2017
DOI: 10.22452/mjcs.vol30no2.4
|View full text |Cite
|
Sign up to set email alerts
|

Keypoint Based Authentication And Localization Of Copy-Move Forgery In Digital Image

Abstract: With the development of powerful image processing tools and the increasing trend of using images as the main carrier of information, digital image forgery has become an increasingly serious issue. In copy-move forgery, one part of an image is copied and placed elsewhere in the same image. This paper puts forward an effective method based on SIFT for detecting copy-move forgery in digital image. The proposed method can accurately authenticate digital image and locate areas which have been tampered with. The alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 27 publications
0
16
0
Order By: Relevance
“…(12) Compute median absolute deviation (MAD) for all HGP-2s of the two matched image regions, and save it in feature vector f v . (13) Find the Euclidean distance between two corresponding final feature vectors fv and fv'. (14) Detect and localize the tampered regions.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…(12) Compute median absolute deviation (MAD) for all HGP-2s of the two matched image regions, and save it in feature vector f v . (13) Find the Euclidean distance between two corresponding final feature vectors fv and fv'. (14) Detect and localize the tampered regions.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The forgers perform duplicate regions with different geometric and post-processing operations to hide traces and make consistency with surrounding area [11][12][13].…”
mentioning
confidence: 99%
“…Based on the way of dividing the image on the second stage of copy-move forgery detection, these techniques are classified into three classes: block-based schemes [34], segmented regions-based schemes [41] and local keypoints based schemes [38]. In the block-based, the image is divided into a number of sub-blocks either square blocking or circle blocking.…”
Section: Related Workmentioning
confidence: 99%
“…Conversely, some scientific papers have examined the robustness against the retouching or blending tools which hide visual editing artifacts in the image through some post-processing attacks. Such attacks include: blurring [43,46], additive noise [38] and JPEG compression [19,42] impacts are obtained after applying geometrical transformation operations. Hence, this type of forgery is a challenging problem that motivates us to investigate forged images against scale, rotation and blur attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Discovering copy-move tampering is more challenging because there are no significant visible alterations in the forged image texture. Various researchers are actively exploring in term of the Key-Points and Blockbased approach [4]. Finally, the image splicing tampering refers to a forged digital image created by fusing different region(s) from a couple or more images together.…”
Section: Introductionmentioning
confidence: 99%