2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013) 2013
DOI: 10.1109/iciip.2013.6707675
|View full text |Cite
|
Sign up to set email alerts
|

A fast DCT based method for copy move forgery detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…The major difference among them is related to their block representation methods. PCA (Principal Component Analysis), DCT and SVD (Singular Value Decomposition) are some features which are also employed [14][15][16][17][18][19][20]. It is shown that these features are mostly robust against JPEG compression, additive noise and blurring [21,22].…”
Section: Related Workmentioning
confidence: 99%
“…The major difference among them is related to their block representation methods. PCA (Principal Component Analysis), DCT and SVD (Singular Value Decomposition) are some features which are also employed [14][15][16][17][18][19][20]. It is shown that these features are mostly robust against JPEG compression, additive noise and blurring [21,22].…”
Section: Related Workmentioning
confidence: 99%
“…Author(s) Frequency Transform (Cao et al, 2012;Deng et al, 2012;Huang et al, 2011;Ketenci and Ulutas, 2013;Kumar et al, 2013;Li et al, 2008;X. Li et al, 2012;Muhammad et al, 2012;Murali et al, 2012;Myna et al, 2008;Peng et al, 2011;Shao et al, 2012;Shin, 2013;Yang et al, 2013;Zhang et al, 2008;Zhao and Guo, 2013) Texture & Intensity (Ardizzone et al, 2009;Bravo-Solorio and Nandi, 2011;Davarzani et al, 2013;Gan and Zhong, 2014;Hsu and Wang, 2012;Kuznetsov Andrey Vladimirovich, 2014;Lin et al, 2009;Lynch et al, 2013;Singh and Raman, 2012;Ulutas and Ulutas, 2013;Ulutaş et al, 2013) Moments Invariant (Bilgehan and Uluta, 2013;Kashyap and Joshi, 2013;Le and Xu, 2013;Mahdian and Saic, 2007;Ryu et al, 2013Ryu et al, , 2010 Log Polar Transform (Bayram et al, 2009;L.…”
Section: Feature Extraction Techniquesmentioning
confidence: 97%
“…Meanwhile, Figure 6(c) represents the breakdown for each type of matching techniques published between 2007 and 2014. (Ardizzone et al, 2009;Bilgehan and Uluta, 2013;Bravo-Solorio and Nandi, 2011;Cao et al, 2012;Davarzani et al, 2013;Gan and Zhong, 2014;Huang et al, 2011;Ketenci and Ulutas, 2013;Kumar et al, 2013;Le and Xu, 2013;L. Li et al, 2012L.…”
Section: Block-based Matching Techniquesmentioning
confidence: 99%
“…Image retouching is not much risky type connected with the different digitally forged image compared to the other methods. Figure 6 [9] shows the image retouching that consist of two images i.e. original image and image retouching.…”
Section: Fig5 Image Splicingmentioning
confidence: 99%