2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2011
DOI: 10.1109/icassp.2011.5946869
|View full text |Cite
|
Sign up to set email alerts
|

Security of copy-move forgery detection techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…(a) Copy-moved (b) Block-based detection [6] (c) SIFT-based detection [9] (d) geometric attack [12] on (a) (e) Block-based detection (f) SIFT-based detection The interpretation of such results is straightforward: SIFT features have been devised in such a way to be robust against geometric manipulations, which obviously fail at impairing a SIFT-based copy-move detector. On the other hand, the classification-based attack is designed to preserve the local visual quality of the image.…”
Section: Block-based and Sift-based Copy-move Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…(a) Copy-moved (b) Block-based detection [6] (c) SIFT-based detection [9] (d) geometric attack [12] on (a) (e) Block-based detection (f) SIFT-based detection The interpretation of such results is straightforward: SIFT features have been devised in such a way to be robust against geometric manipulations, which obviously fail at impairing a SIFT-based copy-move detector. On the other hand, the classification-based attack is designed to preserve the local visual quality of the image.…”
Section: Block-based and Sift-based Copy-move Detectionmentioning
confidence: 99%
“…We selected the forged image of Figure 14a, where a person has been removed from the picture by duplicating a portion of the sandy region. Starting from it, we hid the copy-move forgery by means of the following counter-forensic techniques: the classificationbased attack and the geometric attack proposed in [12]. According to the authors, the attack of [12] proved to be effective against a number of block-based detectors (including [6]).…”
Section: Block-based and Sift-based Copy-move Detectionmentioning
confidence: 99%
See 2 more Smart Citations