[go: up one dir, main page]

Islam et al., 2020 - Google Patents

A robust forgery detection method for copy–move and splicing attacks in images

Islam et al., 2020

View HTML
Document ID
9236374803392315731
Author
Islam M
Karmakar G
Kamruzzaman J
Murshed M
Publication year
Publication venue
Electronics

External Links

Snippet

Internet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily splicing and copy–move attacks, effortless, causing …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10024Color image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS

Similar Documents

Publication Publication Date Title
Ali et al. Image forgery detection using deep learning by recompressing images
Li et al. A multiple-feature reuse network to extract buildings from remote sensing imagery
Yao et al. Deep learning for detection of object-based forgery in advanced video
Meden et al. k-Same-Net: k-Anonymity with generative deep neural networks for face deidentification
Islam et al. A robust forgery detection method for copy–move and splicing attacks in images
Khormali et al. DFDT: an end-to-end deepfake detection framework using vision transformer
Wang et al. An image copy-move forgery detection scheme based on A-KAZE and SURF features
Liu et al. Efficient source camera identification with diversity-enhanced patch selection and deep residual prediction
Wei et al. Developing an image manipulation detection algorithm based on edge detection and faster r-cnn
Tsourounis et al. SIFT-CNN: when convolutional neural networks meet dense SIFT descriptors for image and sequence classification
Zhang et al. Multi-scale, class-generic, privacy-preserving video
Vukotić et al. Are classification deep neural networks good for blind image watermarking?
Yao et al. Image forgery detection and localization via a reliability fusion map
Roy et al. Bi-fpnfas: Bi-directional feature pyramid network for pixel-wise face anti-spoofing by leveraging fourier spectra
Li et al. An inter-frame forgery detection algorithm for surveillance video
Luo et al. Infrared and visible image fusion: Methods, datasets, applications, and prospects
Kairys et al. Towards home-based diabetic foot ulcer monitoring: a systematic review
Yang et al. Perceptual image hashing using latent low-rank representation and uniform LBP
Abdullakutty et al. Fusion methods for face presentation attack detection
Sandouka et al. Transformers and generative adversarial networks for liveness detection in multitarget fingerprint sensors
Li et al. Fingerprint liveness detection based on fine-grained feature fusion for intelligent devices
Alsakar et al. Detecting and locating passive video forgery based on low computational complexity third-order tensor representation
Subramaniam et al. Improved image splicing forgery detection by combination of conformable focus measures and focus measure operators applied on obtained redundant discrete wavelet transform coefficients
Sun et al. MFAN: multi-level features attention network for fake certificate image detection
Zhao et al. A multiscale fusion lightweight image-splicing tamper-detection model