2020
DOI: 10.1016/j.jisa.2020.102510
|View full text |Cite
|
Sign up to set email alerts
|

A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(21 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…Since editing tools advance, the quality of false images rises and it seems to be original images. Furthermore, postprocessing manipulations, such as brightness equalization/changes and JPEG compression, might decrease the traces left by manipulation and make it very complex to identify [ 3 ]. The copy-move forgery detection (CMFD) consists of deep learning- and hand-crafted-based approaches.…”
Section: Introductionmentioning
confidence: 99%
“…Since editing tools advance, the quality of false images rises and it seems to be original images. Furthermore, postprocessing manipulations, such as brightness equalization/changes and JPEG compression, might decrease the traces left by manipulation and make it very complex to identify [ 3 ]. The copy-move forgery detection (CMFD) consists of deep learning- and hand-crafted-based approaches.…”
Section: Introductionmentioning
confidence: 99%
“…Block-based techniques separate the image into overlapping or non-overlapping squares or blocks of circle shapes as shown in Figure 5. Then using an effective feature transform, features can be extracted from each block such as discrete cosine transform [37,38], discrete wavelet transform [39], curvelet transform [40], fourier transform [41,42,43], fast walsh-hadamard transform (fwht), singular value decomposition [44], principal component analysis, intensity, zernike moments [45], and combinations of them. Some of multiscale decomposition transform (MSD) like pyramid and wavelet transform lacks directionality.…”
Section: Ic-mfd Algorithms Based Transform Domainmentioning
confidence: 99%
“…Block features are extracted using the normalised moment transform before applying the hash function. Gani et al [12] Cellular Automata are applied to each DCT block feature of the image. The time complexity of the method is very high.…”
Section: Related Workmentioning
confidence: 99%