International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) 2007
DOI: 10.1109/iccima.2007.271
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0
3

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(34 citation statements)
references
References 2 publications
0
31
0
3
Order By: Relevance
“…CMFD methods are either keypointbased methods (e. g. [3], [11], [22]) or block-based methods (e. g. [4]- [7], [9], [10], [12]- [21], [23]- [28]). In both cases, preprocessing of the images is possible.…”
Section: Typical Workflow For Copy-move Forgery Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…CMFD methods are either keypointbased methods (e. g. [3], [11], [22]) or block-based methods (e. g. [4]- [7], [9], [10], [12]- [21], [23]- [28]). In both cases, preprocessing of the images is possible.…”
Section: Typical Workflow For Copy-move Forgery Detectionmentioning
confidence: 99%
“…a) Matching: High similarity between two feature descriptors is interpreted as a cue for a duplicated region. For block-based methods, most authors propose the use of lexicographic sorting in identifying similar feature vectors (see e. g. [4]- [7], [9], [10], [12]- [19], [21], [23]- [28]). In lexicographic sorting a matrix of feature vectors is built so that every feature vector becomes a row in the matrix.…”
Section: Typical Workflow For Copy-move Forgery Detectionmentioning
confidence: 99%
“…Myna et al, [40] proposed a method which uses log polar coordinates and wavelet transforms to detect and also localize copy-move forgery. Application of wavelet transform to input image results in dimensionality reduction and exhaustive search is carried out to identify the similar blocks in the image by mapping them to log-polar coordinates and for similarity criterion phase correlation is used.…”
Section: Copy-move Forgery Detectionmentioning
confidence: 99%
“…The SV vector is sorted lexicographically to detect duplicated region. Myna et al [9] proposed a wavelet transform based approach that detects similar blocks in image by mapping them to log-polar co-ordinates and using phase correlation to find similarity. …”
Section: Review Of Literaturementioning
confidence: 99%