• Journal of Terahertz Science and Electronic Information Technology
  • Vol. 18, Issue 3, 483 (2020)
WANG Yazi1, SUN Huaibo2、*, and MA Yuankun3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.11805/tkyda2019262 Cite this Article
    WANG Yazi, SUN Huaibo, MA Yuankun. Image copy-paste tampering detection algorithm based on color constrained coupling distance penalty model[J]. Journal of Terahertz Science and Electronic Information Technology , 2020, 18(3): 483 Copy Citation Text show less
    References

    [2] WARIF N B A,WAHAB A W A,IDRIS M Y l. Copy-move forgery detection:survey,challenges and future directions[J]. Journal of Network and Computer Applications, 2016,75 (1):259-278.

         WARIF N B A,WAHAB A W A,IDRIS M Y l. Copy-move forgery detection:survey,challenges and future directions[J]. Journal of Network and Computer Applications, 2016,75 (1):259-278.

    [3] EMAM Mahmoud,HAN Qi,NIU Xiamu. PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools and Applications, 2016,75(18):11513 -11527.

         EMAM Mahmoud,HAN Qi,NIU Xiamu. PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools and Applications, 2016,75(18):11513 -11527.

    [5] TAO Rui,SUN Yanjing,LIU Weidong. Forgery detection using chaotic watermarking in image key areas[J]. Tehnicki Vjesnik-Technical Gazette, 2017,24(4):1263-1268.

         TAO Rui,SUN Yanjing,LIU Weidong. Forgery detection using chaotic watermarking in image key areas[J]. Tehnicki Vjesnik-Technical Gazette, 2017,24(4):1263-1268.

    [7] ZHILA Bahrami,FARDIN Akhlaghiantab. A new robust video watermarking algorithm based on SURF features and block classification[J]. Multimedia Tools and Applications, 2018,77(1):327-345.

         ZHILA Bahrami,FARDIN Akhlaghiantab. A new robust video watermarking algorithm based on SURF features and block classification[J]. Multimedia Tools and Applications, 2018,77(1):327-345.

    [10] MANU V T,MEHTRE B M. Copy-move tampering detection using affine transformation property preservation on clustered keypoints[J]. Signal Image and Video Processing, 2018,12(3):549-556.

         MANU V T,MEHTRE B M. Copy-move tampering detection using affine transformation property preservation on clustered keypoints[J]. Signal Image and Video Processing, 2018,12(3):549-556.

    [11] WANG Huan,WANG Hongxia,SUN, Xingming. A passive authentication scheme for copy-move forgery based on package clustering algorithm[J]. Multimedia Tools and Applications, 2017,76(10):12627-12644.

         WANG Huan,WANG Hongxia,SUN, Xingming. A passive authentication scheme for copy-move forgery based on package clustering algorithm[J]. Multimedia Tools and Applications, 2017,76(10):12627-12644.

    [12] MAHMOOD Toqeer,IRTAZA Aun,MEHMOOD Zahid. Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images[J]. Forensic Science International, 2017,279(1):8-21.

         MAHMOOD Toqeer,IRTAZA Aun,MEHMOOD Zahid. Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images[J]. Forensic Science International, 2017,279(1):8-21.

    [13] WANG Xiangyang,LI Shuo,LIU Yunan. A new keypoint-based copy-move forgery detection for small smooth regions[J]. Multimedia Tools and Applications, 2017,76 (22):23353-23382.

         WANG Xiangyang,LI Shuo,LIU Yunan. A new keypoint-based copy-move forgery detection for small smooth regions[J]. Multimedia Tools and Applications, 2017,76 (22):23353-23382.

    [14] MOHAMED A E,HEBA A,MOHAMED M D. Two stages object recognition based copy-move forgery detection algorithm[J]. Multimedia Tools and Applications, 2019,78(11):15353- 15373.

         MOHAMED A E,HEBA A,MOHAMED M D. Two stages object recognition based copy-move forgery detection algorithm[J]. Multimedia Tools and Applications, 2019,78(11):15353- 15373.

    [15] AMERINI I,BALLAN L,CALDELLI R. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3):1099-1110.

         AMERINI I,BALLAN L,CALDELLI R. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3):1099-1110.

    WANG Yazi, SUN Huaibo, MA Yuankun. Image copy-paste tampering detection algorithm based on color constrained coupling distance penalty model[J]. Journal of Terahertz Science and Electronic Information Technology , 2020, 18(3): 483
    Download Citation