C. Pasquini, C. Brunetta, A. Vinci, V. Conotter, and G. Boato, Towards the verification of image integrity in online news, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 2015.
DOI : 10.1109/ICMEW.2015.7169801

M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, R. Bouwmeester, and J. Spangenberg, Web and social media image forensics for news professionals, Social Media in the Newsroom, 2016.

M. Zampoglou, S. Papadopoulos, and Y. Kompatsiaris, Detecting image splicing in the wild (WEB), 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 2015.
DOI : 10.1109/ICMEW.2015.7169839

V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, An Evaluation of Popular Copy-Move Forgery Detection Approaches, IEEE Transactions on Information Forensics and Security, vol.7, issue.6, pp.1841-1854, 2012.
DOI : 10.1109/TIFS.2012.2218597

URL : http://arxiv.org/pdf/1208.3665

C. Pun, X. Yuan, and X. Bi, Image forgery detection using adaptive oversegmentation and feature point matching, IEEE Trans. on Information Forensics and Security, vol.10, issue.8, pp.1705-1716, 2015.

D. Cozzolino, G. Poggi, and L. Verdoliva, Efficient Dense-Field Copy???Move Forgery Detection, IEEE Transactions on Information Forensics and Security, vol.10, issue.11, pp.2284-2297, 2015.
DOI : 10.1109/TIFS.2015.2455334

I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, A SIFT-Based Forensic Method for Copy???Move Attack Detection and Transformation Recovery, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.1099-1110, 2011.
DOI : 10.1109/TIFS.2011.2129512

Z. Lin, J. He, X. Tang, and C. Tang, Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis, Pattern Recognition, vol.42, issue.11, 2009.
DOI : 10.1016/j.patcog.2009.03.019

T. Bianchi and A. Piva, Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.1003-1017, 2012.
DOI : 10.1109/TIFS.2012.2187516

URL : http://porto.polito.it/2505892/1/bian_TIFS2012_OA.pdf

I. Amerini, R. Becarelli, R. Caldelli, and A. D. Mastio, Splicing forgeries localization through the use of first digit features, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.143-148, 2014.
DOI : 10.1109/WIFS.2014.7084318

H. Farid, Exposing Digital Forgeries From JPEG Ghosts, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, pp.154-160, 2009.
DOI : 10.1109/TIFS.2008.2012215

URL : http://www.ists.dartmouth.edu/library/434.pdf

]. P. Ferrara, T. Bianchi, A. De-rosa, and A. Piva, Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts, IEEE Transactions on Information Forensics and Security, vol.7, issue.5, pp.1566-1577, 2012.
DOI : 10.1109/TIFS.2012.2202227

URL : http://porto.polito.it/2505936/1/ferr_TIFS12_OA.pdf

D. Cozzolino, G. Poggi, and L. Verdoliva, Splicebuster: A new blind image splicing detector, 2015 IEEE International Workshop on Information Forensics and Security (WIFS), 2015.
DOI : 10.1109/WIFS.2015.7368565

B. Mahdian and S. Saic, Using noise inconsistencies for blind image forensics, Image and Vision Computing, vol.27, issue.10, pp.1497-1503, 2009.
DOI : 10.1016/j.imavis.2009.02.001

M. Zampoglou, S. Papadopoulos, and Y. Kompatsiaris, Large-scale evaluation of splicing localization algorithms for web images, Multimedia Tools and Applications, vol.92, issue.4, pp.4801-4834, 2017.
DOI : 10.1007/978-3-642-18405-5_2

J. Brogan, P. Bestagini, A. Bharati, A. Pinto, D. Moreira et al., Spotting the difference: Context retrieval and analysis for improved forgery detection and localization, 2017 IEEE International Conference on Image Processing (ICIP), 2017.
DOI : 10.1109/ICIP.2017.8297049

URL : http://arxiv.org/pdf/1705.00604

I. Amerini, R. Becarelli, R. Caldelli, and M. Casini, A Feature-Based Forensic Procedure for Splicing Forgeries Detection, Mathematical Problems in Engineering, vol.2015, 2015.
DOI : 10.1017/cbo9780511811685

URL : http://doi.org/10.1155/2015/653164

C. Maigrot, E. Kijak, R. Sicre, and V. Claveau, Tampering Detection and Localization in Images from Social Networks: A CBIR Approach, Int. Conf. on Image Analysis and Processing, pp.750-761, 2017.
DOI : 10.1016/j.procs.2016.02.011

URL : https://hal.archives-ouvertes.fr/hal-01623105

L. Gaborini, P. Bestagini, S. Milani, M. Tagliasacchi, and S. Tubaro, Multi-Clue Image Tampering Localization, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.125-130, 2014.
DOI : 10.1109/WIFS.2014.7084315

P. Bestagini, M. Tagliasacchi, and S. Tubaro, Image phylogeny tree reconstruction based on region selection, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2016-2059
DOI : 10.1109/ICASSP.2016.7472039

D. Lowe, Distinctive Image Features from Scale-Invariant Keypoints, International Journal of Computer Vision, vol.60, issue.2, pp.91-110, 2004.
DOI : 10.1023/B:VISI.0000029664.99615.94

URL : http://www.cs.ubc.ca/~lowe/papers/ijcv03.ps

K. Chatfield, V. Lempitsky, A. Vedaldi, and A. Zisserman, The devil is in the details: an evaluation of recent feature encoding methods, Procedings of the British Machine Vision Conference 2011, p.8, 2011.
DOI : 10.5244/C.25.76