2022
DOI: 10.1007/s11042-022-12311-6
|View full text |Cite
|
Sign up to set email alerts
|

Efficient detection of copy-move forgery using polar complex exponential transform and gradient direction pattern

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(3 citation statements)
references
References 31 publications
0
1
0
Order By: Relevance
“…This method is essentially adding new content to the document. The second method is called the copy-move forgery method [2,36], where an adversary copies some existing textual information (e.g., the letter "A") from a document and pastes it somewhere else in the same document.…”
Section: Existing Research and Technologiesmentioning
confidence: 99%
“…This method is essentially adding new content to the document. The second method is called the copy-move forgery method [2,36], where an adversary copies some existing textual information (e.g., the letter "A") from a document and pastes it somewhere else in the same document.…”
Section: Existing Research and Technologiesmentioning
confidence: 99%
“…To detect CMF, Babu and Rao [5] developed a method employing polar complex exponential transform features. The technique is based on a statistical characteristic for overlapping blocks.…”
Section: Rel Ated Workmentioning
confidence: 99%
“…Ethical considerations will be strictly followed throughout the research process. Participants' names and anonymity will be protected at all times, and they will be asked for informed consent [5]. Triangulation is the process of validating and improving the validity and reliability of study results by using several data sources (such as surveys, observations, interviews, and evaluations).…”
Section: Content Analysismentioning
confidence: 99%