2011
DOI: 10.1109/tifs.2011.2129512
|View full text |Cite
|
Sign up to set email alerts
|

A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
679
0
7

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 876 publications
(687 citation statements)
references
References 28 publications
1
679
0
7
Order By: Relevance
“…In order to detect a region pasted in multiple regions, we use the g2NN strategy (Amerini et al 2011) to find matching keypoints in keypoints regions. For a given keypoint, the similarity values (inverse cosine distance in the SIFT space) between it and other keypoints are calculated and form a similarity vector.…”
Section: ) Multiple Keypoints Matching In Keypoints Regionmentioning
confidence: 99%
See 4 more Smart Citations
“…In order to detect a region pasted in multiple regions, we use the g2NN strategy (Amerini et al 2011) to find matching keypoints in keypoints regions. For a given keypoint, the similarity values (inverse cosine distance in the SIFT space) between it and other keypoints are calculated and form a similarity vector.…”
Section: ) Multiple Keypoints Matching In Keypoints Regionmentioning
confidence: 99%
“…Here r T is an empirical value, and according to Amerini et al (2011) it is set to 0.5. If k ( ik  ) is the value where the procedure stops, the corresponding keypoints of 12 , .... k s s s are considered as candidate matching of the given keypoint.…”
Section: ) Multiple Keypoints Matching In Keypoints Regionmentioning
confidence: 99%
See 3 more Smart Citations