2014
DOI: 10.1016/j.compeleceng.2013.11.034
|View full text |Cite
|
Sign up to set email alerts
|

Detecting copy-move forgery under affine transforms for image forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(37 citation statements)
references
References 12 publications
0
36
0
1
Order By: Relevance
“…For a 512 × 512 gray image, Table 1 shows the efficacy of the proposed technique against other existing ones. Compared with [2,8,9,13,17,20], the dimension of the feature vector and the number of blocks of ours are lower, which implies that our proposed technique has a lower computational complexity. The experimental results show that the ability of the proposed technique to detect copy-move forgery in an image is more robust to JPEG compression, noise distortion, rotation, and different scaling attacks.…”
Section: Post-verification and Post-processingmentioning
confidence: 94%
See 1 more Smart Citation
“…For a 512 × 512 gray image, Table 1 shows the efficacy of the proposed technique against other existing ones. Compared with [2,8,9,13,17,20], the dimension of the feature vector and the number of blocks of ours are lower, which implies that our proposed technique has a lower computational complexity. The experimental results show that the ability of the proposed technique to detect copy-move forgery in an image is more robust to JPEG compression, noise distortion, rotation, and different scaling attacks.…”
Section: Post-verification and Post-processingmentioning
confidence: 94%
“…Unlike most of the existing techniques that use square blocks, circular blocks are adopted here [6,13,14]. The filtered gray scale image is then divided into overlapping circular blocks.…”
Section: Block Tillingmentioning
confidence: 99%
“…Li et al, 2012;Muhammad et al, 2012;Murali et al, 2012;Myna et al, 2008;Peng et al, 2011;Shao et al, 2012;Shin, 2013;Yang et al, 2013;Zhang et al, 2008;Zhao and Guo, 2013) Texture & Intensity (Ardizzone et al, 2009;Bravo-Solorio and Nandi, 2011;Davarzani et al, 2013;Gan and Zhong, 2014;Hsu and Wang, 2012;Kuznetsov Andrey Vladimirovich, 2014;Lin et al, 2009;Lynch et al, 2013;Singh and Raman, 2012;Ulutas and Ulutas, 2013;Ulutaş et al, 2013) Moments Invariant (Bilgehan and Uluta, 2013;Kashyap and Joshi, 2013;Le and Xu, 2013;Mahdian and Saic, 2007;Ryu et al, 2013Ryu et al, , 2010 Log Polar Transform (Bayram et al, 2009;L. Li et al, 2014L.…”
Section: Feature Extraction Techniquesmentioning
confidence: 96%
“…Leida Li et. al., [15] this paper presents a method for detecting image forgery based on circular pattern matching. The tampered image is filtered and divided into circular blocks.…”
Section: Related Workmentioning
confidence: 99%