共 114 条
[1]
Achanta R(2012)SLIC Superpixels Compared to State-of-the-Art Superpixel Methods IEEE Transactions on Pattern Analysis & Machine Intelligence 34 2274-2282
[2]
Shaji A(2001)Interactive Graph Cuts for Optimal Boundary & Region Segmentation of Objects in N-D Images Iccv 1 105-112
[3]
Smith K(2014)Secured Telemedicine Using Region-Based Watermarking with Tamper Localization J Digit Imaging 27 737-750
[4]
Lucchi A(2011)A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery IEEE Transactions on Information Forensics & Security 6 1099-1110
[5]
Fua P(2012)Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts IEEE Transactions on Information Forensics & Security 7 1003-1017
[6]
SüSstrunk S(2013)Exposing Digital Image Forgeries by Illumination Color Classification IEEE Transactions on Information Forensics & Security 8 1182-1194
[7]
Al YYB(2008)Determining Image Origin and Integrity Using Sensor Noise IEEE Transactions on Information Forensics & Security 3 74-90
[8]
Al-Haj A(2014)A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection IEEE Transactions on Information Forensics & Security 9 554-567
[9]
Amer A(2012)An Evaluation of Popular Copy-Move Forgery Detection Approaches IEEE Transactions on Information Forensics & Security 7 1841-1854
[10]
Amerini I(2007)Image denoising by sparse 3-D transform-domain collaborative filtering IEEE Trans Image Process 16 2080-2095