[1] |
周琳娜, 王东明 , 数字图像取证技术[M]. 北京: 北京邮电大学出版社, 2008.
|
|
Zhou Linna, Wang Dongming. Digital image forensics technology[M]. Beijing: Beijing University of Posts and Telecommunications Press, 2008.
|
[2] |
Lyu S, Farid H . How realistic is photorealistc[J]. IEEE Transactions on Signal Processing, 2005,53(2):845-850.
|
[3] |
Li J, Li X, Yang B , et al. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics and Security. 2015,10(3):507-18.
|
[4] |
Xia Z, Wang X, Zhang L , et al. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2016,11(11):2594-2608.
|
[5] |
Zhou Z, Wang Y, Wu Q J , et al. Effective and efficient global context verification for image copy detection[J]. IEEE Transactions on Information Forensics and Security, 2017,12(1):48-63.
|
[6] |
郑伟, 张大兴, 景阳帅 . 一种基于WLD特征的盲检测数字水印算法[J]. 电子科技, 2016,29(7):15-18.
|
|
Zheng Wei, Zhang Daxing, Jing Yangshuai . A blind detection digital watermarking algorithm based on WLD features[J]. Electronic Science and Technology, 2016,29(7):15-18.
|
[7] |
Gallagher A, Chen T . Image authentication by detecting traces of demosaicing[C]. Anchorage:IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2008.
|
[8] |
Qiao T, Retraint F, Cogranne R . Image authentication by statistical analysis[C]. Marrakech:Proceedings of the 21 st European Signal Processing Conference , 2013.
|
[9] |
Chang C C, Lin C J . LIBSVM:A library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology, 2011,2(3):1-27.
|
[10] |
Wang J, Li T, Shi Y Q , et al. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics[J]. Multimedia Tools and Applications, 2016,76(22):1-17.
|
[11] |
Peng F, Zhou D L, Long M , et al. Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis[J]. AEU-International Journal of Electronics and Communications, 2017,71(3):72-81.
|
[12] |
Fridrich J, Lukas J, Goljan M . Digital camera identification from sensor noise[J]. IEEE Transactions on Information Security and Forensics, 2006,1(2):205-214.
|
[13] |
Long M, Peng F, Zhu Y . Identifying natural images and computer generated graphics based on binary similarity measures of PRNU[J]. Multimedia Tools and Applications, 2017(7):1-18.
|
[14] |
De Rezende E R, Ruppert G C, Carvalho T . Detecting computer generated images with deep convolutional neural networks[C]. Niteroi:The 30 th Conference on Graphics, Patterns and Images , 2017.
|
[15] |
De Rezende E R, Ruppert G C, Theophilo A , et al. Exposing computer generated images by using deep convolutional neural networks[J]. Signal Processing:Image Communication, 2018(1):1352-1366.
|
[16] |
Mader B, Banks M S, Farid H . Identifying computer-generated portraits: the importance of training and incentives[J]. Perception, 2017,46(9):1062-1076.
|
[17] |
Gloet Bohme R . The dresden image database'for bench marking digital image forensics[C]. Sierre:Proceedings of the ACM Symposium on Applied Computing, 2010.
|