2018
DOI: 10.1007/978-3-030-01231-1_11
|View full text |Cite
|
Sign up to set email alerts
|

BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
247
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 220 publications
(248 citation statements)
references
References 35 publications
0
247
1
Order By: Relevance
“…For training, all parameters were initialized using weights from a pre-trained model, which was taken from [20], the VGG16 on ImageNet for CNN Feature Extractor in Clone detection section. In addition, the Adam optimizer and binary cross entropy loss were used.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For training, all parameters were initialized using weights from a pre-trained model, which was taken from [20], the VGG16 on ImageNet for CNN Feature Extractor in Clone detection section. In addition, the Adam optimizer and binary cross entropy loss were used.…”
Section: Resultsmentioning
confidence: 99%
“…But, for the primary task, the Adam optimizer with categorical cross entropy loss was utilized. At the same time, precision, recall and F1 scores were collated in order to account the CMFD"s performance [20]. For the testing image, four values were computed: true positive (TP), true negative (TN), false positive (FP) and false negative (FN).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…A new deep neural network is proposed by Yue Wu, et.al [2] where copied parts were detected successfully. In order to draw out the block like features a neural network was used.…”
Section: Literature Surveymentioning
confidence: 99%
“…Detection of digital manipulations in images has been studied extensively in the past for image-splicing, copymove forgery, resampling and retouching of images at the pixel-level [3,28,29,30]. These methods work by either verifying embedded watermarks within images or analyzing pixel-level consistencies in search for artifacts.…”
Section: Related Workmentioning
confidence: 99%