2013
DOI: 10.1007/s00138-013-0547-4
|View full text |Cite
|
Sign up to set email alerts
|

Image forgery detection using steerable pyramid transform and local binary pattern

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
84
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 174 publications
(84 citation statements)
references
References 13 publications
0
84
0
Order By: Relevance
“…The results of The italicized data present the maximum detection accuracy the other methods were taken from the corresponding literatures and the best detection accuracies are presented. The method in [17] indicates marginally greater accuracies for the Columbia color and CASIA2 datasets than those of the proposed method. However, the number of features is greater than that for the proposed algorithm, and the features are varied according to the image datasets.…”
Section: Detection Results For Color Datasetsmentioning
confidence: 88%
See 2 more Smart Citations
“…The results of The italicized data present the maximum detection accuracy the other methods were taken from the corresponding literatures and the best detection accuracies are presented. The method in [17] indicates marginally greater accuracies for the Columbia color and CASIA2 datasets than those of the proposed method. However, the number of features is greater than that for the proposed algorithm, and the features are varied according to the image datasets.…”
Section: Detection Results For Color Datasetsmentioning
confidence: 88%
“…Recently, splicing direction methods applicable to color datasets are presented [16][17][18][19]. An image splicing detection algorithm using the run-length run-number and kernel PCA was presented [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The wavelet transform function is basically being a combination of lower and high frequency. The process of sampling of original image and forged image are describing here [13,14].…”
Section: Feature Extractionmentioning
confidence: 99%
“…In image splicing, the copied region and the pasted region belongs to a different images. The purpose of the image forgery is to duplicate or conceal a certain object into an image or to make false propaganda 4 . Forging an image is usually accompanied by post-processing operations like JPEG compression, adding noise and image blurring or geometric operations such as scaling, shifting and rotation increases the detection tasks difficult.…”
mentioning
confidence: 99%