参考文献/References:
[1] AL-QERSHI O M,KHOO B E.Passive detection of copy-move forgery in digital images: State-of-the-art[J].Forensic Science International,2013,231(1/2/3):284-295.
[2] CHRISTLEIN V,RIESS C,JORDAN J,et al.An evaluation of popular copy-move forgery detection approaches[J].IEEE Transactions on Information Forensics and Security,2012,7(6):1841-1854.
[3] 赵洁,郭继昌.基于JPEG系数变化率的图像复制粘贴篡改检测[J].浙江大学学报(工学版),2015,49(10):1893-1901.
[4] 王浩明,杨晓元.一种基于DCT系数直方图差异的JPEG图像篡改检测[J].四川大学学报(工程科学版),2014,46(1):41-46.
[5] 王青,张荣.基于DCT系数双量化映射关系的图像盲取证算法[J].电子与信息学报,2014,36(9):2068-2074.
[6] LI Leida,LI Shushang,ZHU Hancheng,et al.Detecting copy-move forgery under affine transforms for image forensics[J].Computers & Electrical Engineering,2014,40(6):1951-1962.
[7] MYNA A N,VENKATESHMURTHY M G,PATIL C G.Detection of region duplication forgery in digital images using wavelets and log-polar mapping[C]//Proceeding of the International Conference on Computational Intelligence and Multimedia Applications.Sivakasi:IEEE Press,2007:371-377.
[8] BASHAR M,NODA K,OHNISHI N,et al.Exploring duplicated regions in natural images[J].IEEE Transactions on Image Processing,2010(99):1-40.
[9] ZHAO Jie,GUO Jichang.Passive forensics for copy-move image forgery using a method based on DCT and SVD[J].Forensic Science International,2013,233(1/2/3):158-166.
[10] YAO Heng,QIAO Tong,TANG Zhenjun,et al.Detecting copy-move forgery using non-negative matrix factorization[C]//Proceedings of the 3rd International Conference on Multimedia Information Networking and Security.Shanghai:IEEE Press,2011:591-594.
[11] MUHAMMAD G,AL-HAMMADI M H,HUSSAIN M,et al.Copy move image forgery detection method using steerable pyramid transform and texture descriptor[C]//Proceedings of the IEEE EUROCON.Zagreb:IEEE Press,2013:1586-1592.
[12] HUSSAIN M,MUHAMMAD G,SALEH S Q,et al.Copy-move image forgery detection using multiresolution Weber descriptos[C]//Proceedings of the 8th International Conference on Signal Image Technology and Internet Based Systems.Naples:IEEE Press,2012:395-401.
[13] YONG L,MEISHAN H,BOGANG L.Robust evidence detection of copy-rotate-move forgery in image based on singular value decomposition[C]//Proceedings of the 14th International Conference on Information and Communications Security.New York:Springer,2012:357-364.
[14] KASHYAP A,JOSHI S.Detection of copy-move forgery using wavelet decomposition[C]//International Conference on Signal Processing and Communication.Noida:IEEE Press,2013:396-400.
[15] LIN S D,WU T.An integrated technique for splicing and copy-move forgery image detection[C]//Proceedings of the 4th International Congress on Image and Signal Processing.Shanghai:IEEE Press,2011:1086-1090.
[16] DYBALA B,JENNINGS B,LETSCHER D.Detecting filtered cloning in digital images[C]//Proceedings of the 9th Multimedia and Security Workshop.New York:ACM Press,2007:43-50.
[17] LIU Guangjie,WANG Junwen,LIAN Shiguo,et al.A passive image authentication scheme for detecting region-duplication forgery with rotation[J].Journal of Network and Computer Applications,2011,34(5):1557-1565.
[18] ZHONG Le,XU Weihong.A robust image copy-move forgery detection based on mixed moments[C]//Proceedings of the 4th IEEE International Conference on Software Engineering and Service Science.Piscataway:IEEE Press,2013:381-384.
[19] WANG Junwen,LIU Guangjie,LI Hongyuan,et al.Detection of image region duplication forgery using model with circle block[C]//Proceedings of the 1st International Conference on Multimedia Information Networking and Security.Wuhan:IEEE Press,2009:25-29.
