2019
DOI: 10.3390/sym11010083
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Image-Retrieval Method for Image-Splicing Validation

Abstract: Recently, the task of validating the authenticity of images and the localization of tampered regions has been actively studied. In this paper, we go one step further by providing solid evidence for image manipulation. If a certain image is proved to be the spliced image, we try to retrieve the original authentic images that were used to generate the spliced image. Especially for the image retrieval of spliced images, we propose a hybrid image-retrieval method exploiting Zernike moment and Scale Invariant Featu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 53 publications
0
26
0
Order By: Relevance
“…precision (P p ), recall (R p ) and F 1 score ( F p ). These pixel-level metrics are beneficial for evaluating the general localization performance of the algorithm [38]. At pixel-level, the precision is defined as the ratio of the number of correctly detected forged pixels to the number of totally detected forged pixels and recall is defined as the ratio of the number of correctly detected forged pixels to the number of forged pixels in the ground-truth forged image.…”
Section: Localization Resultsmentioning
confidence: 99%
“…precision (P p ), recall (R p ) and F 1 score ( F p ). These pixel-level metrics are beneficial for evaluating the general localization performance of the algorithm [38]. At pixel-level, the precision is defined as the ratio of the number of correctly detected forged pixels to the number of totally detected forged pixels and recall is defined as the ratio of the number of correctly detected forged pixels to the number of forged pixels in the ground-truth forged image.…”
Section: Localization Resultsmentioning
confidence: 99%
“…Their main purpose is to train smart systems (machines) through Machine/Deep learning techniques (ML/DL), but without adapting to the needs of human visual examination. Specifically, images from datasets, recommended for the associated forensic tools, were initially regarded, such as “the-wild-web-tampered-image-dataset” 8 ( Zampoglou et al., 2016 ), the CASIA 9 ( Dong et al., 2013 ) and CASIA v2.0 10 datasets ( Pham et al., 2019 ), the “Image Manipulation Dataset” 11 ( Christlein et al., 2012 ) and the “Deutsche Welle Image Forensics Dataset” 12 ( Zampoglou et al., 2016 ). However, in most of these repositories, numerous examples seem to be irrelevant as news-reporting documents (i.e., they cannot be used to document specific news-stories, which was the main focus of the current work).…”
Section: Methodsmentioning
confidence: 99%
“…We experiment with two approaches for our use caseone with using only the tampered images and it's corresponding mask [17] and the other in which we incorporate a mask for each authentic image i.e. we create an empty mask for an authentic image and train our model using the combined dataset.…”
Section: Basic Structure Of a Unet Architecturementioning
confidence: 99%
“…For the purposes of this paper, we will use the CA-SIA2.0 dataset [7] introduced by Jing Dong et al with its corresponding ground truth masks [17] by Nam Thanh et al The dataset contains 7408 authentic images and 5123 tampered images out of which 3295 are of copy-move type and 1828 are spliced images. Each tampered image has a corresponding binary mask indicating the area of tamper.…”
Section: Datasetmentioning
confidence: 99%