Author:
Yang Qiuwei,Peng Fei,Li Jiao-Ting,Long Min
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference20 articles.
1. Ardizzone E, Bruno A (2010) Copy-move forgery detection via texture description, vol 10. ACM, Firenze, Italy, pp 59–64
2. Bayram S, Avcıbas I, Sankur B, Memon N (2005) Image manipulation detection with binary similarity measures. In: Proc. of 13th European Signal Processing Conference, vol. 1. pp 752–755
3. Chang C-C, Lin C-J (2001) LIBSVM: a library for support vector machines
4. Chen M, Fridrich J, Goljan M, Lukáš J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inf Forensics Secur 3:74–90
5. Dirik AE, Memon N (2009) Image tamper detection based on demosaicing artifacts. IEEE International Conference Image Processing (ICIP), pp 1497–1500
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献