2018
DOI: 10.5120/ijca2018916108
|View full text |Cite
|
Sign up to set email alerts
|

Blind Approach for Digital Image Forgery Detection

Abstract: In the digital era of where everyone is exposed to a visual imagery in very large extent. Digital images are very convincible way to share information. Due to the rapidly growing field of digital image acquirement and editing software that are impressive as well sophisticated with many advanced features. Manipulation with features of digital image can perform easily with the help of editing tools, which are cost effectively available online or offline and do not leave any visible footprint of tampering with an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“… Image morphing: forming a new image that is completely different from two previous images. The necessary effects are made to harmonize the two images with each other [12].…”
Section: Introductionmentioning
confidence: 99%
“… Image morphing: forming a new image that is completely different from two previous images. The necessary effects are made to harmonize the two images with each other [12].…”
Section: Introductionmentioning
confidence: 99%
“…Thus the resulting great majority of image forgery detection algorithms employ a passive-based method to detect the tampering discussed in this study. There are two forms of passive detection technology: block based methods and key point based strategies [8]. The novel study as presented in this paper is divided into multiple sensations which further elaborates on the conventional approaches, the current standard practices and cutting edge methodologies, and finally the conclusion and the possible future work and related implications.…”
Section: Introductionmentioning
confidence: 99%
“…However, previous studies have been limited to a single manipulation evaluation to measure the accuracy and robustness of the systems in the forensic applications. In spite of the wide variety of possible manipulation operations on the tampered media, the evaluations were often focused on a single processing manipulation [5,7,8]. Most widespread manipulation methods were adding (e.g., splicing), replicating (e.g., cloning), or removing (e.g., seam carving) content.…”
Section: Introductionmentioning
confidence: 99%