2016
DOI: 10.1007/s00521-016-2663-3
|View full text |Cite
|
Sign up to set email alerts
|

Detection of copy-move image forgery based on discrete cosine transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0
3

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 118 publications
(55 citation statements)
references
References 40 publications
0
50
0
3
Order By: Relevance
“…• Phase #2: In this phase of experiments, our attention is on to assess the robustness of proposed method against various post-processing attacks. • Phase #3: In this phase of experiments, we concentrated on comparative analysis of proposed method with existing methods reported in the literature [3,4,7,12,16,[19][20][21][22].…”
Section: Experimentation Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Phase #2: In this phase of experiments, our attention is on to assess the robustness of proposed method against various post-processing attacks. • Phase #3: In this phase of experiments, we concentrated on comparative analysis of proposed method with existing methods reported in the literature [3,4,7,12,16,[19][20][21][22].…”
Section: Experimentation Results and Discussionmentioning
confidence: 99%
“…It works well against blur, noise and JPEG attacks but cannot withstand rotation and scale transforms. In order to address the problem of rotated or flipped copied portions, Leida Li et al proposed a method [16] [19] concentrated on determining the block size on the detection rate. In [20], Toqeer Mahmood et al proposed a CMF method, explored DCT on overlapping blocks and PCA is employed for dimensionality reduction.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To remove noise, a Gaussian filter is used by smoothing the image. The contrast enhancement technique of histogram equalization enhances the brightness of an image by normalizing the image intensity distribution whereas the technique of unsharp masking uses the blurred negative image for edge enhancement (Alkawaz, Sulong, Saba, & Rehman, ; Fadhil, Alkawaz, Rehman, & Saba, ; Waheed, Alkawaz, Rehman, Almazyad, & Saba, ). Authors proposed technique is tested to segment and classify related tasks on different medical image sets.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Watermarking techniques insert some data about the regulations of using and copying a digital data. These rules limit the number of copies or ban any copying, depending on the statements of the watermark .…”
Section: Watermarking Applicationsmentioning
confidence: 99%