2019
DOI: 10.3837/tiis.2019.08.010
|View full text |Cite
|
Sign up to set email alerts
|

Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms

Abstract: Copy-move forgery (CMF) in digital images is a detrimental tampering of artefacts that requires precise detection and analysis. CMF is performed by copying and pasting a part of an image into other portions of it. Despite several efforts to detect CMF, accurate identification of noise, blur and rotated region-mediated forged image areas is still difficult. A novel algorithm is developed on the basis of quaternion polar complex exponential transform (QPCET) to detect CMF and is conducted involving a few steps. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Two kinds of forgery used in the literature are "Replication" and "Object Removal with uniform Background" types of forgeries. Later forgery technique becomes a problem for keypoint based methods.Salam A. Thaje et al [15]suggested the algorithm is developed on the basis of quaternion polar complex exponential transform (QPCET) to detect CMF and is conducted involving a few steps. Firstly, the suspicious image is divided into overlapping blocks.…”
Section: Literature Workmentioning
confidence: 99%
“…Two kinds of forgery used in the literature are "Replication" and "Object Removal with uniform Background" types of forgeries. Later forgery technique becomes a problem for keypoint based methods.Salam A. Thaje et al [15]suggested the algorithm is developed on the basis of quaternion polar complex exponential transform (QPCET) to detect CMF and is conducted involving a few steps. Firstly, the suspicious image is divided into overlapping blocks.…”
Section: Literature Workmentioning
confidence: 99%
“…During the initial identification of similar blocks, a possibility exists that false matches will be obtained. These false matches can be eliminated by using morphological operators [21,22] , random sample consensus, or window method. In keypoint-based CMFD algorithms, keypoints are extracted from the suspected image by using scaleinvariant feature transform [23,24] , speeded-up robust feature (SURF) [25,26] , and binary robust invariant scalable keypoints [17] .…”
Section: Introductionmentioning
confidence: 99%