Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 380-384.
• Information Security • Previous Articles Next Articles
XING Wen-bo1,2, DU Zhi-chun1
CLC Number:
[1]WARBHE A D,DHARASKAR R V,THAKARE V M.A Survey on Keypoint Based Copy-paste Forgery Detection Techniques[J].Procedia Computer Science,2016,78:61-67. [2]LOWE D G.Distinctive Image Features from Scale-Invariant Keypoints [J].International Journal of Computer Vision,2004,60(2):91-110. [3]BAY H,TUYTELAARS T,GOOL L V.SURF:Speeded Up Robust Features[J].Computer Vision & Image Understanding,2006,110(3):404-417. [4]ALCANTARILLA P F,BARTOLI A,DAVISON A J.KAZE Features[M]∥European Conference on Computer Vision.Berlin:Springer,2012:214-227. [5]HUANG H,GUO W,ZHANG Y.Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm[C]∥Pacific-Asia Workshop on Computational Intelligence and Industrial Application,2008(PACIIA’08).IEEE,2009:272-276. [6]ARDIZZONE E,BRUNO A,MAZZOLA G.Detecting multiple copies in tampered images[C]∥IEEE International Conference on Image Processing.IEEE,2010:2117-2120. [7]池静,张婷,杨振宇.基于SIFT和区域生长的图像复制粘贴盲检测算法 [J].科学技术与工程,2013,13(4):917-920. [8]AMERINI I,BALLAN L,CALDELLI R,et al.Copy-move forgery detection and localization by means of robust clustering with J-Linkage [J].Signal Processing Image Communication,2013,28(6):659-669. [9]李云,陈帆,和红杰.SIFT复制粘贴图像取证算法的安全性分析及改进[C]∥全国信息隐藏暨多媒体信息安全学术大会.2015. [10]巩家昌.基于局部颜色不变性特征的图像复制粘贴篡改取证研究[D].天津:天津大学,2015. [11]FISCHLER M A,BOLLES R C.Random sample consensus:a paradigm for model fitting with applications to image analysis and automated cartography [J].Comm. of the ACM,1981,24:381-395. [12]http://www.cs.ubc.ca/~lowe/keypoints/. [13]http://blog.sina.com.cn/s/blog_49cd44fb010005qb.html. [14]http://image.fengniao.com/360/3600114_all.html#3601563. [15]TRALIC D,ZUPANCIC I,GRGIC S.CoMoFoD — New database for copy-move forgery detection[C]∥55th International Symposium ELMAR-2013.IEEE,2013:49-54. |
[1] | DAN Zhou-yang, LIU Fen-lin, GONG Dao-fu. Smoothing Filter Detection Algorithm Based on Middle and Tail Information of Differential Histogram [J]. Computer Science, 2021, 48(11): 234-241. |
[2] | SHAO Jin-da, YANG Shuai, CHENG Lin. UAV Image Matching Algorithm Based on Improved SIFT Algorithm and Two-stage Feature Matching [J]. Computer Science, 2019, 46(6): 316-321. |
[3] | HU Yan-hua ,TANG Peng ,JIN Wei-dong, HE Zheng-wei. Estimation of FOE for Railway Video Sequences [J]. Computer Science, 2018, 45(7): 226-229. |
[4] | ZHOU Sheng-pu, GENG Guo-hua, LI Kang, WANG Piao. Multi-view Geometric 3D Reconstruction Method Based on AKAZE Algorithm [J]. Computer Science, 2018, 45(11A): 180-184. |
[5] | KANG Xiao-bing,WEI Sheng-min. Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery [J]. Computer Science, 2011, 38(3): 295-299. |
|