2018
DOI: 10.1007/s00521-018-3586-y
|View full text |Cite
|
Sign up to set email alerts
|

Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Moghaddasi et al (2018) [ 1 ] used a low-dimensional singular value (SV) decomposition of the DCT coefficients to detect image splicing by computing the roughness measure of SVs. The dimension feature reduction was applied using the kernel PCA.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Moghaddasi et al (2018) [ 1 ] used a low-dimensional singular value (SV) decomposition of the DCT coefficients to detect image splicing by computing the roughness measure of SVs. The dimension feature reduction was applied using the kernel PCA.…”
Section: Methodsmentioning
confidence: 99%
“…The method of Zhao et al [ 5 ] has the lowest accuracy with a dimensionality of 60. Although the algorithm of Moghaddasi et al [ 1 ] has the highest accuracy with 60 dimension features, this approach applied the kernel PCA for feature reduction. The high accuracy using the Cr color space that reached 99.50% without feature reduction is the strength of the proposed method compared with the other methods using the CASIA v2 image dataset [ 26 ].…”
Section: Comparison With Other Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…References [20][21][22][23] propose using pixel replacement or pixel value substitution to encrypt image content. References [24][25][26][27][28] encrypt the image by changing the transform coefficient of the image in the frequency domain. Similar to the problems of anonymization technology, data encryption technology will also make corresponding assumptions for attacks and then design the corresponding encryption algorithm based on these assumptions.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the image splicing tampering refers to a forged digital image created by fusing different region(s) from a couple or more images together. When manipulation expertly executed the spliced regions on the forged image is visually undetectable [5,6]. Image tampering can be detected using active and passive authentication methods.…”
Section: Introductionmentioning
confidence: 99%