[1]
Fridrich J., Image watermarking for tamper detection, Proc. ICIP, International Conference on Image Processing, vol. 2, p.404–408, (1998).
DOI: 10.1109/icip.1998.723401
Google Scholar
[2]
Huang J., Hu J., Huang D., and Shi Y.Q., Improve security of fragile watermarking via parameterized wavelet, Proc. ICIP, International Conference on Image Processing, vol. 2, p.721– 724, (2004).
DOI: 10.1109/icip.2004.1419399
Google Scholar
[3]
Watanabe J., Hasegawa M., and Kato S., A study on a watermarking method for both copyright protection and tamper detection, Proc. ICIP, International Conference on Image Processing, vol. 4, p.2155–2158, (2004).
DOI: 10.1109/icip.2004.1421522
Google Scholar
[4]
Mihcak M.K. and Venkatesan R., New iterative geometric methods for robust perceptual image hashing, Proc. of the Digital Rights Management Workshop, November (2001).
Google Scholar
[5]
Fridrich J., Robust bit extraction from images, ICMCS 99, Florence, Italy, June (1999).
Google Scholar
[6]
Venkatesan R., Koon S., Jakubowski M., and Moulin P., Robust image hashing, Proc. IEEE Int. Conf. on Image Processing, (2000).
DOI: 10.1109/icip.2000.899541
Google Scholar
[7]
Coskun B. and Memon N., Confusion/diffusion capabilities of some robust hash functions, Proc. CISS, Conf. on Information Sciences and Systems, March (2006).
DOI: 10.1109/ciss.2006.286645
Google Scholar
[8]
B. Sankur S. Bayram, I. Avcibas and N. Memon, Image manipulation detection, Journal of Electronic Imaging octoberDecember 2006 – Volume 15, Issue 4, 15(4), (2006).
Google Scholar
[9]
J. Fridrich, D. Soukal, and J. Luk, Detection of copy-move forgery in digital images, Proc. Digital Forensic Research Workshop, Cleveland, OH, August (2003).
Google Scholar
[10]
A.C. Popescu and H. Farid, Exposing digital forgeries by detecting traces of resampling, IEEE Transactions on Signal Processing, vol. 53(2), p.758–767, (2005).
DOI: 10.1109/tsp.2004.839932
Google Scholar
[11]
M.K. Johnson and H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, Proc. ACM Multimedia and SecurityWorkshop, New York, p.1–9, (2005).
DOI: 10.1145/1073170.1073171
Google Scholar
[12]
Luk J., Fridrich J., and Goljan M., Detecting digital image forgeries using sensor pattern noise, Proc. of SPIE Electronic Imaging, Photonics West, January (2006).
DOI: 10.1117/12.640109
Google Scholar
[13]
M. Wu A. Swaminathan and K. J. Ray Liu, Image tampering identification using blind deconvolution, Proc. IEEE ICIP, (2006).
DOI: 10.1109/icip.2006.312848
Google Scholar
[14]
Dai, L., Zhang, Y., Li, Y., & Wang, H. (2014, April). MMW and THz images denoising based on adaptive CBM3D. In Sixth International Conference on Digital Image Processing (pp.915906-915906). International Society for Optics and Photonics.
DOI: 10.1117/12.2064052
Google Scholar
[15]
Fan, Youchen, Huayan Sun, and Haoxiang Wang. Application in casting defect lossless examination based on surf., ISPDI 2013-Fifth International Symposium on Photoelectronic Detection and Imaging. International Society for Optics and Photonics, (2013).
DOI: 10.1117/12.2032473
Google Scholar
[16]
Ng, P. C., & Henikoff, S. (2003). SIFT: Predicting amino acid changes that affect protein function. Nucleic acids research, 31(13), 3812-3814.
DOI: 10.1093/nar/gkg509
Google Scholar