2016
DOI: 10.1007/s11760-016-0899-0
|View full text |Cite
|
Sign up to set email alerts
|

Passive detection of image forgery using DCT and local binary pattern

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
77
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 112 publications
(102 citation statements)
references
References 18 publications
2
77
0
1
Order By: Relevance
“…Finally, we feed these features to support vector machine (SVM) for learning and classification. Improved classification accuracy over recent methods described in [5] and [6] using four benchmark datasets substantiate the efficacy of our proposed SRIV technique and image forgery detection approach.…”
Section: Introductionsupporting
confidence: 73%
See 2 more Smart Citations
“…Finally, we feed these features to support vector machine (SVM) for learning and classification. Improved classification accuracy over recent methods described in [5] and [6] using four benchmark datasets substantiate the efficacy of our proposed SRIV technique and image forgery detection approach.…”
Section: Introductionsupporting
confidence: 73%
“…Zhang et al [5] and Alahmadi et al [6] proposed their methods utilizing both DCT and LBP. They mainly differ based on the order of DCT and LBP application on image blocks and feature extraction technique.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…En [43] se propone un método que combina el descriptor de textura Local Binary Patterns (LBP) junto a DCT para detectar cambios producidos por las manipulaciones de empalme y también de copia-pega. En los experimentos se utiliza SVM obteniendo una tasa de acierto entre el 97.50 % y el 97.77 % sobre el conjunto de datos "CASIA TIDE v2.0".…”
Section: Iii-b Detección De Empalmeunclassified
“…Due to its property of texture description, the LBP pattern has been extensively used in face recognition [14] and tamper detection [15]. In [12], the authors introduced LBP operator into watermarking scheme.…”
Section: Lbp Operatormentioning
confidence: 99%