2015
DOI: 10.1016/j.image.2015.08.008
|View full text |Cite
|
Sign up to set email alerts
|

A bibliography of pixel-based blind image forgery detection techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 144 publications
(55 citation statements)
references
References 171 publications
0
53
0
2
Order By: Relevance
“…The diverse arrangements of separation (indicated by d) and edges (meant by θ) between the two pixels can impact the method for computing the quantity of the pixel couples in GLCM. In TF-GLCM, the separation is set at 1 and the edges are 0°, 45°, 90°, and 135° [11]. What's more, these two parameters (d and θ) would bring about four types of grouping.…”
Section: ) Gray Level Co-occurrence Matrices (Glcm)mentioning
confidence: 99%
See 1 more Smart Citation
“…The diverse arrangements of separation (indicated by d) and edges (meant by θ) between the two pixels can impact the method for computing the quantity of the pixel couples in GLCM. In TF-GLCM, the separation is set at 1 and the edges are 0°, 45°, 90°, and 135° [11]. What's more, these two parameters (d and θ) would bring about four types of grouping.…”
Section: ) Gray Level Co-occurrence Matrices (Glcm)mentioning
confidence: 99%
“…Also the MC-SVM is considered into four important methods such as: Directed Acyclic Graph (DAG), Binary Tree (BT), One Against-One (OAO), One-Against-All (OAA) classifiers. Generally SVM class label requires two values such as ± 1, it can be called as bilinear classifier [11]. MC-SVM classifier is constructed by f 1, f 2, .…”
Section: Classifiermentioning
confidence: 99%
“…Broadly, the classification of digital image tampering detection schemes is done in two categories, namely active techniques and passive techniques [3]. In active schemes, prior information about an image is absolutely necessary for authentication, which limits their application.…”
Section: Introductionmentioning
confidence: 99%
“…There exist various statistics such as CFA interpolation, resampling artifacts, motion blur, lightning intensity, reflections, edges, and JPEG fingerprint, which are consistent in the untampered images [1,2]. Recently in [3], the authors provided a comprehensive survey of different forgery detection techniques such as copymove forgery, splicing, resampling, and image retouching. Mostly, they covered pixel-based techniques, as these techniques do not require any a priori information about the type of tampering.…”
Section: Introductionmentioning
confidence: 99%