References
- M. Ali Qureshi, A Review on Copy Move Image Forgery Detection Techniques, 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14)
- Sunil Kumar & Swati Nagori (2017) Key-point based copy-move forgery detection in digital images, Journal of Statistics and Management Systems, 20:4, 611-621. doi: 10.1080/09720510.2017.1395181
- Mohammad Farukh Hashmia, Vijay Anandb, Avinas G. Keskarc, “Copy-move Image Forgery Detection Using an Efficient and Robust Method Combining Un-decimated Wavelet Transform and Scale Invariant Feature Transform” 2014 AASRI Conference on Circuit and Signal Processing (CSP 2014)
- B. L. Shivakumar, S. Santhosh Baboo, “Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Current Methods”, Global Journal of Computer Science and Technology, 2010
- S. Murali, Govindraj B. Chittapur, Prabhakara H. S, Basavaraj S. Anami, “Comparison And Analysis Of Photo Image Forgery Detection Techniques”, International Journal on Computational Sciences & Applications (IJCSA) Vo2, No.6, December 2012.
- Akhilesh Kumar Yadav, Deenbandhu Singh, Vivek Kumar, “Forgery (Copy-Move) Detection In Digital Images Using Block Method”, International Journal Of Collaborative Research In Engineering Sciences, 2014.
- S. S. Mangat and H. Kaur, “Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method,” 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2016.
- MotasemSamer Al-Sawadi, “Automatic Detection of Copy-Move Image Forgery Based on Clustering Technique”, King Saud University College of Computer and Information Sciences Computer Engineering Department, 2013.
- S. Agarwal and S. Chand, “Image forgery detection using Markov features in undecimated wavelet transform,” 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, 2016.
- C. M. Pun, X. C. Yuan and X. L. Bi, “Image Forgery Detection Using Adaptive Over segmentation and Feature Point Matching,” in IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, Aug. 2015 doi: 10.1109/TIFS.2015.2423261