2019
DOI: 10.1007/s11277-019-06739-7
|View full text |Cite
|
Sign up to set email alerts
|

Copy-Move Forgery Detection Based on Discrete and SURF Transforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…𝐹 𝑓𝑢𝑛𝑐𝑡𝑖𝑜𝑛 (𝑖) = {𝐹 𝑖𝑛𝑡𝑒𝑛𝑠𝑖𝑡𝑦 (𝑖), 𝐹 𝑑𝑥 (𝑖), 𝐹 𝑑𝑦 (𝑖)}, (8) The gradient function 𝐹 𝑑𝑥 (𝑖) for grid unit, i in region x is represented as shown in Eq. ( 9)…”
Section: B) Feature Descriptormentioning
confidence: 99%
See 1 more Smart Citation
“…𝐹 𝑓𝑢𝑛𝑐𝑡𝑖𝑜𝑛 (𝑖) = {𝐹 𝑖𝑛𝑡𝑒𝑛𝑠𝑖𝑡𝑦 (𝑖), 𝐹 𝑑𝑥 (𝑖), 𝐹 𝑑𝑦 (𝑖)}, (8) The gradient function 𝐹 𝑑𝑥 (𝑖) for grid unit, i in region x is represented as shown in Eq. ( 9)…”
Section: B) Feature Descriptormentioning
confidence: 99%
“…The matching process between the block of interest and its complementary images generates features in the form of a distance vector. For this vector, a correlation matrix is constructed, and singular value decomposition is utilized to extract the final set of features for classification [8]. Many researchers have focused on feature extraction tools combined with SURF.…”
Section: Introductionmentioning
confidence: 99%
“…These false matches can be eliminated by using morphological operators [21,22] , random sample consensus, or window method. In keypoint-based CMFD algorithms, keypoints are extracted from the suspected image by using scaleinvariant feature transform [23,24] , speeded-up robust feature (SURF) [25,26] , and binary robust invariant scalable keypoints [17] . Among these extracted keypoints, the similarity is verified, and false matches are eliminated using post-processing operators.…”
Section: Introductionmentioning
confidence: 99%
“…By the procedure of copy-move, an image may be counterfeited to hide or alter its sense [10,11]. It is complex to examine CMF with the naked eye if done carefully despite being one of the prevalent image modifications, along with it is intricate to prove the images' legitimacy for the forensic analyst [12,13]. So owing to these problems, the security and trustworthiness of media information are damaged [14].…”
Section: Introductionmentioning
confidence: 99%