2023
DOI: 10.26599/bdma.2022.9020029
|View full text |Cite
|
Sign up to set email alerts
|

Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers

Abstract: Passive image forgery detection methods that identify forgeries without prior knowledge have become a key research focus. In copy-move forgery, the assailant intends to hide a portion of an image by pasting other portions of the same image. The detection of such manipulations in images has great demand in legal evidence, forensic investigation, and many other fields. The paper aims to present copy-move forgery detection algorithms with the help of advanced feature descriptors, such as local ternary pattern, lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 58 publications
(3 citation statements)
references
References 47 publications
0
3
0
Order By: Relevance
“…Numerous researchers have investigated a block-based methodology for identifying copy-move manipulation. Some of these investigations comprise; Babu et al [11], proposed to utilize a blend of several iterations of Local Binary Patterns (LBP) such as local ternary pattern, local phase quantization, and local Gabor binary pattern. The characteristics of BP are employed to train the classifier model, while the Support Vector Machine is utilized for the classification of copy-move manipulation verification.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Numerous researchers have investigated a block-based methodology for identifying copy-move manipulation. Some of these investigations comprise; Babu et al [11], proposed to utilize a blend of several iterations of Local Binary Patterns (LBP) such as local ternary pattern, local phase quantization, and local Gabor binary pattern. The characteristics of BP are employed to train the classifier model, while the Support Vector Machine is utilized for the classification of copy-move manipulation verification.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, Data mining technology has piqued the interest of well-known research institutions, leading to the development of intelligent decision analysis algorithms for financial management, as well as business-based concepts such as document warehouses, are proposedintelligence. Moreover, in the telecom sector, to help telecom operators with intelligent data analysis, a service-oriented business intelligence architecture based on the decision tree algorithm has been developed [4].…”
Section: Iirelated Workmentioning
confidence: 99%
“…Conventional accounting methodology and examination of financial data approaches have failed to suit people's multifaceted needs in terms of form, timeliness, and effectiveness for analyzing and making decisions on complex problems. The emergence of artificial intelligence and expertise systems has provided excellent solutions to such difficulties, propelling the evolution of contemporary accounting systems has progressed from information and networkbased systems to intelligent systems [4]. The tripartite theory, which serves as the foundational theory of Decision Support Systems (DSS) and has significantly influenced the subsequent advancement of DSS, has contributed to this transition towards intelligent financial management systems.…”
Section: Iirelated Workmentioning
confidence: 99%