2013
DOI: 10.1186/1687-5281-2013-18
|View full text |Cite
|
Sign up to set email alerts
|

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification

Abstract: Copy-move forgeries are very common image manipulations that are often carried out with malicious intents. Among the techniques devised by the 'Image Forensic' community, those relying on scale invariant feature transform (SIFT) features are the most effective ones. In this paper, we approach the copy-move scenario from the perspective of an attacker whose goal is to remove such features. The attacks conceived so far against SIFT-based forensic techniques implicitly assume that all SIFT keypoints have similar … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(30 citation statements)
references
References 20 publications
0
30
0
Order By: Relevance
“…This consideration was because of the most recent malevolent exercises in which a particular object is copied on the same image. These types of activities can be seen in the case of copy-move image forgery that considers a stands out amongst the most known type of activity which focuses on adding or concealing an object [13], [14]. Numerous scholars have decided that copy-move image forgery works on the grounds of detecting additional noise, texture and color changes and these may be observed in the duplicated area of the image.…”
Section: Current Issues Of Digital Image Forgerymentioning
confidence: 99%
“…This consideration was because of the most recent malevolent exercises in which a particular object is copied on the same image. These types of activities can be seen in the case of copy-move image forgery that considers a stands out amongst the most known type of activity which focuses on adding or concealing an object [13], [14]. Numerous scholars have decided that copy-move image forgery works on the grounds of detecting additional noise, texture and color changes and these may be observed in the duplicated area of the image.…”
Section: Current Issues Of Digital Image Forgerymentioning
confidence: 99%
“…SIFT [2] can robustly identify objects even among clutter and under partial occlusion, because the SIFT feature descriptor is invariant to uniform scaling, orientation, and partially invariant to affine distortion and illumination changes [1].This section summarizes Lowe's object recognition method and mentions a few competing techniques available for object recognition under clutter and partial occlusion. SIFT key points of objects are first extracted from a set of reference images [1] and stored in a database.…”
Section: Introduction To Scale Invariant Features Transfor (Sift)mentioning
confidence: 99%
“…The algorithm was published by David Lowe in 1999 [1].For any object in an image, interesting points on the object can be extracted to provide a "feature description" of the object. This description, extracted from a training image, can then be used to identify the object when attempting to locate the object in a test image containing many other objects.…”
Section: Introduction To Scale Invariant Features Transfor (Sift)mentioning
confidence: 99%
See 2 more Smart Citations