Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013 2013
DOI: 10.1109/ecai.2013.6636173
|View full text |Cite
|
Sign up to set email alerts
|

Exposing copy-move image tampering using forensic method based on SURF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The SIFT feature is initially used by Pan and Lyu [50] for detecting forgery. Paper [94] reduces the processing time since it uses SURF feature instead of SIFT. However, the detection result is hardly improved since SURF is less transformation invariant than SIFT.…”
Section: Performance Comparison and Discussionmentioning
confidence: 99%
“…The SIFT feature is initially used by Pan and Lyu [50] for detecting forgery. Paper [94] reduces the processing time since it uses SURF feature instead of SIFT. However, the detection result is hardly improved since SURF is less transformation invariant than SIFT.…”
Section: Performance Comparison and Discussionmentioning
confidence: 99%
“…Unlike block-based methods relying solely on block comparison, Feature point-based methods [21] are chosen to match feature points extracted from the image, such as SIFT-based methods [22–24] and SURF-based [25] methods, etc., most of these method based on these descriptors can resist some attacks, such as rotation, resizing, lighting adjustments and noise. SIFT (SURF) points are extracted, and similar points are searched in all keypoints to locate forgery regions [2225]. In [26], SIFT feature points are matched by singular value decomposition (SVD) method which can resist geometrical transformations, so it is robust to detect high performance tampered area.…”
Section: Introductionmentioning
confidence: 99%