2018
DOI: 10.1007/978-981-13-1217-5_46
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Passive Image Cloning Detection Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…To evaluate the accuracy of the proposed algorithm, it has been compared with three algorithms. Figure (6) illustrates the overall accuracy of these forgery detection algorithms.…”
Section: The Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To evaluate the accuracy of the proposed algorithm, it has been compared with three algorithms. Figure (6) illustrates the overall accuracy of these forgery detection algorithms.…”
Section: The Experimental Resultsmentioning
confidence: 99%
“…Generally, the main steps in detection of copymove forgery are pre-processing, features extraction, matching, and post-processing. Figure 1 represents a general framework for detection of copy-move forgery [6]. Pre-Processing: Before features extraction, some operations are performed on the images in order to enhance the structural changes that have occurred in the images because of the forgery.…”
Section: Introductionmentioning
confidence: 99%
“…In active approaches images need to be protected through digital signature or through watermarking techniques whereas passive approaches do not require any kind of pre-embed operation of digital signature or watermarking. The drawback of active approaches is that it needs to pre pre-embedded either with digital signature or with watermarking, whereas a large number of images present today on web, social media and other applications are not active in nature [1]. Thus we have focused on the detection of forgery with a passive approach which is described further in given sections.…”
Section: Figure 1 Approaches For Image Forgery Detectionmentioning
confidence: 99%
“…Digital images are being used in various spheres of real-time applications like media, military, science, law, education, politics, medical imaging and diagnosis, art piece, digital forensics, intelligence, sports, photography, social media, scientific publications, journalism, and business [1]. Digital images become a significant resource of information in the digital world as they are the fastest means of information and medium of communication.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation