[1]A. Haouzia and R. Noumeir, “Methods for Image Authentication: A Survey,” Springer Netherlands, Multimedia Tools and Applications, Vol. 39. No. 1, pp. 1-46, Aug. 2008.
[2]H. Farid, “Digital Image Forensics,” Scientific American Magazine, pp. 66-71, Jun. 2008.
[3]H. T. Sencar and N. Memon, “Overview of State-of-the-Art in Digital Image Forensics,” Statistical Science and Interdisciplinary Research. World Scientific Press, Singapore, 2008.
[4]B. Mahdian and S. Saic, “Blind Methods for Detecting Image Fakery,” IEEE International Carnahan Conference on Security Technology, pp. 280-286, Oct. 2008.
[5]T. V. Lanh, K. S. Chong, S. Emmanuel and M. S. Kankanhalli, “A Survey on Digital Camera Image Forensic Methods,” IEEE International Conference on Multimedia and Expo, pp. 16-19, Jul. 2007.
[6]W. Luo, Z. H. Qu, F. Pan and J. Huang, “A Survey of Passive Technology for Digital Image Forensics,” Frontiers of Computer Science in China, Vol. 1, pp. 166-179, May 2007.
[7]W. Luo, et al., ”Robust Detection of Region-Duplication Forgery in Digital Image,” International Conference on ICPR, Vol. 4 pp. 746-749, Sep. 2006.
[8]G. Li, et al., ”A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD,” IEEE International Conference on Multimedia and Expo, pp. 1750-1753, Aug. 2007.
[9]G. Liu, et al., “Detection of Image Region Duplication Forgery Using Model with Circle Block,” IEEE Conferences on MINES, Vol. 1, pp. 25-29, Jan. 2009.
[10]A.N. Myrna, et al., ”Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping,” International Conference on Computational Intelligence and Multimedia Applications, Vol. 3, pp. 371-377, Dec. 2007.
[11]S. Bayram, H.T. Sencar, N. Memon; ”An efficient and robust method for detecting copy-move forgery,” ICASSP, pp. 1053-1056, May 2009.
[12]Q. Wu, S. Wang and X. Zhang, “Detection of Image Region-Duplication with Rotation and Scaling Tolerance”, Computational Collective Intelligence. Technologies and Applications, Vol. 6421, pp.100-108, 2010.
[13]B.S. Sergio, K.N. Asoke, "Automated detection and localisation of duplicated regions affected by refection, rotation and scaling in image forensics," EURASIP, Feb. 2011.
[14]S.J Ryu, M.J. Lee, H.K. Lee, “Detection of Copy-Rotate-Move Forgery Using Zernike Moments,” Workshop on Information Hiding (Lecture Notes in Computer Sciences).Berlin, Germany: Springer-Heidelberg, Vol.6387, pp.51-65, 2010.
[15]V. Christlein, C. Riess, E. Angelopoulou, “On rotation invariance in copy-move forgery detection”, IEEE International Workshop on Information Forensics and Security (WIFS), pp.1-6, 2010.
[16]H. Huang, W. Guo, Y. Zhang, ”Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm,” PACIIA, Vol.2, pp. 272-276, Jan. 2008.
[17]X. Bo, et al., ”Image Copy-Move Forgery Detection Based on SURF” IEEE Conferences on MINES, pp. 889-892, Nov. 2010.
[18]X. Pan and S. Lyu, ”Region Duplication Detection Using Image Feature Matching,” IEEE Transactions on Information Forensics and Security, Vol. 5, Issue 4, pp. 857-866, Nov. 2010. [In top 10 accessed articles of IEEE TIFS March 2011]
[19]E. Ardizzone, et al., ”Detecting multiple copies in tampered images,” ICIP, pp. 2117-2120, Sept. 2010.
[20]I. Amerini, et al., ”A SIFT-based forensic method for copy-move attack detection and transformation recovery,” IEEE Transactions on Information Forensics and Security, Vol. pp, pp. 1, Mar. 2011.
[21]P. Kakar, N. Sudha, “Exposing Postprocessed Copy-Paste Forgeries Though Transform-Invariant Features,” IEEE Transactions on Information Forensics and Security, Vol. 7, pp. 1018-1028, 2012.
[22]郭天穎、黃偲能,基於影像不變特徵及區域離群值檢測之重複區域篡改偵測,國立臺北科技大學電機工程系碩士論文,中華民國一百年七月[23]D. Lowe, “Distinctive image features from scale-invariant keypoints,” Int.’l Journal of Computer Vision, Vol. 60, No.2, pp. 91-110, 2004.
[24]H. Bay, et al., "SURF: Speeded Up Robust Features", Computer Vision and Image Understanding, Vol. 110, pp. 346-359, 2008.
[25]M. Breunig, H.P. Kriegel, R.T. Ng, J. Sander, "LOF: Identifying Density-Based Local Outliers," ACM SIGMOD Int. Conf. on Management of Data, Vol. 29, No. 2, pp.93-104,Jun. 2000.
[26]R. M. Haralick, K Shanmugam, “Textural Features for Image Classification", IEEE Transactions on Systems, Man, and Cybernetics SMC-3 (6): 610–621.
[27]Wikipedia contributors, Cluster analysis,
[online] http://en.wikipedia.org/wiki/Cluster_analysis (Accessed: 10 July 2012).
[28]R. Hess, ”An Open Source SIFT Library ,” ACM MM, 2010.
[29]G. Schaefer and M. Stich, “UCID—an uncompressed colour image database ” School Comput. Math., Nottingham Trent University, Nottingham,U.K., Tech. Rep., 2003 Available: http://www-staff.lboro.ac.uk/~cogs/datasets/UCID/ucid.html
[30]R. Franzen, “Kodak Lossless True Color Image Suite”
Available: http://r0k.us/grapics/kodak/