2016
DOI: 10.1142/s0218001416550089
|View full text |Cite
|
Sign up to set email alerts
|

Keypoints-Based Image Passive Forensics Method for Copy-Move Attacks

Abstract: A novel image passive forensics method for copy-move forgery detection is proposed. The proposed method combines block matching technology and feature point matching technology, and breaks away from the general framework of the visual feature-based approach that used local visual feature such as SIFT and followed by a clustering procedure to group feature points that are spatially close. In our work, image keypoints are extracted using Harris detector, and the statistical features of keypoint neighborhoods are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…This algorithm can resist rotation attacks and detect tampering in smooth areas, However, the algorithm complexity of this algorithm is relatively high. Reference [4] proposed a copy paste tamper detection algorithm based on Harris and DCT quantization coefficients. This algorithm first extracts the Harris points of the image to be tested, and then performs feature matching by the average DCT coefficient aty of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…This algorithm can resist rotation attacks and detect tampering in smooth areas, However, the algorithm complexity of this algorithm is relatively high. Reference [4] proposed a copy paste tamper detection algorithm based on Harris and DCT quantization coefficients. This algorithm first extracts the Harris points of the image to be tested, and then performs feature matching by the average DCT coefficient aty of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Copy-move attacks tend to be very common in the field of image forensics. Efforts have been made to develop robust techniques for their detection [10][11][12]. A robust method employing discrete cosine transform and singular value decomposition in order to detect this kind of attacks was presented in [13].…”
Section: Introductionmentioning
confidence: 99%
“…Li et al in [14] try to reduce the similar region matching times and improve the DAR and FPR by segmenting a suspicious image into nonoverlapped patches. Wang et al in [15] introduced a keypoints-based image passive detecting method based on Harris detector and region growth technology. It is robust for JPEG compression, gamma adjustment, and luminance enhancement.…”
Section: Introductionmentioning
confidence: 99%