Fridrich J, Soukalm D, Lukas J. Detection of copy-move forgery in digital images [C]//Proceedings of Digital Forensic Research Workshop. Cleveland, OH, USA: 2003: 55-61.
[2]
Huang Y P, Lu W, Sun W, et al. Improved DCT-based detection of copy-move forgery in images [J]. Forensic Science International, 2011, 206(1-3): 178-184. [DOI: 10.1016/J. FORSCIINT. 2010.08.001 ]
[3]
Cao Y J, Gao T G, Fan L, et al. A robust detection algorithm for copy-move forgery in digital images [J]. Forensic Science International, 2012, 214(1-3): 33-43.[DOI: 10.1016/J. FORSCIINT. 2011.07.015 ]
[4]
Zhao J, Guo J C. Passive forensics for copy-move forgery using a method based on DCT and SVD [J]. Forensic Science International, 2013, 233(1-3): 158-166.[DOI: 10.1016/J. FORSCIINT. 2013.09.013 ]
[5]
Luo W Q, Huang J W, Qiu G P. Robust detection of region-duplication forgery in digital image [C]// Proceedings of International Conference on Pattern Recognition. Piscataway, NJ: IEEE, 2006, 746-749.[DOI: 10.1109/ICPR.2006.1003 ]
[6]
Huang H L, Guo W Q, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm [C]// Proceedings of IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Piscataway, NJ: IEEE, 2008, 272-276.[DOI: 10.1109/PACIIA.2008.240 ]
[7]
Lowe D. Distinctive image features from scale-invariant key points [J]. International Journal of Computer Vision, 2004, 60(2): 91-110.[DOI: 10.1023/B:VISI. 0000029664. 99615. 94]
[8]
Amerini I, Ballan L, Caldelli R, et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011(6): 1099-1110.[DOI: 10.1109/TIFS. 2011. 2129512 ]
[9]
Xu B, Wang J W, Liu G J. Image copy-move forgery detection based on SURF [C]//Proceedings of International Conference on Multimedia Information Networking and Security. Piscataway, NJ: IEEE, 2010: 889-892.[DOI: 10.1109/MINES. 2010. 189]
[10]
Bay H, Ess A, Tuytelaars T. SURF: speeded up robust features [J].Computer Vision and Image Understanding, 2008, 110(3): 346-359.[DOI: 10.1016/J.CVIU.2007.09.014 ]
[11]
Pan X, Lyu S. Region duplication detection using image feature matching [J]. IEEE Transactions on Information Forensics and Security, 2010(5): 857-867.[DOI: 10. 1109/TIFS. 2010. 2078506 ]
[12]
Zhao Y Q, Chen Y, Li X H, et al. A novel detection method of copy-move forgery in JPEG images [J]. Journal of Central South University: Science and Technology, 2012,43(10): 3964-3970. [赵于前, 陈瑜, 李香花,等. 一种新的复制-移动篡改JPEG图像探测方法 [J].中南大学学报:自然科学版, 2012,43(10): 3964-3970.]
[13]
Luo W, Qu Z, Huang J. A novel method for detecting cropped and recompressed image blocks [C]// Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ: IEEE, 2007: 217-220. [DOI: 10.1109/ICASSP.2007.366211 ]
[14]
Wu J, Cui Z, Sheng V, et al. A comparative study of SIFT and its variants [J]. Measurement Science Review, 2013, 13(3): 122-131. [DOI: 10.2478/MSR-2013-0021 ]
[15]
Mikolajczyk K, Schmid C. A performance evaluation of local descriptors [J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 2005, 27(10): 1615-1630.[DOI: 10.1109/TPAMI.2005.188 ]
[16]
Wu L Y, Kong X W, Wang B, et al. Image tampering localization via estimating the non-aligned double JPEG compression [C]//Proceedings of SPIE Media Watermarking, Security, and Forensics. Bellingham,WA: SPIE, 2013:#866650[DOI: 10.1117/12.2003695 ]
[17]
McGill Calibrated Color Image Database [EB/OL]. 2004-01-01[2015-03-20].http://tabby.vision.mcgill.ca/
[18]
Kodak Lossless True Color Image Suite [EB/OL].1999-11-15[2013-01-27]. http://r0k.us/graphics/kodak/