Islam et al., 2020 - Google Patents
A robust forgery detection method for copy–move and splicing attacks in imagesIslam et al., 2020
View HTML- Document ID
- 9236374803392315731
- Author
- Islam M
- Karmakar G
- Kamruzzaman J
- Murshed M
- Publication year
- Publication venue
- Electronics
External Links
Snippet
Internet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily splicing and copy–move attacks, effortless, causing …
- 238000001514 detection method 0 title abstract description 102
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ali et al. | Image forgery detection using deep learning by recompressing images | |
Li et al. | A multiple-feature reuse network to extract buildings from remote sensing imagery | |
Yao et al. | Deep learning for detection of object-based forgery in advanced video | |
Meden et al. | k-Same-Net: k-Anonymity with generative deep neural networks for face deidentification | |
Islam et al. | A robust forgery detection method for copy–move and splicing attacks in images | |
Khormali et al. | DFDT: an end-to-end deepfake detection framework using vision transformer | |
Wang et al. | An image copy-move forgery detection scheme based on A-KAZE and SURF features | |
Liu et al. | Efficient source camera identification with diversity-enhanced patch selection and deep residual prediction | |
Wei et al. | Developing an image manipulation detection algorithm based on edge detection and faster r-cnn | |
Tsourounis et al. | SIFT-CNN: when convolutional neural networks meet dense SIFT descriptors for image and sequence classification | |
Zhang et al. | Multi-scale, class-generic, privacy-preserving video | |
Vukotić et al. | Are classification deep neural networks good for blind image watermarking? | |
Yao et al. | Image forgery detection and localization via a reliability fusion map | |
Roy et al. | Bi-fpnfas: Bi-directional feature pyramid network for pixel-wise face anti-spoofing by leveraging fourier spectra | |
Li et al. | An inter-frame forgery detection algorithm for surveillance video | |
Luo et al. | Infrared and visible image fusion: Methods, datasets, applications, and prospects | |
Kairys et al. | Towards home-based diabetic foot ulcer monitoring: a systematic review | |
Yang et al. | Perceptual image hashing using latent low-rank representation and uniform LBP | |
Abdullakutty et al. | Fusion methods for face presentation attack detection | |
Sandouka et al. | Transformers and generative adversarial networks for liveness detection in multitarget fingerprint sensors | |
Li et al. | Fingerprint liveness detection based on fine-grained feature fusion for intelligent devices | |
Alsakar et al. | Detecting and locating passive video forgery based on low computational complexity third-order tensor representation | |
Subramaniam et al. | Improved image splicing forgery detection by combination of conformable focus measures and focus measure operators applied on obtained redundant discrete wavelet transform coefficients | |
Sun et al. | MFAN: multi-level features attention network for fake certificate image detection | |
Zhao et al. | A multiscale fusion lightweight image-splicing tamper-detection model |