2013
DOI: 10.1016/j.forsciint.2013.04.023
|View full text |Cite
|
Sign up to set email alerts
|

Copy-move forgery detection using multiresolution local binary patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
46
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(46 citation statements)
references
References 17 publications
0
46
0
Order By: Relevance
“…Then, it has gained increasing attention in many image analyses applications due to its low computational complexity, invariance to monotonic gray-scale changes and texture description ability [20]. LBP has been utilized in various image analyses applications such as dynamic texture recognition [22], face recognition [23], detecting moving objects [24], image forgery [25], image region descriptors [26] and so on. In the original LBP, signed gray level differences of each pixel with its neighboring pixels are described as a binary form.…”
Section: Center-symmetric Local Binary Patterns (Cslbp)mentioning
confidence: 99%
“…Then, it has gained increasing attention in many image analyses applications due to its low computational complexity, invariance to monotonic gray-scale changes and texture description ability [20]. LBP has been utilized in various image analyses applications such as dynamic texture recognition [22], face recognition [23], detecting moving objects [24], image forgery [25], image region descriptors [26] and so on. In the original LBP, signed gray level differences of each pixel with its neighboring pixels are described as a binary form.…”
Section: Center-symmetric Local Binary Patterns (Cslbp)mentioning
confidence: 99%
“…SIFT and SURF are the most widely used keypoints for CMFD. Some other local features are also proposed to detect duplicate regions, like Local Binary Pattern (LBP) [19], Binary Robust Invariant Scalable Keypoints (BRISK) [20], and DAISY [21]. Though the computing complexity of these algorithms in matching process is much lower, they also have a main drawback: the performance will be very poor when the copy-move regions are smooth.…”
Section: Introductionmentioning
confidence: 99%
“…If we can uncover evidence indicating image alterations, we can conclude that an image has been forged. There have been several studies on detecting various image forgery techniques, such as copy-move [3][4][5], image splicing [6][7][8], scaling [9,10], rotation [11], blurring [12,13], contrast change [14], and color modification [15].…”
Section: Introductionmentioning
confidence: 99%