2011
DOI: 10.5120/3283-4472
|View full text |Cite
|
Sign up to set email alerts
|

Automated Forensic Method for CopyMove Forgery Detection based on Harris Interest Points and SIFT Descriptors

Abstract: We are undoubtedly living in an age where we are exposed to a remarkable array of visual imagery. Nowadays, accepting digital images of official documents is common practice. Image authenticity is important in many social areas. For instance, the trustworthiness of photographs has an essential role in courtrooms, where they are used as evidence. In the medical field, physicians make critical decisions based on digital images. The technology today makes it convenient to quickly exchange contracts, photographs o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 20 publications
(17 reference statements)
0
7
0
Order By: Relevance
“…There are many feature extraction methods used in forgery detecting and locating. Based on the previous studies, the three most effective methods used for extracting good features to trace are: Harris [ 33 , 34 ], Gray Level Co-occurrence Matrix (GLCM) [ 6 ] and Singular Value Decomposition (SVD) [ 22 ], In this paper, each of which is applied for 2D matrix, tested and compared to obtain the best combination.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…There are many feature extraction methods used in forgery detecting and locating. Based on the previous studies, the three most effective methods used for extracting good features to trace are: Harris [ 33 , 34 ], Gray Level Co-occurrence Matrix (GLCM) [ 6 ] and Singular Value Decomposition (SVD) [ 22 ], In this paper, each of which is applied for 2D matrix, tested and compared to obtain the best combination.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Furthermore, affine transformation is exactly estimated, particularly in larger duplicated areas. A different scenario is to integrate SIFT into copy detection systems [22]. Instead of applying SIFT to detect keypoints, the Harris quicker from SIFT is applied.…”
Section: Sift Algorithmmentioning
confidence: 99%
“…Then, the Kd trees algorithms are applied to match the keypoints to identify duplicated areas. The algorithms can effectively detect copied areas, such as unrotated scanlines or Gaussian noise conditions, that have undergone transformation [5,22]. Harris detection, which is quicker than SIFT, has been used to detect keypoints.…”
Section: Sift Algorithmmentioning
confidence: 99%
“…Features are extracted only for keypoints hence increasing computational efficiency. In[29]-[31], the Scale-Invariant Feature Transform (SIFT) features were used while the SURF approach was discussed in[31]. SIFT is used to describe local features in an image and is efficient in detecting duplicate regions even if the regions undergo transformations like scaling and rotation and is robust to noise and changes in illumination conditions.…”
mentioning
confidence: 99%