2020
DOI: 10.1049/iet-ipr.2020.1118
|View full text |Cite
|
Sign up to set email alerts
|

Composite attacks‐based copy‐move image forgery detection using AKAZE and FAST with automatic contrast thresholding

Abstract: Copy‐move image forgery is one of the most popular image tampering technique which can be performed for vicious purposes. In this forgery technique, selected region is copied and pasted at different locations on the same image to produce a manipulated image. Such forgery is denigratory as it can alter the image content by hiding or appending visual information. In this study, the authors propose a novel keypoint‐based technique to detect forged images sustaining composite attacks consisting of various combinat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…The corner detected by FAST is defined as follows: there are enough pixels in the neighbourhood around the pixel in different areas from the point [18, 19]. Consider any pixel in the image and a region centred on it.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The corner detected by FAST is defined as follows: there are enough pixels in the neighbourhood around the pixel in different areas from the point [18, 19]. Consider any pixel in the image and a region centred on it.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The ORB algorithm is used to quickly create feature vectors for key points in an image, which can be used to identify The corner detected by FAST is defined as follows: there are enough pixels in the neighbourhood around the pixel in different areas from the point [18,19]. Consider any pixel in the image and a region centred on it.…”
Section: Dynamic Threshold Orb Algorithmmentioning
confidence: 99%
“…To reduce the computational complexity of block-based CMFD methods, the keypoint-based methods are proposed, using features of key points to replace that of blocks. The main key features are scale invariant feature transform (SIFT) 12 , speed-up robust feature (SURF) 1 , Harris 13 , accelerated-KAZE (A-KAZE) 14 , oriented FAST and rotated BRIEF (ORB) 15 , fast retina keypoint (FREAK) 16 , etc. However, most keypoints extraction methods extract few key points in the smooth regions, resulting in some forgeries in the smooth regions being ignored easily.…”
Section: Related Workmentioning
confidence: 99%
“…CFM detection boasts bright prospects in legal evidence, forensic investigation, defense, and many other fields. Dixit and Bag [23] discussed a CFM detection tool with the potential to identify sections of a picture that have been copied and paste. The CFM detection tool identifies forgeries in two steps.…”
Section: Literature Reviewmentioning
confidence: 99%