Ninth International Conference on Computer Science and Information Technologies Revised Selected Papers 2013
DOI: 10.1109/csitechnol.2013.6710350
|View full text |Cite
|
Sign up to set email alerts
|

Method for detection of image tampering and partial recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…It is often called Copy-Paste, Copy-Move or Collage attack, when one of the parts of the image is copied to another part of the same or a different image, thereby altering the original content. [4] …”
Section: Fig1 Training Phasementioning
confidence: 99%
See 1 more Smart Citation
“…It is often called Copy-Paste, Copy-Move or Collage attack, when one of the parts of the image is copied to another part of the same or a different image, thereby altering the original content. [4] …”
Section: Fig1 Training Phasementioning
confidence: 99%
“…David Asatryan et.al, [4] In this paper, a watermarking algorithm is used, which allows handling over the images at different ratios of sizes of image-container and watermark. Most of the types of image tampering are based on the well known operations of Copy-Paste, Copy-Move or their combinations.…”
Section: Applications Of Image Tamperingmentioning
confidence: 99%