Wang W, Farid H. Exposing digital forgeries in video by detecting duplication[C]//Proceedings of the 9th Multimedia and Security Workshop. Piscataway, New Jersey: IEEE Press, 2007:35-42. [DOI:10.1145/1288869.1288876]
[2]
Bonneel N, Sunkavalli K, Paris S, et al. Example-based video color grading[J]. ACM Transactions on Graphics, 2013, 32(4):1-11. [DOI:10.1145/2461912.2461939]
[3]
Kancherla K, Mukkamala S. Novel blind video forgery detection using Markov models on motion residue[C]//Proceedings of Intelligent Information and Database Systems. Kaohsiung,Taiwan, China: Springer, 2012,7198:308-315.[DOI:10.1007/978-3-642-28493-9_33]
[4]
Kobayashi M, Okaba T, Sato Y. Detecting forgery from static-scene video based on inconsistency in noise level functions [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):883-892. [DOI: 10.1109/TIFS.2010.2074194]
[5]
Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images[C]//Proceedings of Digital Forensic Research Workshop. Cleveland: Citeseex, 2003:55-61.
[6]
Wu Q, Li G H, Tu D, et al. A survey of blind digital image forensics technology for authenticity detection [J]. Acta Automatica Sinica, 2008, 34(12):1459-1466.[吴琼,李国辉,涂丹,等. 面向真实性鉴别的数字图像盲取证技术综述[J]. 自动化学报, 2008, 34(12):1459-1466.]
[7]
Li G, Wu Q, Tu D, et al. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD [C]//Proceedings of IEEE International Conference on Multimedia and Expo. Piscataway, New Jersey: IEEE Press, 2007:1750-1753. [DOI:10.1109/ICME.2007.4285009]
[8]
Johnson M, Farid H. Exposing digital forgeries through chromatic aberration [C]//Proceedings of the 8th Workshop on Multimedia and Security. Geneva, Switzerland:ACM Press, 2006:48-55. [DOI:10.1145/1161366.1161376]
[9]
Ng T, Chang S. A model for image splicing [C]//Proceedings of International Conference on Image Processing. Piscataway, New Jersey: IEEE Press,2004:1169-1172.[DOI:10.1109/ICIP.2004.1419512]
[10]
Yao H, Qiao T, Tang Z J, et al. Detecting copy-move forgery using non-negative matrix factorization [C]//Proceedings of the Third International Conference on Multimedia Information Networking and Security. Shanghai: IEEE Press, 2011:591-594. [DOI: 10.1109/MINES.2011.104]
[11]
Bayram S, Taha H, Memon N. An efficient and robust method for detecting copy-move forgery[C]//Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, New Jersey: IEEE Press, 2009:1053-1056. [DOI:10.1109/ICASSP.2009.4959768]
[12]
Zhang J, Feng Z, Su Y. A new approach for detecting copy-move forgery in digital images[C]//Proceedings of the 11th IEEE Singapore International Conference on Communication Systems. Piscataway, New Jersey: IEEE Press,2008:362-366. [DOI:10.1109/ICCS.2008.4737205]
[13]
Ng T T, Chang S F. Blind detection of photomontage using higher order statistics[C]//International Symposium on Circuits and System. Vancouver, Canada: IEEE Press, 2004:688-691. [DOI: 10.1109/ISCAS.2004.1329901]
[14]
Popescu A, Farid H. Exposing digital forgeries by detecting duplicated image regions[R]. Hanover, New Hampshire, USA: Dartmouth College, Computer Science, 2004.
[15]
Hsu C C, Hung T Y, Lin C W,et al. Video forgery detection using correlation of noise residue[C]//Proceeding of International Workshop on Multimedia Signal Processing. Piscataway, New Jersey: IEEE Press, 2008:170-174. [DOI: 10.1109/MMSP.2008.4665069]
[16]
Liu C, Yuen J, Torralba A. SIFT flow: dense correspondence across difference scene[C]//Proceedings of European Conference on Computer Vision. Marseille, France:Springer, 2008:28-42. [DOI: 10.1007/978-3-540-88690-7_3]
[17]
Zhuang Y, Rui Y, Huang T,et al. Adaptive key frame extraction using unsupervised clustering[C]//Proceedings of International Conference on Image Processing. Piscataway, New Jersey: IEEE Press, 1998:866-870. [DOI: 10.1109/ICIP. 1998. 723655]
[18]
Wang F S, Xu D, Wu W X. A cluster algorithm of automatic key frame extraction based on adaptive threshold [J]. Journal of Computer Research and Development, 2005, 42(10):1752-1757. [王方石,徐德,吴伟鑫. 基于自适应阈值的自动提取关键帧的聚类算法[J]. 计算机研究与发展, 2005, 42(10):1752-1757.]
[19]
Zhu C Z, Wu X Q, Zhou X, et al. Video booklet system[J]. Journal of Image and Graphics, 2008, 13(8):1544-1553. [朱才志, 吴秀清, 周晓, 等. 视频相册系统[J]. 中国图象图形学报, 2008, 13(8):1544-1553.]
[20]
Conotter V, James F, O\'Brien, et al. Exposing digital forgeries in ballistic motion [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1):283-295. [DOI: 10.1109/TIFS.2011.2165843]