4.6 Article

A fast copy-move image forgery detection approach on a reduced search space

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Multiple forgery detection and localization technique for digital video using PCT and NBAP

Nitin Arvind Shelke et al.

Summary: This paper proposes a technique using PCT, NBAP, and GoogleNet model to detect and localize multiple forgeries in digital videos, by implementing pre-processing, feature extraction, and model training steps. The proposed technique proves effective through comprehensive performance assessments using various metrics like accuracy, specificity, precision, recall, and F1-score.

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Article Telecommunications

A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking

Shiv Prasad et al.

Summary: This paper presents a fragile watermarking technique for effectively localizing illegitimate modifications in digital image content. The proposed technique detects forged digital image content strongly at the block-level, achieving high accuracy and image quality in experiments.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

A comprehensive survey on passive techniques for digital video forgery detection

Nitin Arvind Shelke et al.

Summary: Digital videos are widely spread through social networking websites, and the availability of editing tools has made it easier to modify video content. Video forgery detection aims to identify manipulations in videos and verify their authenticity, with techniques categorized as active and passive.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks

Anuja Dixit et al.

Summary: This study proposed a forgery detection technique using CenSurE detector for keypoint detection and LIPID for keypoint descriptor computation. Keypoint matching was conducted with k-NN, k-d tree, and BBF search method, while keypoint grouping was performed using FCM clustering. Experimental results demonstrated the effectiveness of the proposed technique in detecting various forged images and its robustness against attacks.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Information Systems

Fast and effective Keypoint-based image copy-move forgery detection using complex-valued moment invariants

P. Niu et al.

Summary: Copy-move forgery is a common image tampering scheme that can mislead the public opinion. Keypoint-based detection methods are efficient but struggle with certain types of forgeries. This study introduces a fast and accurate detection algorithm based on complex-valued invariant features, which outperforms existing algorithms in experimental results.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2021)

Article Health Care Sciences & Services

Security Risk Assessment of Healthcare Web Application Through Adaptive Neuro-Fuzzy Inference System: A Design Perspective

Jasleen Kaur et al.

RISK MANAGEMENT AND HEALTHCARE POLICY (2020)

Article Computer Science, Information Systems

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications

Rajeev Kumar et al.

IEEE ACCESS (2020)

Review Medicine, Legal

Digital image forgery detection: a systematic scrutiny

Savita Walia et al.

AUSTRALIAN JOURNAL OF FORENSIC SCIENCES (2019)

Review Computer Science, Artificial Intelligence

CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection

Badal Soni et al.

IET IMAGE PROCESSING (2018)

Article Computer Science, Information Systems

A Gaussian pyramid approach to Bouligand-Minkowski fractal descriptors

Joao Batista Florindo et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform

Toqeer Mahmood et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2018)

Review Engineering, Multidisciplinary

Recent Advances in Passive Digital Image Security Forensics: A Brief Review

Xiang Lin et al.

ENGINEERING (2018)

Article Computer Science, Software Engineering

Image forgery detection confronts image composition

Victor Schetinger et al.

COMPUTERS & GRAPHICS-UK (2017)

Article Computer Science, Hardware & Architecture

Forgery detection in digital images via discrete wavelet and discrete cosine transforms

Khizar Hayat et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Hardware & Architecture

Copy-move forgery detection: Survey, challenges and future directions

Nor Bakiah Abd Warif et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Theory & Methods

Copy-Move Forgery Detection by Matching Triangles of Keypoints

Edoardo Ardizzone et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Efficient Dense-Field Copy-Move Forgery Detection

Davide Cozzolino et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Medicine, Legal

Passive forensics for copy-move image forgery using a method based on DCT and SVD

Jie Zhao et al.

FORENSIC SCIENCE INTERNATIONAL (2013)

Article Medicine, Legal

A robust detection algorithm for copy-move forgery in digital images

Yanjun Cao et al.

FORENSIC SCIENCE INTERNATIONAL (2012)

Article Computer Science, Theory & Methods

An Evaluation of Popular Copy-Move Forgery Detection Approaches

Vincent Christlein et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Medicine, Legal

Improved DCT-based detection of copy-move forgery in images

Yanping Huang et al.

FORENSIC SCIENCE INTERNATIONAL (2011)

Article Computer Science, Artificial Intelligence

Exploring Duplicated Regions in Natural Images

M. Bashar et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2010)

Article Computer Science, Artificial Intelligence

Speeded-Up Robust Features (SURF)

Herbert Bay et al.

COMPUTER VISION AND IMAGE UNDERSTANDING (2008)