References
- Abrahim, A. R., Rahim, M. S. M., & Bin, S. G. (2019). Splicing image forgery identification based on artificial neural network approach and texture features. Cluster Compute, 22, 647–660. https://doi.org/https://doi.org/10.1077/s10586-017-1668-8
- Agarwal, S., & Chand, S. (2015). Image forgery detection using multi scale entropy filter and local phase quantization. International Journal of Image, Graphics and Signal Processing, 8, 64–74. https://doi.org/https://doi.org/10.5815/ijigsp.2015.10.08.
- Ahonen, T., Matas, J., He, C., & Pietikainen, M. (2009). Rotation invariant image description with local binary pattern histogram Fourier features (Vol. 5575). Springer.
- Chan C.-H., Kittler, J., & Messer, K. (2007). Multi-scale local binary pattern histograms for face recognitions. International Journal on Advances in Biometrics, 4642, 809–818. https://doi.org/https://doi.org/10.1007/978-3-540-74549-5_85
- Chen, M., Fridrich, J., Goljan, M., & Lukas, J. (2008). Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 3(1), 74–90. https://doi.org/https://doi.org/10.1109/TIFS.2007.916285
- Chen, W., Shi, Y. Q., & Su, W. (2007). Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, 6505, 26.
- Chen, Y. L., & Hsu, C. T. (2011). Detecting recompression of JPEG image via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security, 6(2), 396–406. https://doi.org/https://doi.org/10.1109/TIFS.2011.2106121
- Chierchia, G., Poggi, G., Sansone, C., & Verdoliva, L. (2014). A bayesian-MRF approach for PRNU-based image forgery detection. IEEE Transactions on Information Forensics and Security, 9(4), 554–567. https://doi.org/https://doi.org/10.1109/TIFS.2014.2302078
- de Carvalho, T. J. S., Riess, C., Member, A., Angelopoulou, E., Pedrini, H. H., & Rocha, A. D. R. (2013). Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security, 8(7), 1182–1194. https://doi.org/https://doi.org/10.1109/TIFS.2013.2265677
- Dong, J., Wang, W., & Tan, T. (2013). CASIA image tampering detection evaluation database. In Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing (pp. 422–426).
- Gottschlich, C., Marasco, E., Yang, A. Y., & Cukic, B. (2014). Fingerprint liveness detection based on histograms of invariant gradients. In Proceedings of the IEEE International Joint Conference Biometrics (IJCB) (pp. 1–7). IEEE. https://doi.org/https://doi.org/10.1109/BTAS.2014.6996224
- He, Z., Lu, W., Sun, W., & Huang, J. (2012). Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 45(12), 4292–4299. https://doi.org/https://doi.org/10.1016/j.patcog.2012.05.014
- Hsu, Y. F., & Chang, S. F. (2006). Detecting image splicing using geometry invariants and camera characteristics consistency. In IEEE International Conference on Multimedia and Expo ICME 2006—Proceedings (pp. 549–552). ICME. https://doi.org/https://doi.org/10.1109/ICME.2006.262447
- Hussain, M., Muhammad, G., Saleh, S. Q., Mirza, A. M., & Bebis, G. (2013). Image forgery detection using multi-resolution weber local descriptors. In Proceedings of the Eurocon 2013 (pp. 1570–1577). IEEE. https://doi.org/https://doi.org/10.1109/EUROCON.2013.6625186
- Hussain, M., Qasem, S., Bebis, G., Muhammad, G., Aboalsamh, H., & Mathkour, H. (2015). Evaluation of image forgery detection using multi scale weber local descriptors. International Journal on Artificial Intelligence Tools, 24 (4), 1540016. https://doi.org/https://doi.org/10.1142/01218213015400163
- Li, L., Li, S., Zhu, H., Chu, S.-C., Roddick, J. F., & Pan, J.-S. (2013). An efficient scheme for detecting copy-move forged image by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing, 4(1), 46–56.
- Li, L., Xue, J., Wang, X., & Tian, L. (2015). A robust approach to detect digital forgeries by exploring correlation patterns. Pattern Analysis and Applications, 18(2), 351–365. https://doi.org/https://doi.org/10.1007/s10044-013-0319-9
- Lukas, J., Fridrich, J., & Goljan, M. (2006). Detecting digital image forgeries using sensor pattern noise [Paper presentation]. Proceedings of the SPIE, 6072, 60720Y–60720Y–11.x https://doi.org/https://doi.org/10.1117/12.640109
- Muhammad, G., Al-Hammadi, M. H., Hussain, M., & Bebis, G. (2014). Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications, 25(4), 985–995. https://doi.org/https://doi.org/10.1007/s00138-013-0547-4
- Murala, S., Maheshwari, R. P., & Balasubramanian, R. (2012). Local tetra patterns: A new feature descriptor for content-based image retrieval. IEEE Transactions on Image Processing: A Publication of the IEEE Signal Processing Society, 21(5), 2874–2886. https://doi.org/https://doi.org/10.1109/TIP.2012.2188809
- Pietikäinen, M., Hadid, A., Zhao, G., & Ahonen, T. (2011). Local binary patterns for still image. In Computer vision using local binary patterns (Vol. 40, 13–47). Springer.
- Satpathy, A., Jiang, X., & Eng, H. L. (2014). LBP-based edge-texture features for object recognition. IEEE Transactions on Image Processing: A Publication of the IEEE Signal Processing Society, 23(5), 1953–1964. https://doi.org/https://doi.org/10.1109/TIP.2014.2310123
- Schwartz, W. R., Guo, H., Choi, J., & Davis, L. S. (2012). Face identification using large feature sets. IEEE Transactions on Image Processing: A Publication of the IEEE Signal Processing Society, 21(4), 2245–2255. https://doi.org/https://doi.org/10.1109/TIP.2011.2176951
- Shi, Y. Q., Sutthiwan, P., & Chen, L. (2012). Textural features for steganalysis. In International workshop on information hiding (pp. 63–77). Springer.
- Sun, S.-J., Wu, Q., & Li, G.-H. (2009). Detection of image compositing based on a statistical model for natural image. Acta Automatica Sinica, 35(12), 1564–1568. https://doi.org/https://doi.org/10.1016/S1874-1029(08)60124-X
- Tralic, D., Grgic, S., Sun, X., & Rosin, P. L. (2016). Combining cellular automata and local binary patterns for copy-move forgery detection. Multimedia Tools and Applications, 75(24), 16881–16903. https://doi.org/https://doi.org/10.1007/s11042-015-2961-2
- Yang, B., & Chen, S. (2013). A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image. Neurocomputing, 120, 365–379. https://doi.org/https://doi.org/10.1016/j.neucom.2012.10.032
- Zhang, P., & Kong, X. (2009). Detecting image tampering using feature fusion [Paper presentation]. In Proceedings International Conference on Availability, Reliability and Security, ARES 2009, (pp. 335–340). IEEE.
- Zhang, Y., Zhao, C., Pi, Y., Li, S., & Wang, S. (2015). Image-splicing forgery detection based on local binary patterns of DCT coefficients. Security and Communication Networks, 8(14), 2386–2395. https://doi.org/https://doi.org/10.1002/sec.721