2012 World Congress on Information and Communication Technologies 2012
DOI: 10.1109/wict.2012.6409232
|View full text |Cite
|
Sign up to set email alerts
|

Copy-move forgery detection based on PHT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(23 citation statements)
references
References 8 publications
0
23
0
Order By: Relevance
“…A late study by Li, Li & Wang [41], depicts the blockmatching method of copy-move image forgery detection by utilizing Polar Harmonic Transform (PHT). They utilized this new sort of orthogonal moment in order to make features of image blocks and they achieved bock-matching by utilizing PHT block features.…”
Section: Frequency-based Methodsmentioning
confidence: 99%
“…A late study by Li, Li & Wang [41], depicts the blockmatching method of copy-move image forgery detection by utilizing Polar Harmonic Transform (PHT). They utilized this new sort of orthogonal moment in order to make features of image blocks and they achieved bock-matching by utilizing PHT block features.…”
Section: Frequency-based Methodsmentioning
confidence: 99%
“…In preprocessing, one seeks to improve the image data by suppressing undesired distortions or enhancing the image features (Miljkovi, 2009). The conversion of RGB (Red, Green, and Blue) color channels to grayscale appears to be the most frequently used method used in pre-processing (see (Vincent Christlein, 2010;Amerini et al, 2011;Ardizzone et al, 2010Ardizzone et al, , 2009Cao et al, 2012;Huang et al, 2008Huang et al, , 2011L. Li et al, 2012;Li and Yu, 2010;Lynch et al, 2013;Muhammad et al, 2012;Myna et al, 2008;Peng et al, 2011;Ryu et al, 2013;Wang et al, 2012;Yang et al, 2013;Yang and Huang, 2009;Zhang et al, 2008;Zhao and Guo, 2013).…”
Section: Workflowmentioning
confidence: 99%
“…On the other hand, the keypoint-based approach is commonly displayed by line transformation between each matching point. Both visualization can be further refined by morphology operation using the shapes properties of the features such as contours, skeletons and convex hulls (see Amerini et al, 2013;Cao et al, 2012;Jaberi et al, 2013aJaberi et al, , 2013bL. Li et al, 2012;Pan and Lyu, 2010;Peng et al, 2011;Yang and Huang, 2009;Zhang et al, 2008;Zhao and Guo, 2013).…”
Section: Workflowmentioning
confidence: 99%
See 1 more Smart Citation
“…A method proposed by Ghorbani, Firouzmand and Faraahi [19] for detection of copy-move forgery. They used Discrete Wavelet Transform for dividing input image into four sub-bands.…”
Section: (D) Frequency-based Techniquesmentioning
confidence: 99%