2020
DOI: 10.1049/ipr2.12105
|View full text |Cite
|
Sign up to set email alerts
|

Keypoint based comprehensive copy‐move forgery detection

Abstract: Verifying the authenticity of a digital image has been challenging problem. The simplest of the image tampering tricks is the copy-move forgery. In copy-move forgery copied portion of the image is pasted on another part of the same image. Geometrical transformations are used on the copied portions of the image before pasting it for the tampered image to look realistic and visually convincing. To make it more complex, other processing approaches may also be applied in the forged region for hiding traces of forg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…In Figure 6, a comparative graph illustrates the results of the proposed method for JPEG compression, alongside existing approaches such as Zhu [26], Bi [39], Li [40], and Diwan [21]. The results of the proposed approach showcase superior performance when compared to recent published works.…”
Section: B Detection Of Manipulated Images With Post-processingmentioning
confidence: 97%
See 3 more Smart Citations
“…In Figure 6, a comparative graph illustrates the results of the proposed method for JPEG compression, alongside existing approaches such as Zhu [26], Bi [39], Li [40], and Diwan [21]. The results of the proposed approach showcase superior performance when compared to recent published works.…”
Section: B Detection Of Manipulated Images With Post-processingmentioning
confidence: 97%
“…The findings exhibit a consistent level of performance across various datasets. The approach we present demonstrates superior performance compared to the standard key-point-based approach [21], [39] across multiple datasets including GRIP, CMFD, CA-SIA II.0, CoMoFoD, COVERAGE, MICC-600, and MICC-220. However, the results in the GRIP dataset exhibit a modest decrease.…”
Section: A Detection Of Simple Copy-movementioning
confidence: 97%
See 2 more Smart Citations
“…To reduce the computational complexity of block-based CMFD methods, the keypoint-based methods are proposed, using features of key points to replace that of blocks. The main key features are scale invariant feature transform (SIFT) 12 , speed-up robust feature (SURF) 1 , Harris 13 , accelerated-KAZE (A-KAZE) 14 , oriented FAST and rotated BRIEF (ORB) 15 , fast retina keypoint (FREAK) 16 , etc. However, most keypoints extraction methods extract few key points in the smooth regions, resulting in some forgeries in the smooth regions being ignored easily.…”
Section: Related Workmentioning
confidence: 99%