Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 135-138.
Previous Articles Next Articles
HOU Jun and CHENG Yan
[1] Nguyen H C.Detection of copy-move forgery in digital images using radon transformation and phase correlation[C]∥Procee-dings of Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2012:134-137 [2] Popescu A C,Farid H.Exposing digital forgeries by detecting duplicated image regions.http://www.cs.dartmouth.edu /farid/downloads/publications/tr04.pdf,department of compu-ter.science,dartmouth college,2012 [3] Kee E,Farid H.A perceptual metric for photo retouching[J].Proceedings of the national academy of sciences,2011,108(50):19907-19912 [4] O’Brien J,Farid H.Exposing photo manipulation with inconsistent reflections[J].ACM transactions on graphics,2012,31(1):1-11 [5] Kee E,Johnson M K,Farid H.Digital image authentication fromjpeg heads[J].IEEE transactions on information forensics and security,2011,6(3):1066-1075 [6] Zheng Qian-ru,Sun Wei,Lu Wei.Digital spliced image forensics based on edge blur measurement[C]∥Proceedings of IEEE International Conference on Information Theory and Information Security.Dec.2010:399-402 [7] Gou Hong-mei,Swaminathan A,Wu Min.Noise features for image tampering detection and steganalysis[C]∥Proceeding of IEEE Conference on Image Processing.2007,6:97-100 [8] Shi Jian-bo,Malik J.Normalized cuts and image segmentation[J].IEEE transactions on pattern analysis and machine intelligence,2000,22(8):888-905 [9] Hsu Yu-feng,Chang Shih-fu.Camera response functions for image forensics:an automatic algorithm for splicing detection[J].IEEE transactions on information forensics and security,2010,5(4):816-825 [10] Chen Ying,Wang Yu-ping.Exposing digital forgeries by detecting traces of smoothing[C]∥Proceeding of 9th International Conference for Young Computer Scientists.2008:1440-1445 [11] Libsvm.http://www.csie.ntu.edu.tw/~cjlin/ |
No related articles found! |
|