2018
DOI: 10.1007/s11042-018-6922-4
|View full text |Cite
|
Sign up to set email alerts
|

Copy-move forgery detection using combined features and transitive matching

Abstract: Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary. Copy-move is an important branch of multimedia forensics. In this paper, a novel copy-move forgery detection scheme using combined features and transitive matching is proposed. First, SIFT and LIOP are extracted as combined features from the input image. Second, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(9 citation statements)
references
References 74 publications
0
8
0
Order By: Relevance
“…So, to limit the scope, in the following analysis we take a historical perspective, but focus especially on recent CNN-based methods. Moreover, we neglect global manipulations, such as histogram equalization or gamma correction [3], [4], which are not necessarily related to a malicious forgeries, as well as methods devoted only to copy-move forgery detection [5], [6], [7], [8].…”
Section: Related Workmentioning
confidence: 99%
“…So, to limit the scope, in the following analysis we take a historical perspective, but focus especially on recent CNN-based methods. Moreover, we neglect global manipulations, such as histogram equalization or gamma correction [3], [4], which are not necessarily related to a malicious forgeries, as well as methods devoted only to copy-move forgery detection [5], [6], [7], [8].…”
Section: Related Workmentioning
confidence: 99%
“…The SURF and MSER features are extracted from the gray level image separately and then these features are combined to have stronger feature in feature extraction step. The combination of features has been used in various fields in the literature [29], [30] and it has been observed that the rate of true positive rate is higher, and the rate of false positive rate is less than the applications performed with this combined feature compared to the applications performed with the use of these features separately. Therefore, the combination features are used in the proposed method.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…However, some matched keypoints still can't be recognized by the g2NN matching method. Accordingly, the transitive matching is utilized in [50] to enhance the matching relationship.…”
Section: B Feature Matchingmentioning
confidence: 99%
“…Several conventional CMFD techniques utilize the segmentation or the clustering methods to eliminate false matches [24]. The regions/clusters that contain a few matched pairs are discarded [14], [26], [50], [59]. The segmentation and the clustering based algorithms suffer from high time and space complexity [66].…”
Section: E Handling Image Self-similarity and Similar But Genuine Objectsmentioning
confidence: 99%