2010 International Conference on Multimedia Information Networking and Security 2010
DOI: 10.1109/mines.2010.189
|View full text |Cite
|
Sign up to set email alerts
|

Image Copy-Move Forgery Detection Based on SURF

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
89
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 178 publications
(90 citation statements)
references
References 4 publications
0
89
0
1
Order By: Relevance
“…However, their method has a high time complexity because the SIFT and grey level features must be extracted together. Bo et al [29] proposed a copy-move forgery detection method based on SURF descriptors. This method is robust against rotation and scaling, but its computational time is high.…”
Section: Keypoint-based Methodsmentioning
confidence: 99%
“…However, their method has a high time complexity because the SIFT and grey level features must be extracted together. Bo et al [29] proposed a copy-move forgery detection method based on SURF descriptors. This method is robust against rotation and scaling, but its computational time is high.…”
Section: Keypoint-based Methodsmentioning
confidence: 99%
“…These features are computed only on the image itself, without any division, and the extracted features vectors per keypoint are compared with each other to find similar keypoints. Two well-known keypoint-based methods are: Scale Invariant Transform Methods (SIFT) [31,32] and Speeded Up Robust Features (SURF) [33,34]. One of the state of art of keypoint based methods is (Amerini et al, 2011) [32] that proposed a novel method based on SIFT, which is able to examine region duplication forgery and image splicing.…”
Section: )mentioning
confidence: 99%
“…Bo, Guangjie, Junwen, and Yuewei [46], led a research on copy-move image forgery detection by utilizing Speeded-up Robust Features (SURF) formula, and this formula is designed by Herbert Bay et al It includes key point description and detection. They utilized Hessian matrix for finding the respective key points as well as Haar wavelets for setting the orientation.…”
Section: Keypoint-based Techniquesmentioning
confidence: 99%