2021
DOI: 10.11591/ijece.v11i3.pp2604-2612
|View full text |Cite
|
Sign up to set email alerts
|

Copy-move forgery detection using convolutional neural network and K-mean clustering

Abstract: Copying and pasting a patch of an image to hide or exaggerate something in a digital image is known as a copy-move forgery. Copy-move forgery detection (CMFD) is hard to detect because the copied part image from a scene has similar properties with the other parts of the image in terms of texture, light illumination, and objective. The CMFD is still a challenging issue in some attacks such as rotation, scaling, blurring, and noise. In this paper, an approach using the convolutional neural network (CNN) and k-me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 19 publications
(25 reference statements)
0
8
0
Order By: Relevance
“…On the other hand, if the pixel intensity histogram is distributed throughout the histogram range, the image will have a higher contrast level. This indicator was used to assess the image enhancement methods, using a variety of illuminations for optimal performance [28], [85], [86], [105], [140], [166].…”
Section: Analysis Of the Image Enhancement Methodsmentioning
confidence: 99%
“…On the other hand, if the pixel intensity histogram is distributed throughout the histogram range, the image will have a higher contrast level. This indicator was used to assess the image enhancement methods, using a variety of illuminations for optimal performance [28], [85], [86], [105], [140], [166].…”
Section: Analysis Of the Image Enhancement Methodsmentioning
confidence: 99%
“…Clustering is a simple and yet efficient unsupervised approache that assigns the data subjects into high similar groups, i.e., clusters. However, handling the underlying diversity of clustering analysis, objectives, terms, and assumptions of various clustering algorithms can be daunting [4], [5]. Therefore, there is a demand to neatly determine a correct congruence between the aggregation algorithms and the biomedical applications.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, this work focuses on detecting the primary attack. Recently, several methods have been presented for detecting primary tampering attacks [8]- [10]. However, these methods have focused on detecting whether an image is tampered or not and failed to localize tampered region within a tampered image [11], [12].…”
Section: Introductionmentioning
confidence: 99%