2021
DOI: 10.1016/j.dsp.2021.103032
|View full text |Cite
|
Sign up to set email alerts
|

A novel copy-move forgery detection algorithm via two-stage filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…In the past few years, many copy-move forgery detection methods have been proposed, which can be roughly divided into block-based methods [11][12][13][14][15], deep learning-based methods [16][17][18][19][20][21], and feature point-based methods [22][23][24][25][26][27][28][29][30]. The block-based algorithms are inefficient and do not perform well in detecting the copy-move regions with different geometric and post-processing attack operations.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…In the past few years, many copy-move forgery detection methods have been proposed, which can be roughly divided into block-based methods [11][12][13][14][15], deep learning-based methods [16][17][18][19][20][21], and feature point-based methods [22][23][24][25][26][27][28][29][30]. The block-based algorithms are inefficient and do not perform well in detecting the copy-move regions with different geometric and post-processing attack operations.…”
Section: Introductionmentioning
confidence: 99%
“…Although deep learningbased methods have gained state-of-the-art success in many other fields, one interesting fact here is that these methods need many training data, and they cannot achieve good performance in CMFD. Compared with block-based and deep learning-based methods, the keypoint-based methods have achieved relatively superior performance concerning detection consequences and running speed [29,31]. However, in the existing keypoint-based methods, the descriptors extracted from keypoints may not all meet the needs.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations