2022
DOI: 10.1049/ipr2.12578
|View full text |Cite
|
Sign up to set email alerts
|

SMDAF: A novel keypoint based method for copy‐move forgery detection

Abstract: Copy–move forgery poses a significant threat to social life and has aroused much attention in recent years. Although many copy‐move forgery detection (CMFD) methods have been proposed, the most existing CMFD methods are short of adaptability in detecting images, which leads to the limitation on detection effects. To solve this problem, the paper proposes a novel keypoint‐based CMFD method: second‐keypoint matching and double adaptive filtering (SMDAF). Motivated by image matching based on keypoint, the second‐… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 41 publications
0
1
0
Order By: Relevance
“…Table 2 summarizes the comparative evaluation on Coverage dataset where the proposed methodology's performance is compared with the following methods: (Park et al, 2020), and (Yue et al, 2022). On coverage dataset, our proposed methodology achieves a precision of 84.92%, recall of 76%, false positive rate of 14% and 80.05% of F1 score.…”
Section: Comparative Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 2 summarizes the comparative evaluation on Coverage dataset where the proposed methodology's performance is compared with the following methods: (Park et al, 2020), and (Yue et al, 2022). On coverage dataset, our proposed methodology achieves a precision of 84.92%, recall of 76%, false positive rate of 14% and 80.05% of F1 score.…”
Section: Comparative Evaluationmentioning
confidence: 99%
“…In addition, a massive number of images with constant dimensions are needed in their learning process [1]. Furthermore, if the deep learning-based system is tested with images of a different nature from what it is learned on, its performance will decrease [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The rapid development of image processing applications and their ease of use make them preferable for creating and retouching images for different purposes. Over the years, several powerful image editing tools have been presented for innocent intentions such as beautifying images or entertainment; however, these tools can be used for malicious intentions [1,2]. Over the years, an enormous number of personal images have been shared and distributed through the internet and social media networks which are exposed to the danger of unauthorized manipulations and attacks.…”
Section: Introductionmentioning
confidence: 99%