[1] Rossler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Niessner M. FaceForensics++: learning to detect manipulated facial images. arXiv preprint, 2019. arXiv: 1901.08971
[2] Farid H. Creating and Detecting Doctored and Virtual Images: Implications to the Child Pornography Prevention Act. Technical Report TR2004-518, Department of Computer Science, Dartmouth College, USA, 2004.
[3] Farid H. A survey of image forgery detection. IEEE Signal Processing Magazine, 2009, 26(2): 16-25
[4] Popescu A C, Farid H. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing, 2005, 53(2): 758-767 doi: 10.1109/TSP.2004.839932
[5] Luo W, Huang J, Qiu G. JPEG error analysis and its applications to digital image forensics. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 480-491 doi: 10.1109/TIFS.2010.2051426
[6] Gou H, Swaminathan A, Wu M. Noise features for image tampering detection and steganalysis. In: Proceedings of the 2007 IEEE International Conference on Image Processing. San Antonio, TX, USA: IEEE, 2007. 97-100 https://ieeexplore.ieee.org/document/4379530
[7] Zhou P, Han X, Morariu V I, Davis L S. Learning rich features for image manipulation detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Salt Lake City, USA: IEEE, 2018. 1053-1061 https://www.researchgate.net/publication/325143175_Learning_Rich_Features_for_Image_Manipulation_Detection
[8] Gloe T, Franz E, Winkler A. Forensics for flatbed scanners. In: Proceedings of SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX. California, USA: International Society for Optics and Photonics, 2007. 650511
[9] Kakar P, Sudha N, Ser W. Exposing digital image forgeries by detecting discrepancies in motion blur. IEEE Transactions on Multimedia, 2011, 13(3): 443-452 doi: 10.1109/TMM.2011.2121056
[10] Farid H, Bravo M J. Image forensic analyses that elude the human visual system. In: Proceedings of SPIE 7541, Media Forensics and Security Ⅱ. California, USA: International Society for Optics and Photonics, 2010. 754106 doi: 10.1117/12.837788
[11] Peng B, Wang W, Dong J, Tan T. Image forensics based on planar contact constraints of 3D objects. IEEE Transactions on Information Forensics and Security, 2018, 13(2): 377-392 doi: 10.1109/TIFS.2017.2752728
[12] Carvalho T J D, Riess C, Angelopoulou E, Pedrini H, Rocha A D R. Exposing digital image forgeries by illumination color classification. IEEE Transactions on Information Forensics and Security, 2014, 18(6): 1182-1194 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=Doaj000003806817
[13] Johnson M K, Farid H. Exposing digital forgeries through specular highlights on the eye. In: Proceedings of International Workshop on Information Hiding. Berlin, Heidelberg, Germany: Springer, 2007. 311-325 doi: 10.1007/978-3-540-77370-2_21
[14] Liu Q, Cao X, Chao D, Guo X. Identifying image composites through shadow matte consistency. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1111-1122 doi: 10.1109/TIFS.2011.2139209
[15] Kee E, O0Brien J F, Farid H. Exposing photo manipulation with inconsistent shadows. ACM Transactions on Graphics, 2013, 32(3): 28 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=33fd7688600a6dd746ed39aa3727a855
[16] Kee E, O0Brien J F, Farid H. Exposing photo manipulation from shading and shadows. ACM Transactions on Graphics, 2014, 33(5): 1-21 https://www.mendeley.com/catalogue/exposing-photo-manipulation-shading-shadows/
[17] Johnson M K, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on Multimedia and security. NewYork, NY, USA: ACM Press, 2005. 1-10 https://www.mendeley.com/catalogue/exposing-digital-forgeries-detecting-inconsistencies-lighting/
[18] Carvalho T, Farid H, Kee E R. Exposing photo manipulation from user-guided 3d lighting analysis. In: Proceedings of SPIE Symposium on Electronic Imaging. California, USA: International Society for Optics and Photonics, 2015. 940902
[19] Johnson M K, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 450-461 doi: 10.1109/TIFS.2007.903848
[20] Kee E, Farid H. Exposing digital forgeries from 3-D lighting environments. In: Proceedings of IEEE International Workshop on Information Forensics and Security. Seattle, USA: IEEE, 2010. 1-6
[21] Peng B, Wang W, Dong J, Tan T. Optimized 3D lighting environment estimation for image forgery detection. IEEE Transactions on Information Forensics and Security, 2017, 12(2): 479-494 doi: 10.1109/TIFS.2016.2623589
[22] 孙鹏, 郎宇博, 樊舒, 沈喆, 彭思龙, 刘磊.图像拼接篡改的自动色温距离分类检验方法.自动化学报, 2018, 44(7): 171-182 http://www.aas.net.cn/CN/abstract/abstract19318.shtml

Sun Peng, Lang Yu-Bo, Fan Shu, Shen Zhe, Peng Si-Long, Liu Lei. Detection of image splicing manipulation by automated classification of color temperature distance. Acta Automatica Sinica, 2018, 44(7): 171-182 http://www.aas.net.cn/CN/abstract/abstract19318.shtml
[23] 朱叶, 申铉京, 陈海鹏.基于彩色LBP的隐蔽性复制–粘贴篡改盲鉴别算法.自动化学报, 2017, 43(3): 390-397 http://www.aas.net.cn/CN/abstract/abstract19017.shtml

Zhu Ye, Shen Xuan-Jing, Chen Hai-Peng. Covert copy-move forgery detection based on color LBP. Acta Automatica Sinica, 2017, 43(3): 390-397 http://www.aas.net.cn/CN/abstract/abstract19017.shtml
[24] Blanz V, Vetter T. A morphable model for the synthesis of 3D faces. In: Proceedings of the 26th annual conference on Computer graphics and interactive techniques. NewYork, USA: ACM, 1999. 187-194
[25] Zhu X, Lei Z, Yan J, Yi D, Li S Z. High-fidelity pose and expression normalization for face recognition in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Boston, USA: IEEE, 2015. 787-796
[26] King D E. Dlib-ml: a machine learning toolkit. Journal of Machine Learning Research, 2009, 10(Jul): 1755-1758 https://core.ac.uk/display/21155954
[27] Phong B T. Illumination for computer generated pictures. Communications of the Acm, 1975, 18(6): 311-317 doi: 10.1145/360825.360839
[28] Ramamoorthi R, Hanrahan P. On the relationship between radiance and iIrradiance: determining the illumination from images of a convex lambertian object. Journal of the Optical Society of America A, 2001, 18(10): 2448-2459 doi: 10.1364/JOSAA.18.002448
[29] Basri R, Jacobs D. Lambertian reflectance and linear subspaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(2): 218-233 doi: 10.1109/TPAMI.2003.1177153
[30] Zhang Z. A flexible new technique for camera calibration. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(11): 1330-1334 doi: 10.1109/34.888718
[31] Zhou W, Kambhamettu C. Estimation of illuminant direction and intensity of multiple light sources. In: Proceedings of European conference on computer vision. Berlin, Heidelberg, Germany: Springer, 2002. 206-220