2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application 2008
DOI: 10.1109/paciia.2008.240
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm

Abstract: As result of powerful image processing tools, digital image forgeries have already become a serious social problem. In this paper we describe an effective method to detect Copy-Move forgery in digital images. This method works by first extracting SIFT descriptors of an image, which are invariant to changes in illumination, rotation, scaling etc. Owing to the similarity between pasted region and copied region, descriptors are then matched between each other to seek for any possible forgery in images. Experiment… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
158
0
8

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 347 publications
(177 citation statements)
references
References 3 publications
0
158
0
8
Order By: Relevance
“…An example of this approach is demonstrated in the paper [6]. In most of the studies [7][8] kd-tree [9] is used for the nearest feature vectors search. It is used in conjunction with the k nearest neighbors search algorithm, which allows to generate a list of k nearest vectors to every feature vector in Euclidean space.…”
Section: Fig 1 General Scheme Of a Copy-move Detection Algorithmmentioning
confidence: 99%
“…An example of this approach is demonstrated in the paper [6]. In most of the studies [7][8] kd-tree [9] is used for the nearest feature vectors search. It is used in conjunction with the k nearest neighbors search algorithm, which allows to generate a list of k nearest vectors to every feature vector in Euclidean space.…”
Section: Fig 1 General Scheme Of a Copy-move Detection Algorithmmentioning
confidence: 99%
“…4 Examples of copy-move attacks for object removal (above) and duplication (below). Images were taken from [45] should be noticed, however, that this operation is not always necessary, as the simple processing of an image can convey relevant alteration of both semantics and pragmatics of an image, as in the well-known case of the TIME magazine cover depicting a darkened O. J. Simpson portrait (Fig. 5).…”
Section: A Short Summary Of the Most Common Tampering Techniquesmentioning
confidence: 99%
“…In this regard, the work of Huang et al [45] exploits SIFT features to obtain robust tampering detection even under geometric transforms. In this case, only matching SIFT key-points are retrieved, by means of the best-bin-first nearest neighbor identification.…”
Section: Detecting Tampering Performed On a Single Imagementioning
confidence: 99%
“…Keypointbased methods, however, can relatively reliably compensate these shortcomings. In (Amerini et al 2013;Amerini et al 2011;Huang et al 2008) Scale-invariant feature transform (SIFT) and (Bo et al 2010;Jing and Shao 2012) Speed-up robust features (SURF) were used to detect copy-move forgery. Due to the number of keypoints is much less than the number of blocks, computational complexity is greatly reduced.…”
Section: Introductionmentioning
confidence: 99%