|
[1] Yuanman Li and Jiantao Zhou, "Fast and effective image copy-move forgery detection via hierarchical feature point matching," IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1307 - 1322, May 2019. [2] David G. Lowe, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 60, no. 2, pp. 91-110, January 2004. [3] Tawheed Jan Shah, and M. Tariq Banday, "Copy-move forgery detection using hybrid transform and K-means clustering technique, " 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), INSPEC Accession Number 17858847, pp. 21-23, Dec. 2017. [4] Edoardo Ardizzone, Alessandro Bruno, and Giuseppe Mazzola, "Copy–move forgery detection by matching triangles of keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084 - 2094, Oct. 2015. [5] Gul Muzaffer, Guzin Ulutas, and Beste Ustubioglu, "Copy move forgery detection with quadtree decomposition segmentation," 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), INSPEC Accession Number 19875957, 7-9 Jul. 2020. [6] R. Nithiya and S. Veluchamy, "Keypoint descriptor based copy and move image forgery detection system," 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), INSPEC Accession Number 16285355, 30-31 Mar 2016. [7] Jian Li, Xiaolong Li, Bin Yang, and Xingming Sun, "Segmentation-based image copy-move forgery detection scheme," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507 - 518, Mar. 2015. [8] Badal Soni, Pradip K.Das, and Dalton "Keypoints based enhanced multiple copy-move forgeries detection system using density-based spatial clustering of application with noise clustering algorithm," IET Image Processing, vol. 12, no. 11, pp. 2092 - 2099, Sep. 2018. [9] Cai-Wei Shu and Xue-Zhong Xiao, "ORB-oriented mismatching feature points elimination," 2018 IEEE International Conference on Progress in Informatics and Computing (PIC), INSPEC Accession Number 18638512, 14-16 Dec. 2018 [10] Amanpreet Kaur, Savita Walia, and Krishan Kumar, "Comparative analysis of different keypoint based copy-move forgery detection methods," 2018 Eleventh International Conference on Contemporary Computing (IC3), INSPEC Accession Number 18249429 ,pp. 518–522, 2-4 Aug. 2018 [11] J. Hartigan and M. Wong, "Algorithm AS 136: A k-means clustering algorithm." Applied statistic, vol. 28, pp.100-108. 1979. [12] Martin Ester, Hans-Peter Kriegel, Jörg Sander, and Xiaowei Xu,"A density-based algorithm for discovering clusters in large spatial databases with noise," The Second International Conference on Knowledge Discovery and Data Mining (KDD-96), pp. 226-231, 1996. [13] Badal Soni, Pradip K.Das, and Dalton Meitei Thounaojam, "CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection," IET Image Processing, vol. 12, no. 2, pp. 167 - 178, Feb. 2018. [14] Shaharyar Ahmed Khan Tareen, and Zahra Saleem, "A comparative analysis of SIFT, SURF, KAZE, AKAZE, ORB, and BRISK," 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), INSPEC Accession Number 17732676, 3-4 Mar. 2018 [15] P. J. Alessi , E. C. Carter , M. D. Fairchild , R.W.G. Hunt ,C.S. McCamy , B. Kranicz ,J.R.Moore ,L. Morren ,J.H. Nobbs , Y. Ohno, M.R. Pointer , D.C. Rich , A.R. Robertson , J.D. Schanda , R. Seve , P.W. Trezona ,K. Witt ,and H. Yaguchi, "COLORIMETRY, 3RD EDITION," CIE 015-2004, ISBN. 9783901906336v, 2004. [16] Hao Luo, Wei Jiang, Youzhi Gu, Fuxu Liu, Xingyu Liao, Shenqi Lai, and Jianyan, "A Strong Baseline and Batch Normalization Neck for Deep Person Re-Identification," IEEE Transactions on Multimedia, vol. 22, no. 10, pp. 2597 - 2609, Oct. 2020.
|