2019 International Conference on Communication and Signal Processing (ICCSP) 2019
DOI: 10.1109/iccsp.2019.8697951
|View full text |Cite
|
Sign up to set email alerts
|

A Modern Approach for Image Forgery Detection using BRICH Clustering based on Normalised Mean and Standard Deviation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In addition, the complexity of creating and preserving flow for feature extraction is high. The BIRCH algorithm [52] fulfills data aggregation through a single-pass scan of the dataset and minimizes the input and output. We implement the feature extraction of multiple flow tables based on the BIRCH algorithm, which includes the definition of the cluster feature (CF) vector and the construction of a CF tree.…”
Section: B a Processing Methods Of Multiple Flow Tables For Sm-uanmentioning
confidence: 99%
“…In addition, the complexity of creating and preserving flow for feature extraction is high. The BIRCH algorithm [52] fulfills data aggregation through a single-pass scan of the dataset and minimizes the input and output. We implement the feature extraction of multiple flow tables based on the BIRCH algorithm, which includes the definition of the cluster feature (CF) vector and the construction of a CF tree.…”
Section: B a Processing Methods Of Multiple Flow Tables For Sm-uanmentioning
confidence: 99%
“…The S.D is another a statistic metric that expresses the degree of variation or dispersion among values of the group. A low S.D refers that the values of the set are typically close to the mean, whereas high S.D refer to values that are spread out over a larger range [26].…”
Section: B Abc Algorithmmentioning
confidence: 99%
“…Texture-based techniques are not resistant to attacks involving geometric transformations. Moment invariant, which includes blur moment, hue moment, Zernike moment, and other characteristics, is a set of features that are invariant to a geometric transformation in moment invariant-based approaches [10]. Each circular colour block that is overlapping is extracted for its QEM (quaternion exponent moment) moduli.…”
Section: Introductionmentioning
confidence: 99%