[1] AL-QERSHI O M and KHOO B E. Passive detection of copy-move forgery in digital images: State-of-the-art[J]. Forensic Science International, 2013, 231(1/3): 284–295. doi: 10.1016/j.forsciint.2013.05.027
[2] ZHOU Xinmin, WANG Kaiyuan, and FU Jian. A method of SIFT simplifying and matching algorithm improvement[C]. IEEE 2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII), Wuhan, China, 2016: 73–77. doi: 10.1109/ICIICII.2016.0029.
[3] AHSAN A M and MOHAMAD D B. Machine learning technique for object detection based on SURF feature[J]. International Journal of Computational Vision and Robotics, 2017, 7(1/2): 6–19. doi: 10.1504/IJCVR.2017.081232
[4] FARID H. Image forgery detection[J]. IEEE Signal Processing Magazine, 2009, 26(2): 16–25. doi: 10.1109/MSP.2008.931079
[5] PIVA A. An overview on image forensics[J]. ISRN Signal Processing, 2013, 2013: 496701.
[6] AL-QERSHI O M and KHOO B E. Enhanced matching method for copy-move forgery detection by means of Zernike moments[C]. The 13th International Workshop on Digital-Forensics and Watermarking, Taipei, China, 2014: 485–497. doi: 10.1007/978-3-319-19321-2_37.
[7] 闫旭, 姜威, 贲晛烨. 基于改进Hu不变矩的图像篡改检测算法[J]. 光学技术, 2018, 44(2): 171–176. doi: 10.13741/j.cnki.11-1879/o4.2018.02.008

YAN Xu, JIANG Wei, and BEN Xianye. Image tamper detection algorithm based on improved Hu invariant moments[J]. Optical Technique, 2018, 44(2): 171–176. doi: 10.13741/j.cnki.11-1879/o4.2018.02.008
[8] AMERINI I, BALLAN L, CALDELLI R, et al. A SIFT-based forensic method for copy–move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1099–1110. doi: 10.1109/TIFS.2011.2129512
[9] MUHAMMAD G, HUSSAIN M, KHAWAJI K, et al. Blind copy move image forgery detection using dyadic undecimated wavelet transform[C]. The 17th IEEE International Conference on Digital Signal Processing, Corfu, Greece, 2011. doi: 10.1109/ICDSP.2011.6004974.
[10] CHRISTLEIN V, RIESS C, JORDAN J, et al. An evaluation of popular copy-move forgery detection approaches[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1841–1854. doi: 10.1109/TIFS.2012.2218597
[11] YAP P T, JIANG Xudong, and KOT A C. Two-dimensional polar harmonic transforms for invariant image representation[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(7): 1259–1270. doi: 10.1109/TPAMI.2009.119
[12] 李扬, 吴敏渊, 颜佳. 基于改进PatchMatch的自相似性图像超分辨率算法[J]. 计算机应用研究, 2018, 35(4): 1231–1235. doi: 10.3969/j.issn.1001-3695.2018.04.058

LI Yang, WU Minyuan, and YAN Jia. Self-similarity based image super-resolution algorithm using optimized PatchMatch[J]. Application Research of Computers, 2018, 35(4): 1231–1235. doi: 10.3969/j.issn.1001-3695.2018.04.058
[13] BARNES C, SHECHTMAN E, FINKELSTEIN A, et al. PatchMatch: A randomized correspondence algorithm for structural image editing[J]. ACM Transactions on Graphics, 2009, 28(3): No. 24. doi: 10.1145/1531326.1531330
[14] BARNES C, SHECHTMAN E, GOLDMAN D B, et al. The generalized PatchMatch correspondence algorithm[C]. The 11th European Conference on Computer Vision–ECCV 2010, Heraklion, Greece, 2010: 29–43. doi: 10.1007/978-3-642-15558-1_3.
[15] COZZOLINO D, POGGI G, and VERDOLIVA L. Efficient dense-field Copy-move forgery detection[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(11): 2284–2297. doi: 10.1109/TIFS.2015.2455334
[16] EHRET T and ARIAS P. On the convergence of PatchMatch and its variants[C]. 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, USA, 2018: 1121–1129. doi: 10.1109/CVPR.2018.00123.
[17] EHRET T. Automatic detection of internal copy-move forgeries in images[J]. Image Processing on Line, 2018(8): 167–191. doi: 10.5201/ipol.2018.213