2019
DOI: 10.1016/j.jvcir.2018.12.022
|View full text |Cite
|
Sign up to set email alerts
|

A survey on image tampering and its detection in real-world photos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
90
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 126 publications
(98 citation statements)
references
References 87 publications
0
90
0
Order By: Relevance
“…JPEG compression makes tampering detection of an image difficult. However, some traces of tampering are left behind or distributed across the entire image that can be manipulated in the detection process [9]. Techniques such as double JPEG, JPEG blocks and JPEG quantization are exploited for detection in compressed images 4.…”
Section: Various Passive Methods Are Implemented To Negate the Image mentioning
confidence: 99%
“…JPEG compression makes tampering detection of an image difficult. However, some traces of tampering are left behind or distributed across the entire image that can be manipulated in the detection process [9]. Techniques such as double JPEG, JPEG blocks and JPEG quantization are exploited for detection in compressed images 4.…”
Section: Various Passive Methods Are Implemented To Negate the Image mentioning
confidence: 99%
“…In Figure 3, a keypoint kA has been moved to kB. For a correct match, kA and kB should be matched by Equation (2). However, the keypoint kB is detected as the potentially matched keypoint with kA because kB has the closest distance (d1,A = 0.2684) to kA.…”
Section: Matchingmentioning
confidence: 99%
“…Because the copied portion of an image is generally scaled or rotated, it is difficult to verify the authenticity of the image based on visual inspection alone. For this reason, the development of reliable copy-move forgery detection (CMFD) methods has become an important issue [1][2][3]. The common framework of CMFD comprises five steps: preprocessing (optional), feature extraction, matching, false match removal, and localization.…”
Section: Introductionmentioning
confidence: 99%
“…The tamperproof and anti-theft for multimedia information mainly rely on tamper detection or adjusting attackers and defenders' payoff. In [13], researchers summarized the typical image tamper types, published image tamper data sets, and recent tamper detection methods. In [14], the location privacy protection scheme based on the routing protocol was proposed to prevent information leakage.…”
Section: Introductionmentioning
confidence: 99%