2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA) Proceedings 2014
DOI: 10.1109/inista.2014.6873618
|View full text |Cite
|
Sign up to set email alerts
|

Comparison between WLD and LBP descriptors for non-intrusive image forgery detection

Abstract: Abstract-Due to the availability of easy-to-use and powerful image editing tools, the authentication of digital images cannot be taken for granted and it gives rise to non-intrusive forgery detection problem because all imaging devices do not embed watermark. We investigated the detection of copy-move and splicing, the two harmful types of image forgery, using textural properties of images. Tampering distorts the texture micropatterns in an image and texture descriptors can be employed to detect tampering. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 20 publications
(25 reference statements)
0
9
0
Order By: Relevance
“…Table III shows that our proposed method produces 1.83% ~ 1.11% lower FNR than the existing method in [12]. In addition, our method performs better in terms of [12] 96.69 96.97 97.49 Muhammad et al [27] 96.39 94.89 97.33 Hussain et al [25] 94.29 --Zhao et al [11] 85.00 94.70 -He et al [ implemented by [12] Not all works have experimented with all three datasets mentioned above and therefore, here we only report results on the specific dataset(s) they reported. Table IV shows that our method outperforms existing state-of-the-art methods in all three benchmark datasets.…”
Section: Comparison With Recent Methodsmentioning
confidence: 80%
See 1 more Smart Citation
“…Table III shows that our proposed method produces 1.83% ~ 1.11% lower FNR than the existing method in [12]. In addition, our method performs better in terms of [12] 96.69 96.97 97.49 Muhammad et al [27] 96.39 94.89 97.33 Hussain et al [25] 94.29 --Zhao et al [11] 85.00 94.70 -He et al [ implemented by [12] Not all works have experimented with all three datasets mentioned above and therefore, here we only report results on the specific dataset(s) they reported. Table IV shows that our method outperforms existing state-of-the-art methods in all three benchmark datasets.…”
Section: Comparison With Recent Methodsmentioning
confidence: 80%
“…Some researchers utilized texture descriptors like Weber Local Descriptor (WLD) and LBP to model image tampering artifacts. In [25], Hussain et al compared multiscale WLD with multiscale LBP. They achieved better result using WLD (94.29% for splicing, 90.97% for copy-move) than using LBP (90.48% splicing and 85.83% for copy-move) on CASIA 1 dataset.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, a Gaussian low-pass filter is used in pre-processing to improve image quality by removing noise contained therein where filtering by more than twice can increase the detection performances [23]. The properties of LBP is capable of reducing the computational complexity problem [24]. The matching process is done by calculating the Euclidean distances for each block of the image.…”
Section: Methodsmentioning
confidence: 99%
“…utilized to detect the tampering by discovering distortion in the texture patterns of an image and texture descriptors [12]. The most efficient algorithms to defeat copy move forgery are invariant key-points algorithms that depend on a large number of local features extracted from an image.…”
Section: ____________________________________________________________mentioning
confidence: 99%