2010 International Conference on Signal and Image Processing 2010
DOI: 10.1109/icsip.2010.5697444
|View full text |Cite
|
Sign up to set email alerts
|

Robust method for detection of copy-move forgery in digital images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Image tampering is defined as "adding or removing important features from an image without leaving any obvious traces of tampering" and thus image tampering is considered as intentional manipulation of images for malicious purposes [3]. There are various techniques for counterfeiting images and these can be classified into three broad categories.…”
Section: Image Tamperingmentioning
confidence: 99%
“…Image tampering is defined as "adding or removing important features from an image without leaving any obvious traces of tampering" and thus image tampering is considered as intentional manipulation of images for malicious purposes [3]. There are various techniques for counterfeiting images and these can be classified into three broad categories.…”
Section: Image Tamperingmentioning
confidence: 99%
“…The blind forensic technique for the copy/move forgery detection reported in [30, 31] uses DWT to reduce dimensions and to generate the overlapping blocks of the compressed image. Thereafter, the blocks are sorted lexicographically and phase correlation is used for similar block checking.…”
Section: Detection Of Copy/move Forgerymentioning
confidence: 99%
“…Copy move forgery detection methods using passive approach for detection can be divided into two groups: Block based methods [3], [4], [5], [10] and keypoint based methods [6], [7], [8].The very first passive method for detection of copy move forgery is presented by Fridrich et al [3] that uses Discrete Cosine Transform (DCT) for the detection of copy move forgery. In this method the image is divided into overlapping blocks and then DCT is performed on each block.…”
Section: Literature Surveymentioning
confidence: 99%
“…This method handles minor variations in rotation and scaling. In [4] the authors use the Discrete Wavelet Transform to compress the image, then the compressed image is divided into overlapping blocks and phase correlation is used as similarity criterion to identify the duplicate blocks in an image. This method shows robustness towards noise and jpeg compression but fails to be rotation and scale invariant.…”
Section: Literature Surveymentioning
confidence: 99%