2015
DOI: 10.1016/j.ins.2015.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Detection of copy–move image forgery using histogram of orientated gradients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
41
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 122 publications
(47 citation statements)
references
References 14 publications
0
41
0
3
Order By: Relevance
“…The detection performance of the proposed CMFD is compared with that of the state-ofthe-art techniques in literature that used the same CoMoFoD dataset and validation metrics to achieve fair comparison. Table 8 presents a comparison of the proposed approach with other popular approaches, namely, HOG [3], HOGM [39], PCET [40], LGWP [41] and Convolutional Kernel Network [42]. The proposed CMFD based on QPCET descriptors provide superior detection efficiency to previous methods.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The detection performance of the proposed CMFD is compared with that of the state-ofthe-art techniques in literature that used the same CoMoFoD dataset and validation metrics to achieve fair comparison. Table 8 presents a comparison of the proposed approach with other popular approaches, namely, HOG [3], HOGM [39], PCET [40], LGWP [41] and Convolutional Kernel Network [42]. The proposed CMFD based on QPCET descriptors provide superior detection efficiency to previous methods.…”
Section: Resultsmentioning
confidence: 99%
“…Recently, digital forgery detection is introduced to address this issue and emerges as an important field in image processing [2]. Digital forgery detection techniques are classified into active and passive (blind) [3]. Active approach embeds data or digital signature into original images via pre-processing, thereby limiting its practical applications.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, a large majority of image forgery detection methods adopt a passive-based strategy to perform the type of tampering identification discussed in the present study. Passive detection technology can be categorized into blockbased methods [2][3][4][5][6][7][8][9][10] and keypoint-based methods [11][12][13][14][15][16][17][18][19][20][21]. In the present study, we focus on the keypointbased approach.…”
Section: Introductionmentioning
confidence: 99%
“…This method is time consuming and does not detect any rotation angles for duplication regions. Lee et al [9] used a histogram of oriented gradients (HOG) of each block as features; these features are ordered by using lexicographical sorting. The duplicated image blocks are detected by measuring similar block pairs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation