2018
DOI: 10.1155/2018/6853696
|View full text |Cite
|
Sign up to set email alerts
|

Perceptual Hashing-Based Image Copy-Move Forgery Detection

Abstract: This paper proposes a blind authentication scheme to identify duplicated regions for copy-move forgery based on perceptual hashing and package clustering algorithms. For all fixed-size image blocks in suspicious images, discrete cosine transform (DCT) is used to obtain their DCT coefficient matrixes. Their perceptual hash matrixes and perceptual hash feature vectors are orderly addressed. Moreover, a package clustering algorithm is proposed to replace traditional lexicographic order algorithms for improving th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(11 citation statements)
references
References 15 publications
(20 reference statements)
0
11
0
Order By: Relevance
“…Image hashing can efficiently process image data due to the low costs of hash storage and hash similarity. Besides image copy detection, it has been successfully applied to many applications, such as copy‐move forgery detection [5, 6], image forensics [7], image authentication [8, 9], image quality assessment [10], social event detection [11] and tamper detection [12]. In the literature, many useful techniques are exploited to design efficient image hashing algorithms for various applications.…”
Section: Introductionmentioning
confidence: 99%
“…Image hashing can efficiently process image data due to the low costs of hash storage and hash similarity. Besides image copy detection, it has been successfully applied to many applications, such as copy‐move forgery detection [5, 6], image forensics [7], image authentication [8, 9], image quality assessment [10], social event detection [11] and tamper detection [12]. In the literature, many useful techniques are exploited to design efficient image hashing algorithms for various applications.…”
Section: Introductionmentioning
confidence: 99%
“…Then SURF and PCT features are extracted from labelled keypoints. Wang et al [20] have used SURF features and PCET for finding keypoints of images and detect tapered regions. They can detect geometrically transformed image but for higher scale change is a challenge which they can not detect.…”
Section: Related Workmentioning
confidence: 99%
“…Different parametric values are used analyze the proposed technique. Huan Wang and Hongxia Wang [5] proposed efficient method to detect the tampered image. Based on package clustering and perceptual hashing algorithms duplicate regions were found.…”
Section: Fig 4 Additional Object Seen On Right Imagementioning
confidence: 99%