[1] Maher R C. Audio forensic examination: authenticity, enhancement, and interpretation [J]. IEEE Signal Processing Magazine, 2009, 26(2): 84-94.[2] Fridrich J. Security of fragile authentication watermarks with localization [C]// Proc SPIE, Security and Watermarking of Multimedia Contents. 2002: 691-700.[3] Wong P W. A public key watermark for image verification and authentication [C]// IEEE International Conference on Image Processing. 1998: 455-459.[4] Farid H. Image forgery detection [J]. IEEE Signal Processing Magazine, 2009, 26(2):16-26.[5] Popescu A C, Farid H. Exposing digital forgeries by detecting traces of re-sampling [J]. IEEE Transactions on Signal Processing, 2005, 53(2): 758-767.[6] 姚秋明, 柴佩琪, 宣国荣, 等. 基于期望最大化算法的音频取证中的篡改检测[J]. 计算机应用, 2006, 26(11): 2598-2601.[7] 丁琦, 平西建. 基于子带平滑度的音频篡改检测[J]. 应用科学学报, 2010, 28(2): 142-146.[8] Gallagher A C. Detection of linear and cubic interpolation in JPEG compressed images [C]// The 2nd Canadian Conference on Computer and Robot Vision. 2005: 65-72.[9] Mahdian B, Saic S. Blind authentication using periodic properties of interpolation [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 529-538.[10] WeiWM,Wang S Z, Zhang X P, et al. Estimation of image rotation angle using interpolationrelated spectral signatures with application to blind detection of image forgery [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 507-517.[11] 宋枫溪, 高林. 文本分类器性能评估指标[J]. 计算机工程, 2004, 30(13): 107-109. |