2018
DOI: 10.1049/iet-ipr.2017.0441
|View full text |Cite
|
Sign up to set email alerts
|

CMFD: a detailed review of block based and key feature based techniques in image copy‐move forgery detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(27 citation statements)
references
References 74 publications
(97 reference statements)
0
26
0
1
Order By: Relevance
“…Keypoint approaches are known to be generally fast, but they can fail if source S and destination D show as homogeneous. Meanwhile, the third category deals with strategies related to irregular region-based methods [29,38], and has been shown to be somewhat efficient, though occasionally resulting in false positives [39][40][41][42].…”
Section: Related Workmentioning
confidence: 99%
“…Keypoint approaches are known to be generally fast, but they can fail if source S and destination D show as homogeneous. Meanwhile, the third category deals with strategies related to irregular region-based methods [29,38], and has been shown to be somewhat efficient, though occasionally resulting in false positives [39][40][41][42].…”
Section: Related Workmentioning
confidence: 99%
“…Forgery is localized by highlighting the similar blocks in an image. Distinctive researchers make utilization of different types of features [14]. These researchers are classified according to the type of feature used in their methods as shown in Figure 8.…”
Section: Copy-move Forgery Detection Techniquesmentioning
confidence: 99%
“…There are five methods in block based approach. They are moment-based; dimensionality reduction-based, frequency-based, intensity-based and textured based [10]. Popescu et al [1], PCA is applied to these blocks to yield a reduced dimensional representation that is robust to minor variance in the images such as lossy compression or additive noise.…”
Section: Block-based Approachmentioning
confidence: 99%
“…L i represents the temporary scale image in the jth cycle of FED matrix. Matrix A used for calculation with respect to the method specified in [10]. Scale images Li created after each n cycle is given below…”
Section: Preprocessingmentioning
confidence: 99%