2016
DOI: 10.1007/s11042-016-4140-5
|View full text |Cite
|
Sign up to set email alerts
|

A new keypoint-based copy-move forgery detection for small smooth regions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(22 citation statements)
references
References 35 publications
0
22
0
Order By: Relevance
“…In addition, this method exploited a circular region instead of a square one to improve the performance in mirror reflection transformation. Wang et al [Wang, Li, Niu et al (2017)] presented a method based on local information entropy which divided each non-overlapping block into irregular superpixels, then they extracted the robust keypoints from each superpixel. Finally, they used exponential moments to construct local features of each keypoint.…”
Section: Deep Learning-based Methodsmentioning
confidence: 99%
“…In addition, this method exploited a circular region instead of a square one to improve the performance in mirror reflection transformation. Wang et al [Wang, Li, Niu et al (2017)] presented a method based on local information entropy which divided each non-overlapping block into irregular superpixels, then they extracted the robust keypoints from each superpixel. Finally, they used exponential moments to construct local features of each keypoint.…”
Section: Deep Learning-based Methodsmentioning
confidence: 99%
“…Keypoint-based methods make up for the above shortcomings by extracting the keypoints in the high entropy regions and describing local features. Among them, Scale-Invariant Feature Transform (SIFT) [20]- [24], [29] and Speeded Up Robust Features (SURF) [25]- [27], [30] are widely used in the detection stage for feature extraction.…”
Section: Related Workmentioning
confidence: 99%
“…SURF is used for fast detection and SIFT is used for robustness of CMFD. For detection of forgery in small smooth regions, a method is given in [27]. In this, the image is segmented into nonoverlapped and irregular super pixels.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, most keypoint extraction methods executed with the default parameters cannot obtain sufficient keypoints in smooth tampered regions. Inspired by Reference [44], in this paper, the detector response thresholds, A-KAZE T and SU RF T , are set to small values to obtain sufficient interest points. As is depicted in Figure 4b, the image of the Japan tower is hidden by the sky region within the tampered same image.…”
Section: Feature Extractionmentioning
confidence: 99%