2016
DOI: 10.1155/2016/8713202
|View full text |Cite
|
Sign up to set email alerts
|

Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images

Abstract: Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 73 publications
(33 citation statements)
references
References 25 publications
0
32
0
1
Order By: Relevance
“…Proposed DETF method is capable of detecting multiple forged regions and also is able to detect large circular, rectangular and irregular forged regions. The simulation results demonstrate that proposed method is superior to other CMF detection methods [3,4,7,12,16,[19][20][21][22] in terms of detection rate and outperforms other methods [3,4,7,12,16,19] with regard to computational complexity.…”
Section: Discussionmentioning
confidence: 90%
See 4 more Smart Citations
“…Proposed DETF method is capable of detecting multiple forged regions and also is able to detect large circular, rectangular and irregular forged regions. The simulation results demonstrate that proposed method is superior to other CMF detection methods [3,4,7,12,16,[19][20][21][22] in terms of detection rate and outperforms other methods [3,4,7,12,16,19] with regard to computational complexity.…”
Section: Discussionmentioning
confidence: 90%
“…• Phase #2: In this phase of experiments, our attention is on to assess the robustness of proposed method against various post-processing attacks. • Phase #3: In this phase of experiments, we concentrated on comparative analysis of proposed method with existing methods reported in the literature [3,4,7,12,16,[19][20][21][22].…”
Section: Experimentation Results and Discussionmentioning
confidence: 99%
See 3 more Smart Citations