2023
DOI: 10.32604/iasc.2023.025766
|View full text |Cite
|
Sign up to set email alerts
|

Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique

Abstract: The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content. An effective technique for tampering the identification is the copy-move forgery. Conventional image processing techniques generally search for the patterns linked to the fake content and restrict the usage in massive data classification. Contrastingly, deep learning (DL) models have demonstrated significant performance over the other statistical techniques. With t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 23 publications
(25 reference statements)
0
1
0
Order By: Relevance
“…For copy move, [22] used SmallerVGGNet and MobileNet-V2, time-and memory-saving deep learning models. In [23] an Optimal Deep Transfer Learning based Copy Move Forgery Detection (ODTLCMFD) technique was presented that derived a DL model for the classification of target images and then localized the copy moved regions. They used the MobileNet model with a political optimizer (PO) for feature extraction and the least square support vector machine (LS-SVM) model with an enhanced bird swarm algorithm (EBSA) for classification.…”
Section: B Pretrained Network-based Image Forgery Detection Techniquesmentioning
confidence: 99%
“…For copy move, [22] used SmallerVGGNet and MobileNet-V2, time-and memory-saving deep learning models. In [23] an Optimal Deep Transfer Learning based Copy Move Forgery Detection (ODTLCMFD) technique was presented that derived a DL model for the classification of target images and then localized the copy moved regions. They used the MobileNet model with a political optimizer (PO) for feature extraction and the least square support vector machine (LS-SVM) model with an enhanced bird swarm algorithm (EBSA) for classification.…”
Section: B Pretrained Network-based Image Forgery Detection Techniquesmentioning
confidence: 99%