2015 Tenth International Conference on Computer Engineering &Amp; Systems (ICCES) 2015
DOI: 10.1109/icces.2015.7393060
|View full text |Cite
|
Sign up to set email alerts
|

A fast and accurate algorithm for copy-move forgery detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…In [1] With the advent of numerous effective image processing tools in recent times, digital picture counterfeiting has grown to be a significant social problem. One of the most commonly used methods for manipulating imagesCopying and moving forgery, which involves replicating a portion of that photo and then inserting it onto a variousspot within pasting it onto a different .…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In [1] With the advent of numerous effective image processing tools in recent times, digital picture counterfeiting has grown to be a significant social problem. One of the most commonly used methods for manipulating imagesCopying and moving forgery, which involves replicating a portion of that photo and then inserting it onto a variousspot within pasting it onto a different .…”
Section: Literature Surveymentioning
confidence: 99%
“…However, because of the large computations required for the reconstruction and the subsequent SVD, this strategy is unable to deliver high query speed over an extended period of time. Correlation coefficient data are also shown in Table (1) following the application of lowpass filtering attacks using filters with varying window sizes. The correlation acquired by the Liu approach is denoted by correlation (2), while the greatest correlation obtained by the suggested method is denoted by correlation (1).…”
Section: F(w)=vs(w)xut (1 4)mentioning
confidence: 99%
“…Last, Moussa [64] proposed a new simple method for CMFD using the sum of pixel intensities as feature descriptors. The detection algorithm begins by dividing the target digital image into overlapping square blocks.…”
Section: F Color/intensity-based Techniquesmentioning
confidence: 99%
“…Moreover, the matching algorithm uses g2NN to iterate nearest neighbor tests to look for multiple matches. Moussa [64] introduced a fast CMFD method using simple pixel intensity-based descriptors. k-d tree (with 1-norm distance) was adopted to store all the feature descriptors information and search for nearest neighbors during the matching process.…”
Section: ) Hierarchical Structure-based Techniquesmentioning
confidence: 99%