2021
DOI: 10.1016/j.jksuci.2019.07.007
|View full text |Cite
|
Sign up to set email alerts
|

An improved copy-move forgery detection based on density-based clustering and guaranteed outlier removal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(24 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…The optimal CMFD can be measured in terms of the robust to all post processing operations, all geometric transformation, detect multiple forgeries, And High accuracy of detection. From Table 2, it can be see the following observations: a) The CMFD that proposed in [28], [29], [30], [31], are very robust to most of post-processing operations.…”
Section: Lists the Previous Recently Ic-mfd Algorithms According To Feature Extracted From Spatial Domainmentioning
confidence: 92%
See 2 more Smart Citations
“…The optimal CMFD can be measured in terms of the robust to all post processing operations, all geometric transformation, detect multiple forgeries, And High accuracy of detection. From Table 2, it can be see the following observations: a) The CMFD that proposed in [28], [29], [30], [31], are very robust to most of post-processing operations.…”
Section: Lists the Previous Recently Ic-mfd Algorithms According To Feature Extracted From Spatial Domainmentioning
confidence: 92%
“…The detection performance of the 15 IC-MFDs methods in multiple domains in term of true & false positive metrics are compared. It can be observed that IC-MFDs based on spatial domain [31] tends to low false positive rate than the rest methods. However, [29] tends to high false positive rate than the rest methods.…”
Section: Comparison Of Ic-mfd Techniquesmentioning
confidence: 94%
See 1 more Smart Citation
“…Vaishnavi and Subashini [10] proposed a method for copy move forgery detection by means of "symmetry based local features". Hegazi et al [11] employed "density-based clustering" for the detection of forged images. Lee et al [12] employed "histogram of oriented gradients" for the detection of forged images.…”
Section: Related Workmentioning
confidence: 99%
“…In literature, different types of the DFTs have also been developed to detect the authenticity of the images like "forensics-focused operating systems" (FFOS), (ii) computer forensics, (iii) "memory forensics", (iv) "mobile device forensics", and (v) "software forensics". Based on our review, we identify that there is no classification and evaluation of digital forensic tools (DFTs) in the literature of image forensic science [10,11].…”
Section: Introductionmentioning
confidence: 99%