2022
DOI: 10.1155/2022/6845326
|View full text |Cite|
|
Sign up to set email alerts
|

Efficient Approach towards Detection and Identification of Copy Move and Image Splicing Forgeries Using Mask R-CNN with MobileNet V1

Abstract: With the technological advancements of the modern era, the easy availability of image editing tools has dramatically minimized the costs, expense, and expertise needed to exploit and perpetuate persuasive visual tampering. With the aid of reputable online platforms such as Facebook, Twitter, and Instagram, manipulated images are distributed worldwide. Users of online platforms may be unaware of the existence and spread of forged images. Such images have a significant impact on society and have the potential to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 53 publications
(84 reference statements)
0
9
0
1
Order By: Relevance
“…The network employs a fully convolutional encoder-decoder architecture, and the Dilated Frequency Self-Attention Module (DFSAM) in the bridge layer adjusts fused features. [21] introduced a lightweight model using mask R-CNN with MobileNet to detect copy-move and image-splicing forgeries.…”
Section: B Pretrained Network-based Image Forgery Detection Techniquesmentioning
confidence: 99%
“…The network employs a fully convolutional encoder-decoder architecture, and the Dilated Frequency Self-Attention Module (DFSAM) in the bridge layer adjusts fused features. [21] introduced a lightweight model using mask R-CNN with MobileNet to detect copy-move and image-splicing forgeries.…”
Section: B Pretrained Network-based Image Forgery Detection Techniquesmentioning
confidence: 99%
“…An interesting approach was presented by Sudiatmika et al [5] , who utilized the idea of error-level analysis (ELA) in conjunction with CNNs to create a more universal tool for detecting various types of forgery. Sudiatmika proposed normalizing the images before pursuing ELA calculation and feeding the resulting images to a VGG16 network.…”
Section: Related Workmentioning
confidence: 99%
“…Image tampering and forgery include a wide range of types such as copy-move, splicing, retouching and image morphing [5]. Copy-move forgery includes copying a piece of the same picture and moving it to cover another part of the image, while splicing involves copying a part of an image to place it in another image.…”
Section: Introductionmentioning
confidence: 99%
“…Mask–RCNN offers more precise and accurate results [ 40 ]; however, in some cases, it takes around 48 h to train the system. Numerous public databases such as Common Objects in Context (COCO) are available with training weights to train systems using the transfer learning approach [ 41 , 42 ]. Overall, Mask–RCNN is an effective tool for image analyses and has the potential for further advancements in computer vision.…”
Section: Introductionmentioning
confidence: 99%