2016
DOI: 10.1016/j.jnca.2016.09.008
|View full text |Cite
|
Sign up to set email alerts
|

Copy-move forgery detection: Survey, challenges and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0
3

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 180 publications
(68 citation statements)
references
References 106 publications
(225 reference statements)
0
65
0
3
Order By: Relevance
“…Keypoint approaches are known to be generally fast, but they can fail if source S and destination D show as homogeneous. Meanwhile, the third category deals with strategies related to irregular region-based methods [29,38], and has been shown to be somewhat efficient, though occasionally resulting in false positives [39][40][41][42].…”
Section: Related Workmentioning
confidence: 99%
“…Keypoint approaches are known to be generally fast, but they can fail if source S and destination D show as homogeneous. Meanwhile, the third category deals with strategies related to irregular region-based methods [29,38], and has been shown to be somewhat efficient, though occasionally resulting in false positives [39][40][41][42].…”
Section: Related Workmentioning
confidence: 99%
“…The result can be an exact match or approximate one. The features extracted for blocks are in the form of frequency, texture, polar transforms and dimension reduction [26]. Feature extraction techniques are given in Table 1 …”
Section: Block Based Approachesmentioning
confidence: 99%
“…The descriptor helps to increase the reliability of the features to the affine transformation. Then, both features and descriptors in the image are classified and matched to each other to find the duplicated regions in the copy-move forgery [26].…”
Section: Key-point Based Approachesmentioning
confidence: 99%
“…For this purpose, [4] work on images from videos and analyze them with forensics techniques to detect modifications in the images. The problem of image authenticity has been addressed in the Image forensics community in several ways [5], [6]. However most of the approaches poorly perform on images circulating on SN [7].…”
Section: State Of the Artmentioning
confidence: 99%