2016
DOI: 10.1016/j.forsciint.2016.06.005
|View full text |Cite
|
Sign up to set email alerts
|

Digital image modification detection using color information and its histograms

Abstract: The rapid development of many open source and commercial image editing software makes the authenticity of the digital images questionable. Copy-move forgery is one of the most widely used tampering techniques to create desirable objects or conceal undesirable objects in a scene. Existing techniques reported in the literature to detect such tampering aim to improve the robustness of these methods against the use of JPEG compression, blurring, noise, or other types of post processing operations. These post proce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
19
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 19 publications
(24 reference statements)
0
19
0
1
Order By: Relevance
“…ey used accuracy ratio, which is the same of the verification rate in equation 2, in order to test their technique. ey tested their technique against the free-form copy-move forgeries which include no postprocessing, and they state that they found their accuracy ratio higher than 0.95 [20]. Since there is no more information about their success rate on CoMoFoD dataset, we could not make a graphical comparison between their study and ours.…”
Section: Resultsmentioning
confidence: 79%
See 1 more Smart Citation
“…ey used accuracy ratio, which is the same of the verification rate in equation 2, in order to test their technique. ey tested their technique against the free-form copy-move forgeries which include no postprocessing, and they state that they found their accuracy ratio higher than 0.95 [20]. Since there is no more information about their success rate on CoMoFoD dataset, we could not make a graphical comparison between their study and ours.…”
Section: Resultsmentioning
confidence: 79%
“…While 128 of these images were generated by using original images acquired from internet, the remaining 32 of them were generated by using an original image from our camera. Besides, so as to compare the results of the proposed technique with the results of the other studies [18][19][20], we also tested our technique on 64 free-form copymove forgery images which originate from CoMoFoD dataset [21]. During the test operations, in order to measure the strength of the forgery detection algorithm against the postprocessing operations which aim at making the detection of the forgery harder, the test images were exposed to JPEG compression, Gaussian filtering, and different combinations of these two operations.…”
Section: Resultsmentioning
confidence: 99%
“…Data citra digital (metadata) memiliki informasi yang sangat kompleks, meliputi informasi perangkat pengambilan gambar sampai dengan waktu kapan diambil (Zhou et al, 2016). Sehingga dapat dikatakan metadata citra digital tersebut dapat digunakan sebagai hak cipta.…”
Section: Pendahuluanunclassified
“…The most typical features are the frequency representation, such as the histogram (e.g. [38]), or the Discrete Cosine Transform (DCT) (e.g. [39][40]) of the blocks.…”
mentioning
confidence: 99%
“…An example of an effective matching method is clustering: the search space is divided into regions with similar features-vector distributions (e.g. [38]). Another popular feature matching is sorting.…”
mentioning
confidence: 99%