2019
DOI: 10.1016/j.jisa.2019.01.007
|View full text |Cite
|
Sign up to set email alerts
|

Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…Block-based techniques separate the image into overlapping or non-overlapping squares or blocks of circle shapes as shown in Figure 5. Then using an effective feature transform, features can be extracted from each block such as discrete cosine transform [37,38], discrete wavelet transform [39], curvelet transform [40], fourier transform [41,42,43], fast walsh-hadamard transform (fwht), singular value decomposition [44], principal component analysis, intensity, zernike moments [45], and combinations of them. Some of multiscale decomposition transform (MSD) like pyramid and wavelet transform lacks directionality.…”
Section: Ic-mfd Algorithms Based Transform Domainmentioning
confidence: 99%
See 3 more Smart Citations
“…Block-based techniques separate the image into overlapping or non-overlapping squares or blocks of circle shapes as shown in Figure 5. Then using an effective feature transform, features can be extracted from each block such as discrete cosine transform [37,38], discrete wavelet transform [39], curvelet transform [40], fourier transform [41,42,43], fast walsh-hadamard transform (fwht), singular value decomposition [44], principal component analysis, intensity, zernike moments [45], and combinations of them. Some of multiscale decomposition transform (MSD) like pyramid and wavelet transform lacks directionality.…”
Section: Ic-mfd Algorithms Based Transform Domainmentioning
confidence: 99%
“…d) The CMFD that proposed in [40], are robust to some of geometric transformation. e) In [37], only geometric transformation are applied. f) In [36], only post processing operations are applied.…”
Section: Ic-mfd Algorithms Based Transform Domainmentioning
confidence: 99%
See 2 more Smart Citations
“…Soni et al [23] proposed a combination of block‐based and keypoint‐based copy–move forgery detections. SURFs were extracted from each non‐overlapping block and 2NN matching is performed against the blocks.…”
Section: Related Workmentioning
confidence: 99%