2014
DOI: 10.5120/15524-4331
|View full text |Cite
|
Sign up to set email alerts
|

Recent Block-based Methods of Copy-Move Forgery Detection in Digital Images

Abstract: Photographs are taken as valid evidences in various scenarios of our day to day life. Because of the developments in the field of Image Processing, altering images according to ones need is not a difficult task. Techniques of Image Forensics play its crucial role at this juncture. One of the mostly found types of image tampering is Copy-Move forgery. A copymove forgery is performed by copying a region in an image and pasting it on another region in the same image, mostly after some form of post-processing like… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 18 publications
(14 reference statements)
0
7
0
Order By: Relevance
“…Hence, keeping the similar attack and working over the similar datasets of tampered image, the existing techniques have presented various forms of algorithm towards such attack. However, there are also other forms of attacks being possibly created by other un-discussed image editing tools that were never being considered [55]. For an example, image splicing operation created by two different image editing tools is very less likely to be identified with similar performance by one algorithm.…”
Section: Adoption Of Similar Forms Of Attacksmentioning
confidence: 99%
“…Hence, keeping the similar attack and working over the similar datasets of tampered image, the existing techniques have presented various forms of algorithm towards such attack. However, there are also other forms of attacks being possibly created by other un-discussed image editing tools that were never being considered [55]. For an example, image splicing operation created by two different image editing tools is very less likely to be identified with similar performance by one algorithm.…”
Section: Adoption Of Similar Forms Of Attacksmentioning
confidence: 99%
“…In the third step, a matching method is applied to determine the similarity between the feature vectors. Additional post processing step is done to localise the forged region in the image and to check the accuracy of the CMFD method [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…An example of digital forgery was seen in a Tunisian newspaper in which a photo was altered duplicating the crowd to appear large [9]. Another example as shown in Figure 1 displays the altered photograph released by Iran showing four missiles instead of three [2].…”
Section: Introductionmentioning
confidence: 99%