1] V. Nath, R. Gaharwar, and G. Gaharwar, "Comprehensive study of different
types image forgeries," international conference of Recent Advances Engineering
Science and Mangement, New Delhi, 30 August 2015.
[2] N. B. A. Warif, K. K. R. Choo , A. W. A. Wahab, S. Shamshirband, R. Ramli,
R. Salleh, and M. Y. I. Idris, "Copy-move forgery detection: Survey, challenges
h: 0px; "> and future directions," Journal of Network and Computer Applications, vol. 75, pp.
259-278, 2016.
[3] A. J. Fridrich, A. J. Lukáš, and B. D. Soukal, "Detection of copy-move
forgery in digital images," in Proceedings of Digital Forensic Research Workshop,
2003.
[4] H. Farid and A. Popescu, "Exposing digital forgeries by detecting duplicated
image regions. Department Computer Science, Dartmouth College, Technology
Report TR2004-515," ed, 2004.
[5] G. Li, Q. Wu, S. Sun, and D. Tu, "A sorted neighborhood approach for
detecting duplicated regions in image forgeries based on DWT and SVD," in
Multimedia and Expo, 2007 IEEE International Conference on, 2007, pp. 1750-
1753.
[6] B. Mahdian and S. Saic, "Detection of copy–move forgery using a method
based on blur moment invariants," Forensic science international, vol. 171, pp.
180-189, 2007.
[7] G. Lynch, H.-Y. M. Liao, and F. Y. Shih, "An efficient expanding block
algorithm for image copy-move forgery detection," Information Sciences, vol. 239,
pp. 253-265, 2013.
[8] I. Amerini, G. Serra, A. Del Bimbo, R. Caldelli , and L. Ballan, "A sift-based
forensic method for copy–move attack detection and transformation recovery,"
IEEE Transactions on Information Forensics and Security, vol. 6, pp. 1099-1110,
2011.
[9] M. Jaberi, G. Muhammad, M. Hussain, and G. Bebis, "Accurate and robust
localization of duplicated region in copy–move image forgery," Machine vision
and applications, vol. 25, pp. 451-475, 2014.
[10] L. Li, X. Wu, H. Zhu, and S. Li, "Detecting copy-move forgery under affine
transforms for image forensics," Computers & Electrical Engineering, vol. 40, pp.
1951-1962, 2014.
[11] M. Zandi, A. Mansouri, and A. Mahmoudi-Aznaveh, "Adaptive matching for
copy-move Forgery detection," in Information Forensics and Security (WIFS),
2014 IEEE International Workshop on, 2014, pp. 119-124.
[12] Y. Cao, Q. Yang, L. Fan, and T. Gao, "A robust detection algorithm for copymove forgery in digital images," Forensic science international, vol. 214, pp. 33-43,
2012.
[13] S. Winograd, "On Computing the Discrete Fourier Transform," Mathematics
of Computation, pp. 175-199, 1978.
[14] Z. M. Hafed and M. D. Levine, "Face recognition using the discrete cosine
transform," International Journal of Computer Vision, vol. 43, pp. 167-188, 2001.
[15] K. Amolins, P. Dare, and Y. Zhang, "Wavelet based image fusion
techniques—An introduction, review and comparison," ISPRS Journal of
Photogrammetry and Remote Sensing, vol. 62, pp. 249-263, 2007.
[16] D. T. Dang-Nguyen, G. Boato, V. Conotter, and C. Pasquini, "RAISE: a raw
images dataset for digital image forensics," in Proceedings of the 6th ACM
Multimedia Systems Conference, 2015, pp. 219-224.
[17] T. Acharya and C. Chakrabarti, "A survey on lifting-based discrete wavelet
transform architectures," Journal of VLSI signal processing systems for signal,
image and video technology, vol. 42, pp. 321-339, 2006.
[18] A. Fridrich, et al., Detection of Copy-move Forgery in Digital Images, 2003.
[19] Y. Huang, D. Long, W. Sun, and W. Lu, "Improved DCT-based detection of
copy-move forgery in images," Forensic science international, vol. 206, pp. 178-
184, 2011.
[20] A. Popescu and H. Farid, Exposing digital forgeries by detecting duplicated
image
regions, Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.