2017
DOI: 10.1111/1556-4029.13456
|View full text |Cite
|
Sign up to set email alerts
|

Two‐stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images

Abstract: ABSTRACT:In digital image forensics, copy-move or region duplication forgery detection became a vital research topic recently. Most of the existing keypoint-based forgery detection methods fail to detect the forgery in the smooth regions, rather than its sensitivity to geometric changes. To solve these problems and detect points which cover all the regions, we proposed two steps for keypoint detection. First, we employed the scale-invariant feature operator to detect the spatially distributed keypoints from th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Suppose the pixel coordinates of light heart in the image are represented as ( u 0 , v 0 ), and the physical size of every pixel in the x and y axes are d x and d y. The relation between the pixel coordinate system and world coordinates system is shown below: [16])(u v 1 = )(1em4ptf d x 0 u 0 0 0 f d y v 0 0 0 0 1 0 )(1em4ptR T 0 1 )(Xw Yw Zw 1 where R stands for rotation matrix and T represents for translation matrix, f is the focal length of the microscope, ( X w , Y w , Z w ) presents the corner point coordinates of the checkerboard in the world coordinates, and ( u , v ) is subpixel corner point coordinates in the pixel coordinates system. Building equations by several points of checkerboard in pixel coordinates system and world coordinates system, the parameter matrixes of the system are solved by least‐square method, and then the calibrating process is finished.…”
Section: Subpixel Corner Point Detecting Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Suppose the pixel coordinates of light heart in the image are represented as ( u 0 , v 0 ), and the physical size of every pixel in the x and y axes are d x and d y. The relation between the pixel coordinate system and world coordinates system is shown below: [16])(u v 1 = )(1em4ptf d x 0 u 0 0 0 f d y v 0 0 0 0 1 0 )(1em4ptR T 0 1 )(Xw Yw Zw 1 where R stands for rotation matrix and T represents for translation matrix, f is the focal length of the microscope, ( X w , Y w , Z w ) presents the corner point coordinates of the checkerboard in the world coordinates, and ( u , v ) is subpixel corner point coordinates in the pixel coordinates system. Building equations by several points of checkerboard in pixel coordinates system and world coordinates system, the parameter matrixes of the system are solved by least‐square method, and then the calibrating process is finished.…”
Section: Subpixel Corner Point Detecting Methodsmentioning
confidence: 99%
“…This method analyses the matrix of local derivatives around each point. It has been deeply studied and improved by recent researcher [5, 13], for example, Liang et al [14], Banerjee et al [15], and Emam et al [16] present grey‐centre method based on Harris operator to implement subpixel corner point detecting. In this method, the location of corner points at pixel level are firstly solved by adopting Harris operator, and then in this location by building the error minimisation function and iterative solving it, the coordinates of subpixel corner points are attained, which has also higher detecting precision.…”
Section: Introductionmentioning
confidence: 99%
“…However, the detection accuracy is low as compared to a simple SIFT-based approach. Emam et al [21] presented a novel method for CMFD that used the SIFT algorithm to extract the key features from the digital images texture area, and the Harris corner operator to measure the keypoints from the flat areas in the image. The keypoints from both descriptors were combined by using the Multi-support Region Order-based Gradient Histogram (MROGH) descriptor.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The forged content was computed by measuring the similarity of fused key features. The technique [21] is robust to additive noise attacks, however shows a low recall rate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…When the use of digital data increases, new software tools for manipulating photos and photographs are being implemented. These tools are used to make forged data, where objects can be added or deleted to look like real data [5]. Therefore, checking the validity of available digital content in the form of images has become crucial.…”
Section: Introductionmentioning
confidence: 99%