2022
DOI: 10.3390/jimaging8030069
|View full text |Cite
|
Sign up to set email alerts
|

Seamless Copy–Move Replication in Digital Images

Abstract: The importance and relevance of digital-image forensics has attracted researchers to establish different techniques for creating and detecting forgeries. The core category in passive image forgery is copy–move image forgery that affects the originality of image by applying a different transformation. In this paper, a frequency-domain image-manipulation method is presented. The method exploits the localized nature of discrete wavelet transform (DWT) to attain the region of the host image to be manipulated. Both… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 29 publications
(48 reference statements)
0
1
0
Order By: Relevance
“…The resampling attack generally occasionally allows correlation among pixels because of interpolation. The CNN-based [16], [17], image forgery identification model learns resampling features [18] very well using spatial maps produced through translation invariance of various regions of images [19], [20]. Thus, this research work aims to build an efficient resampling feature detection through CNN to detect hybrid attacks and achieve better-tampered region segmentation outcomes [21], [22].…”
Section: Introductionmentioning
confidence: 99%
“…The resampling attack generally occasionally allows correlation among pixels because of interpolation. The CNN-based [16], [17], image forgery identification model learns resampling features [18] very well using spatial maps produced through translation invariance of various regions of images [19], [20]. Thus, this research work aims to build an efficient resampling feature detection through CNN to detect hybrid attacks and achieve better-tampered region segmentation outcomes [21], [22].…”
Section: Introductionmentioning
confidence: 99%