Computer Science ›› 2014, Vol. 41 ›› Issue (12): 118-124.doi: 10.11896/j.issn.1002-137X.2014.12.025
Previous Articles Next Articles
LE De-guang,JIANG Nan,ZHENG Li-xin and LI Xiao-chao
[1] 胡东辉,王丽娜,江夏秋,等.盲环境下的数字图像可信性评估模型研究[J].计算机学报,2009,2(4):675-687 [2] 吴琼,李国辉,涂丹,等.面向真实性鉴别的数字图像盲认证技术综述[J].自动化学报,2008,4(12):1458-1466 [3] Shivakumar B L,Baboo S S.Detecting copy-move forgery in digital images:a survey and analysis of current methods [J].Global Journal of Computer Science and Technology,2011,10(7):61-65 [4] Fridrich J,Soukal D,Luká J.Detection of copy-move forgery in digital images [C]∥Proceedings of Digital Forensic Research Workshop.Cleveland,OH,2003:231-240 [5] Popescu A C,Farid H.Exposing digital forgeries by detecting traces of resampling [J].IEEE Transactions on Signal Proces-sing,2005,3(2):758-767 [6] 骆伟祺,黄继武,丘国平,等.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,0(11):1998-2007 [7] 张静,冯占磊,苏育挺,等.基于像素匹配的图像复制-粘贴篡改检测算法[J].天津大学学报,2009,2(8):713-720 [8] Pan X,Siwei L.Region duplication detection using image feature matching [J].IEEE Transactions on Information Forensics and Security,2010,5(4):857-867 [9] 王鑫,轩波,彭思龙,等.基于融合的高分辨率彩色图像拷贝-变换-移动篡改检测[J].中国图象图形学报(A),2010,5(7):1047-1053 [10] 李生红,张爱新,郑燕双,等.基于SIFT的图像复制遮盖篡改检测技术[J].解放军理工大学学报:自然科学版,2009,0(4):339-343 [11] Amerini I,Ballan L,Caldelli R,et al.A SIFT-based forensicmethod for copy-move attack detection and transformation recovery [J].IEEE Transactions on Information Forensics and Security,2011,6(3):1099-1110 [12] Lindeberg T.Scale-space[J].Encyclopedia of Computer Science and Engineering (Benjamin Wah,ed),2009,4(1):2495-2504 [13] Mikolajczyk K,Schmid C.Scale and affine invariant interestpoint detectors[J].International Journal of Computer Vision,2004,0(1):63-86 [14] Lin W,Li D.Adaptive downsampling to improve image compression at low bit rates [J].IEEE Transactions on Image Proces-sing,2006,5(9):2513-2521 [15] Keren D,Peleg S,Brada R.Image sequence enhancement using sub-pixel displacements [C]∥Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.1988:742-746 [16] Lowe D G.Distinctive image features from scale-invariant keypoints [J].International Journal of Computer Vision,2004,0(2):91-110 [17] Harris C,Stephens M.A combined corner and edge detector[C]∥Proceedings of Fourth Alvey Vision Conference.Manchester,UK,1988:147-151 [18] Mikolajczyk K,Schmid C.A performance evaluation of local descriptors [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2005,7(10):1615-1630 [19] Hartley R,Zisserman A.Multiple view geometry in computer vision(Second Edition)[M].Cambridge University Press,2004 [20] CASIA TIDE v2.0.CASIA tampered image detection evaluation database [EB/OL].http://forensics.idealtest.org [21] MICC-F220 Dataset [EB/OL].http://jean.micc.unifi.it |
No related articles found! |
|