Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








328 Hits in 5.2 sec

Counter-forensics of SIFT-based copy-move detection by means of keypoint classification

Irene Amerini, Mauro Barni, Roberto Caldelli, Andrea Costanzo
2013 EURASIP Journal on Image and Video Processing  
; and (iii) we are able to impair a state-of-the-art SIFT-based copy-move detector in realistic cases.  ...  Copy-move forgeries are very common image manipulations that are often carried out with malicious intents.  ...  SIFT-based Copy-Move Forgery Detection In this Section we briefly review SIFT technique and describe the copy-move detectors based on it.  ... 
doi:10.1186/1687-5281-2013-18 fatcat:cmkbo5r3djgefitb42wndgxw3y

Novel Copy Move Forgery Detection Based on Repeated Feature Extraction and Delaunay Triangulation

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper, key point based approach of taking out features using Scale Invariant Feature Transform (SIFT) is used.  ...  The feature points thus extracted are then modeled to get a set of triangles using Delaunay Triangulation method.  ...  On the contrast, the entire image is to be enclosed sufficiently with points of interest in the detection of Copy-Move Forgery.  ... 
doi:10.35940/ijitee.c8971.019320 fatcat:ufiqklyhkfdzfklyuoqbeoerge

Improved forgery detection with lateral chromatic aberration

Owen Mayer, Matthew Stamm
2016 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
In this paper we propose a technique to improve the accuracy of lateral chromatic aberration (LCA) based detection of copy-paste image forgeries.  ...  Using this statistical model, we formulate forgery detection as a hypothesis testing problem, and derive the optimal detection statistic for performing LCA-based forgery detection.  ...  Forgery Detection In a copy-paste forgery, a forger moves image content from one location to another.  ... 
doi:10.1109/icassp.2016.7472032 dblp:conf/icassp/MayerS16 fatcat:4bv3fkg57zg23kxtgj6xnvkh7q

Robust Copy Move Image Forgery Detection using Scale Invariant Features Transform

Himanshu Goyal, Tarun Gulati
2014 International Journal of Computer Applications  
Copy-Move Forgery Copy-Move image forgery is the widely used technique to edit the digital image.  ...  Then follow same procedure on all tested images. The results indicate that the proposed method detects copy-move forgery efficiently.  ... 
doi:10.5120/17042-7352 fatcat:fo6cf4fr5rertkhisev3fbbrsy

CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection

Fang Mei, Tianchang Gao, Yingda Lyu
2021 Security and Communication Networks  
Block-based and interest-based are currently the two mainstream categories for copy-move forgery detection methods.  ...  copy and move forgery detection method.  ...  [17] proposed a new interest point detector that leverages the advantages of block-based and traditional interest pointbased methods and uses improved strategies to implement the algorithm.  ... 
doi:10.1155/2021/6688393 doaj:a0c0c17aa4074e8789f43791b27b31f9 fatcat:gnu26wdbtncoloflu74zht6axi

Detection and Localization of Image and Video Tampering

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
So, maintaining the authenticity and integrity of these digital contents is a major concern. For the past few years, researches were going on to find out tampering in the digital contents.  ...  Active and passive approaches are the major classification for digital tampering detection. Here, we discuss some of the active and passive approaches and their significance in the current scenario.  ...  Fig.2-Workflow of copy-move forgery detection The matching process can be done by two techniques-methods based on block and key point.  ... 
doi:10.35940/ijitee.d1158.029420 fatcat:n7c7x22bofet5lizb2qurlxw4y

Key Point and Block based Feature Matching for Effective Image Forgery Detection

Durga Jetthy, Purva Gubbawar, Aditya Kumar Gupta, Mrs. Panwar S.A.
2017 IJARCCE  
From the extracted features the forgery is detected based on block matching and labeled feature point matching.  ...  There are many types of image forgery, the most important and popular type is called copy move forgery, which uses the same image in the process of forgery.  ...  The basic method for copy move forgery detection are block based and key point based. In DCT (discrete cosine transform) algorithm the input image is taken.  ... 
doi:10.17148/ijarcce.2017.63168 fatcat:47xzkr4trvdyfdtk33wlnhbnfq

Image forgery detection through residual-based local descriptors and block-matching

Davide Cozzolino, Diego Gragnaniello, Luisa Verdoliva
2014 2014 IEEE International Conference on Image Processing (ICIP)  
We propose a new image forgery detection technique which fuses the outputs of two very diverse tools, based on machine learning and block-matching, respectively.  ...  The machine-learning tool builds upon some local descriptors recently proposed in the steganalysis field, which are selected and merged based on an ad hoc measure of reliability.  ...  In the next two Sections we will describe the proposed splicing detector based on local descriptors and copy-move detector based on fast matching.  ... 
doi:10.1109/icip.2014.7026072 dblp:conf/icip/CozzolinoGV14 fatcat:qabzv7iyhneptm7hjgf4ugqxne