[20] CAO Yanjun,GAO Tiegang,FAN Li,et al.A robust detection algorithm for copy-move forgery in digital images[J].Forensic Science International,2012,214(1/2/3):33-43.
[21] LI Guohui,WU Qiong,TU Dan,et al.A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD[C]//Proceedings of the IEEE International Conference on Multimedia and Expo.Beijing:IEEE Press,2007:1750-1753.
[22] BAYRAM S,SENCAR H T,MEMON N D.An efficient and robust method for detecting copy-move forgery[C]//Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing.Taipei:IEEE Press,2009:1053-1056.
[23] FRIDRICH J,SOUKAL D,LUKAS J.Detection of copy-move forgery in digital images[C]//Proceedings of Digital Forensic Research Workshop.Cleveland:[s.n.],2003:55-61.
[24] HUANG Yanping,LU Wei,SUN Wei,et al.Improved DCT-based detection of copy-move forgery in images[J].Forensic Science International,2011,206(1/2/3):178-184.
[25] POPESCU A C,FARID H.Exposing digital forgeries by detecting duplicated image regions[R].Hanover:Computer Science Department,Dartmouth College,2004:515.
[26] GAN Yanfen,CANG Jing.A detection algorithm for image copy-move forgery based on improved circular projection matching and PCA[J].Sensors & Transducers,2013,159(11):19-25.
[27] BRAVO-SOLORIO S,NANDI A K.Automated detection and localization of duplicated regions affected by reflection, rotation and scaling in image forensics[J].Signal Processing,2011,91(8):1759-1770.
[28] LUO Weiqi,HUANG Jiwu,QIU Guoping.Robust detection of region duplication forgery in digital image[J].Chinese Journal of Computers,2007,4(11):746-749.
[29] WANDJI N D,SUN Xingming.Robust detection of copy-move forgery in color images[C]//Proceedings of the International Conference on Image Processing, Computer Vision & Pattern Recognition.Las Vegas: World,2013:492-495.
[30] MAHDIAN B,SAIC S.Detection of copy-move forgery using a method based on blur moment invariants[J].Forensic Science International,2007,171(2/3):180-189.
[31] RYU S,KIRCHNER M,LEE M,et al.Rotation invariant localization of duplicated image regions based on zernike moments[J].IEEE Transactions on Information Forensics and Security,2013,8(8):1355-1370.
[32] KANG Xiaobing,WEI Shengmin.Identifying tampered regions using singular value decomposition in digital image forensics[C]//Proceedings of the International Conference on Computer Science and Software Engineering.Wuhan:IEEE Press,2008:926-930.
[33] AMERINI I,BALLAN L,CALDELLI R,et al.A SIFT-based forensic method for copy-move attack detection and transformation recovery[J].IEEE Transactions on Information Forensics and Security,2011,6(3):1099-1110.
[34] PAN Xunyu,LYU Siwei.Region duplication detection using image feature matching[J].IEEE Transactions on Information Forensics and Security,2010,5(4):857-867.
[35] 申铉京,朱叶,吕颖达,等.基于SIFT和HSI模型的彩色图像复制-粘贴盲鉴别算法[J].吉林大学学报(工学版),2014,44(1):171-176.
[36] MISHRA P,MISHRA N,SHARMA S,et al.Region duplication forgery detection technique based on SURF and HAC[J].Scientific World Journal,2013,2013(1):267691.
[37] 巩家昌,郭继昌.利用CSURF的图像复制粘贴篡改检测[J].天津大学学报(自然科学与工程技术版),2014,47(9):759-764.
[38] 李岩,刘念,张斌,等.图像镜像复制粘贴篡改检测中的FI-SURF算法[J].通信学报,2015,36(5):54-65.
[39] CHEN Likai,LU Wei,NI Jiangqun,et al.Region duplication detection based on Harris corner points and step sector statistics[J].Journal of Visual Communication and Image Representation,2013,24(3):244-254.
[40] DAVARZANI R,YAGHMAIE K,MOZAFFARI S,et al.Copy-move forgery detection using multi-resolution local binary patterns[J].Forensic Science International,2013,231(1/2/3):61-72.
[41] NGUYEN H C,KATZENBEISSER S.Detection of copy-move forgery in digital images using radon transformation and phase correlation[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing.Piraeus:IEEE Press,2012:134-137.