Stamm, Matthew C., and KJ Ray Liu. “Forensic detection of image manipulation using statistical intrinsic fingerprints.” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 492-506, 2010.
Murali, S., Govindraj B. Chittapur, and Basavaraj S. Anami. “Comparison and analysis of photo image forgery detection techniques.” arXiv preprint arXiv: 1302.3119, 2013.
Qazi, Tanzeela, Khizar Hayat, Samee U. Khan, Sajjad A. Madani, Imran A. Khan, Joanna Kołodziej, Hongxiang Li, Weiyao Lin, Kin Choong Yow, and CZ. Xu. “Survey on blind image forgery detection.” IET Image Processing, vol. 7, no. 7, pp. 660-670, 2013.
Al-Qershi, Osamah M., and Bee EeKhoo. “Passive detection of copy-move forgery in digital images: State-of-the-art.” Forensic science international, vol. 231, no. 1, pp. 284-295, 2013.
Mahdian, Babak, and StanislavSaic. “A bibliography on blind methods for identifying image forgery.” Signal Processing: Image Communication, vol.25, no. vol. 6, pp.389-399, 2010.
Cozzolino, Davide, Francesco Gargiulo, Carlo Sansone, and Luisa Verdoliva. “Multiple classifier systems for image forgery detection.” In Proceedings of Image Analysis and Processing (ICIAP -2013), pp. 259-268, Springer Berlin Heidelberg, 2013.
Barni, Mauro, and Andrea Costanzo. “A fuzzy approach to deal with uncertainty in image forensics.” Signal Processing: Image Communication, vol. 27, no. 9, pp. 998-1010, 2012.
Christlein, Vincent, Christian Riess, Johannes Jordan, and E. Angelopoulou. “An evaluation of popular copy-move forgery detection approaches.” IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1841-1854, 2012.
Ketenci, Seniha, Guzin Ulutas, and Mustafa Ulutas. “Detection of duplicated regions in images using 1D-Fourier transform.” In Proceedings of International Conference on Systems, Signals and Image Processing (IWSSIP-2014), vol. 2, pp. 171-174, 2014.
Li, Guohui, Qiong Wu, Dan Tu, and Shaojie Sun. “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD.” In Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 1750-1753, 2007.
Wang, Yang, Kaitlyn Gurule, Jacqueline Wise, and Jun Zheng. “Wavelet based region duplication forgery detection.” In Proceedings of Ninth International Conference on Information Technology: New Generations (ITNG-2012), pp. 30-35, 2012.
Fridrich, A. Jessica, B. David Soukal, and A. Jan Luká. “Detection of copy-move forgery in digital images.” In Proceedings of IEEE Digital Forensic Research Workshop, Cleveland, OH, USA, pp. 55-61, August 2003.
Popescu, Alin C., and Hany Farid. “Exposing digital forgeries by detecting duplicated image regions.” Dept. Comput.Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.
Wu Qiong, Shao-Jie SUN, Wei ZHU, Guo-Hui LI, Dan TU, Chao-Sheng HE, “A blind forensic algorithm for detecting doctored image region by application of exemplar-based image completion.” Acta Automatica Silica, vol. 35, no. 3, pp. 239-243, March 2009.
Huang, Yanping, Wei Lu, Wei Sun, and Dongyang Long. “Improved DCT-based detection of copy-move forgery in images.” Forensic science international, vol. 206, no. 1, pp.178-184, 2011.
Cao, Yanjun, TiegangGao, Li Fan, and Qunting Yang. “A robust detection algorithm for copy-move forgery in digital images.” Forensic science international, vol. 214, no. 1, pp. 33-43, 2012.
Muhammad, Ghulam, Muhammad Hussain, and George Bebis. “Passive copy move image forgery detection using undecimated dyadic wavelet transform.” Digital Investigation, vol. 9, no. 1, pp. 49-57, 2012.
Akbarpour Sekeh, Mohammad, Mohd Aizaini Maarof, Mohd Foad Rohani, and Babak Mahdian. “Efficient image duplicated region detection model using sequential block clustering.” Digital Investigation, vol. 10, no. 1, pp. 73-84, 2013.
Lynch, Gavin, Frank Y. Shih, and Hong-Yuan Mark Liao. “An efficient expanding block algorithm for image copy-move forgery detection.” Information Sciences, vol. 239, pp. 253-265, 2013.
Zhao, Jie, and JichangGuo. “Passive forensics for copy-move image forgery using a method based on DCT and SVD.” Forensic science international, vol. 233, no. 1, pp. 158-166, 2013.
Li, Yuenan. “Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching.” Forensic science inter-national, vol. 224, no. 1, pp. 59-67, 2013.
Ketenci, Seniha, and Guzin Ulutas. “Copy-move forgery detection in images via 2D-Fourier Transform.” In Proceedings of 36th IEEE International Conference on Telecommunications and Signal Processing (TSP-2013), pp. 813-816, 2013.
Farid, Hany. “Exposing digital forgeries from JPEG ghosts.” IEEETransactions on Information Forensics and Security, vol. 4, no. 1, pp. 154-160, 2009.
Li, Weihai, Yuan Yuan, and Nenghai Yu. “Passive detection ofdoctored JPEG image via block artifact grid extraction.” SignalProcessing, vol. 89, no. 9, pp. 1821-1829, September 2009.
Bianchi, T., De Rosa, A., Piva, A., “Improved DCT coefficientanalysis for forgery localization in JPEG images” In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP-2011), pp. 2444-2447, May 2011.
Mahdian, Babak, and Stanislav Saic. “Blind authentication usingperiodic properties of interpolation.” IEEE Transactions onInformation Forensics and Security, vol., no. 3, pp. 529-538, 2008.
Amerini, Irene, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra. “A sift-based forensic method for copy-move attack detection and transformation recovery”, IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, 2011.
CASIA Tampering Detection Dataset V1.0, 2009.
Huang, Yanping, Wei Lu, Wei Sun, and Dongyang Long. “Improved DCT-based detection of copy-move forgery in images.” Forensic science international, vol. 206, no. 1, pp. 178-184, 2011.
Hashmi, Mohammad F., Aaditya R. Hambarde and Avinash G. Keskar “Image Authentication Based on HMM and SVM Classifier”, Engineering Letters, vol. 22, no. 4, pp. 183-193, 2014.