A Deep Learning Model to Inspect Image Forgery on SURF Keypoints of SLIC Segmented Regions

Uliyan Diaa
2024 Engineering, Technology & Applied Science Research  
Copy-Move Forgery (CMF) is a common form of image manipulation attack that involves copying and pasting a part of an image to another position within the same image.  ...  To assess the effectiveness of the approach, the types of features used for copy-move forgery were addressed.  ...  The feature descriptor is based on the sum of the Haar wavelet response around the point of interest.  ... 
doi:10.48084/etasr.6622 fatcat:cgy64qqcxvfsvbwbufs65fklv4

A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection and Localization [article]

Luca D'Amiano, Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva
2017 arXiv   pre-print
We propose a new algorithm for the reliable detection and localization of video copy-move forgeries.  ...  Performance assessment relies on a new dataset, designed ad hoc, with realistic copy-moves and a wide variety of challenging situations.  ...  ACKNOWLEDGMENT This material is based on research sponsored by the Air Force Research Laboratory and the Defense Advanced Research Projects Agency under agreement number FA8750-16-2-0204.  ... 
arXiv:1703.04636v1 fatcat:frm5ytg7qnaylle6qvixjsedpe

Removal and injection of keypoints for SIFT-based copy-move counter-forensics

Irene Amerini, Mauro Barni, Roberto Caldelli, Andrea Costanzo
2013 EURASIP Journal on Information Security  
To demonstrate the practical effectiveness of our procedure, we apply the best performing tool to create a forensically undetectable copy-move forgery, whereby traces of keypoint removal are hidden by  ...  As a consequence, an attacker can leverage on such weaknesses to impair or directly bypass with alarming efficacy some applications that rely on SIFT.  ...  This topic is crucial in a copy-move forgery detection scenario where portions of an image are to be considered.  ... 
doi:10.1186/1687-417x-2013-8 fatcat:aw4jlrrcdbeohepwlw6x3opqh4

A Very Fast Copy-Move Forgery Detection Method for 4K Ultra HD Images

Laura Bertojo, Christophe Néraud, William Puech
2022 Frontiers in Signal Processing  
Copy-move forgery detection is a challenging task in digital image forensics. Keypoint-based detection methods have proven to be very efficient to detect copied-moved forged areas in images.  ...  In this paper, we propose a new keypoint-based method with a new fast feature matching algorithm, based on the generalized two nearest-neighbor (g2NN) algorithm allowing us to greatly reduce the complexity  ...  ACKNOWLEDGMENTS We would like to thank the financial support of the ANR-16-DEFA-0001 OEIL (statistiques rObustEs pour l'apprentIssage Léger) research project of the French ANR/DGA challenge DEFALS (DEtection  ... 
doi:10.3389/frsip.2022.906304 fatcat:zqmsxohto5bsbnmipiszdmao3e

The Hybrid Technique for Edge Detection using Bio-inspired Techniques

Prachi Bansal, Mukesh Rawat
2017 International Journal of Computer Applications  
In this paper, the bee colony based edge detection technique is proposed which is the enhanced version of the existing edge detection technique based on ant colony optimization.  ...  The edge detection is the technique of image processing which detect the points at which the image properties changed at steady rate.  ...  They apply the detectors to a practical image forensic scenario of SIFT-based copy-move forgery detection to assume the SIFT-based detectors and as a result give new proposed technique.  ... 
doi:10.5120/ijca2017915336 fatcat:ywep4h5l5fgy7mcus6uvvebe3y

A Thorough Investigation on Image Forgery Detection

Anjani Kumar Rai, Subodh Srivastava
2023 CMES - Computer Modeling in Engineering & Sciences  
These methods have identified forgery and its type and compared it with state of the art. This work will help us to find the best forgery detection technique based on the different environments.  ...  This work presents a thorough analysis of digital image forgery detection techniques with their steps and effectiveness.  ...  For Copy-Move Forgery Detection, Pun et al. [103] proposed a two-stage localization method CMFDs.  ... 
doi:10.32604/cmes.2022.020920 fatcat:u7bvtghwlvadvcaw62ay5ywm3e

Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method

J. S. Sujin, S. Sophia
2023 Computer systems science and engineering  
A section of an image is copied and pasted into another part of the same image to hide an item or duplicate particular image elements in copy-move forgery.  ...  In Copy-Move forgery detection, the high similarity between the tampered regions and the source regions has become crucial evidence.  ...  The research of Yong Yew Yeap and colleagues focuses on passive forgery detection on altered photos using the copy move approach, often known as (CMFD) Copy Move Forgery Detection [17] .  ... 
doi:10.32604/csse.2023.023747 fatcat:7zn7f6rfgjhkfk242bqr4c7noe
« Previous Showing results 1 — 15 out of 328 results