ess, T. Tuytelaars, et al., "Speeded-up robust features (SURF)", Comput. Vis. Image Underst., Vol. 110, No. 3, pp. 346-359, 2008. https://doi.org/10.1016/j.cviu.2007.09.014
- J. Zheng, et al. "Fusion of block and keypoints based approaches for effective copy-move image forgery detection", Multidimensional Systems and Signal Processing, Vol. 27, No. 4, pp. 989-1005, 2016. https://doi.org/10.1007/s11045-016-0416-1
- V. Christlein, C. Riess, J. Jordan, et al., "An evaluation of popular copymove forgery detection approaches", IEEE Trans. Inf. Forensics Sec., Vol. 7, No. 6, pp. 1841-1854, 2012. https://doi.org/10.1109/TIFS.2012.2218597
- Z. Wang, H. Kieu, H. Nguyen, and M. Le, "Digital image correlation in experimental mechanics and image registration in computer vision: similarities, differences and complements", Optics and Lasers in Engineering, Vol. 65, pp. 18-27, 2015. https://doi.org/10.1016/j.optlaseng.2014.04.002
- I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, L. D. Tongo, and G. Serra, "Copy-move forgery detection and localization by means of robust clustering with J-Linkage", Signal Process. Image Commun., Vol. 28, No. 6, pp. 659-669, 2013. https://doi.org/10.1016/j.image.2013.03.006
- X. Pan and S. Lyu, "Region duplication detection using image feature matching", IEEE Trans. Inf. Forensics Secur., Vol. 5, No. 4, pp. 857-867, 2010. https://doi.org/10.1109/TIFS.2010.2078506
- I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, G. Serra, "A SIFT-based forensic method for copy move attack detection and transformation recovery", IEEE Trans. Inf. Forensics Secur., Vol. 6, No. 3, pp. 1099-1110, 2011. https://doi.org/10.1109/TIFS.2011.2129512
- V. Christlein, C. Riess, and E. Angelopoulou, "On Rotation Invariance in Copy-Move Forgery Detection," IEEE Workshop on Information Forensics and Security, 2010. https://doi.org/10.1109/WIFS.2010.5711472