- Home
- Publications
- Publication Search
- Publication Details
Title
A copy-move forgery detection method based on CMFD-SIFT
Authors
Keywords
Image forensics, Copy-move forgery detection, SIFT, Descriptor, Detector, Tempering
Journal
MULTIMEDIA TOOLS AND APPLICATIONS
Volume 77, Issue 1, Pages 837-855
Publisher
Springer Nature
Online
2017-01-04
DOI
10.1007/s11042-016-4289-y
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Effective and Efficient Global Context Verification for Image Copy Detection
- (2017) Zhili Zhou et al. IEEE Transactions on Information Forensics and Security
- Efficient algorithm for k-barrier coverage based on integer linear programming
- (2016) Yanhua Zhang et al. China Communications
- Fingerprint liveness detection based on multi-scale LPQ and PCA
- (2016) Chengsheng Yuan et al. China Communications
- Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
- (2016) Zhangjie Fu et al. IEEE Transactions on Information Forensics and Security
- A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
- (2016) Zhihua Xia et al. IEEE Transactions on Information Forensics and Security
- Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation
- (2016) Zhili ZHOU et al. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
- Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection
- (2016) Xiuli Bi et al. INFORMATION SCIENCES
- Robust dense reconstruction by range merging based on confidence estimation
- (2016) Yadang Chen et al. Science China-Information Sciences
- Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation
- (2016) Zhili ZHOU et al. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
- Efficient Dense-Field Copy–Move Forgery Detection
- (2015) Davide Cozzolino et al. IEEE Transactions on Information Forensics and Security
- Segmentation-Based Image Copy-Move Forgery Detection Scheme
- (2015) Jian Li et al. IEEE Transactions on Information Forensics and Security
- A rapid learning algorithm for vehicle classification
- (2015) Xuezhi Wen et al. INFORMATION SCIENCES
- Enhanced secure sensor association and key management in wireless body area networks
- (2015) Jian Shen et al. JOURNAL OF COMMUNICATIONS AND NETWORKS
- Incremental Support Vector Learning for Ordinal Regression
- (2015) Bin Gu et al. IEEE Transactions on Neural Networks and Learning Systems
- Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
- (2014) B. Yang et al. COMPUTER JOURNAL
- Color Image Analysis by Quaternion-Type Moments
- (2014) Beijing Chen et al. JOURNAL OF MATHEMATICAL IMAGING AND VISION
- Steganalysis of LSB matching using differences between nonadjacent pixels
- (2014) Zhihua Xia et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Securely Outsourcing Attribute-Based Encryption with Checkability
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- An improvement to the SIFT descriptor for image representation and matching
- (2013) Kaiyang Liao et al. PATTERN RECOGNITION LETTERS
- Counter-forensics of SIFT-based copy-move detection by means of keypoint classification
- (2013) Irene Amerini et al. EURASIP Journal on Image and Video Processing
- Passive copy move image forgery detection using undecimated dyadic wavelet transform
- (2012) Ghulam Muhammad et al. Digital Investigation
- Duplication forgery detection using improved DAISY descriptor
- (2012) Jing-Ming Guo et al. EXPERT SYSTEMS WITH APPLICATIONS
- Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features
- (2012) Pravin Kakar et al. IEEE Transactions on Information Forensics and Security
- A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery
- (2011) I. Amerini et al. IEEE Transactions on Information Forensics and Security
- Region Duplication Detection Using Image Feature Matching
- (2010) Xunyu Pan et al. IEEE Transactions on Information Forensics and Security
- Speeded-Up Robust Features (SURF)
- (2008) Herbert Bay et al. COMPUTER VISION AND IMAGE UNDERSTANDING
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started