2021
DOI: 10.1016/j.eswa.2021.115282
|View full text |Cite
|
Sign up to set email alerts
|

A fast technique to detect copy-move image forgery with reflection and non-affine transformation attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…This section exists independently in this review because it is now the subject of study within the field of FDE as examiners are called upon more and more to examine digital documents. In the period under review nine articles [ [647] , [648] , [649] , [650] , [651] , [652] , [653] , [654] , [655] ], 13 conference presentations [ [656] , [657] , [658] , [659] , [660] , [661] , [662] , [663] , [664] , [665] , [666] , [667] , [668] ], and five workshops [ [669] , [670] , [671] , [672] , [673] ] were dedicated to this subject.…”
Section: Forensic Document Examinationmentioning
confidence: 99%
See 1 more Smart Citation
“…This section exists independently in this review because it is now the subject of study within the field of FDE as examiners are called upon more and more to examine digital documents. In the period under review nine articles [ [647] , [648] , [649] , [650] , [651] , [652] , [653] , [654] , [655] ], 13 conference presentations [ [656] , [657] , [658] , [659] , [660] , [661] , [662] , [663] , [664] , [665] , [666] , [667] , [668] ], and five workshops [ [669] , [670] , [671] , [672] , [673] ] were dedicated to this subject.…”
Section: Forensic Document Examinationmentioning
confidence: 99%
“…Dixit [ 650 ] proposed a forgery detection technique in which Center Surround Extrema (CenSurE) detector is applied for key point detection from images. Experimental results show that the proposed technique could effectively detect forged images containing reflection and non-affine transformation with geometrical attacks, as well as robustness against erosion, dilation, RGB color addition, zoom motion blur, JPEG compression, spread noise addition, and multiple copy-move attacks.…”
Section: Forensic Document Examinationmentioning
confidence: 99%
“…Dixit, Anuja et.al (2021) worked on a technique technique to detect copy-move image forgery with reflection and nonaffine transformation attacks [27]. The detection technique was based on Center Surround Extrema (CenSurE) detector.…”
Section: Brisk>surf>sift>akaze>kaze IImentioning
confidence: 99%
“…After detecting 68 face landmarks, a set of predefined transformations are applied per each warping functions. To update the location of neighboring face landmarks, five selected landmarks are used to estimate an affine transformation [5] between the reference and input space. This transformation is encoded in a matrix to transform the points from reference to target space and vice versa via a simple matrix multiplication.…”
Section: Automatic Face Warpingmentioning
confidence: 99%