Fast copy-move forgery detection
WSEAS Transactions on Signal Processing
A bibliography on blind methods for identifying image forgery
Image Communication
Region duplication detection using image feature matching
IEEE Transactions on Information Forensics and Security
Detection of copy-rotate-move forgery using Zernike moments
IH'10 Proceedings of the 12th international conference on Information hiding
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Detecting digital image splicing in chroma spaces
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A non-intrusive method for copy-move forgery detection
ISVC'11 Proceedings of the 7th international conference on Advances in visual computing - Volume Part II
A comprehensive study on third order statistical features for image splicing detection
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Blind copy-paste detection using improved SIFT ring descriptor
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Duplication forgery detection using improved DAISY descriptor
Expert Systems with Applications: An International Journal
A forgery detection algorithm for exemplar-based inpainting images using multi-region relation
Image and Vision Computing
Region duplication detection based on Harris corner points and step sector statistics
Journal of Visual Communication and Image Representation
Expert Systems with Applications: An International Journal
Accurate and robust localization of duplicated region in copy---move image forgery
Machine Vision and Applications
Hi-index | 0.00 |
As result of powerful image processing tools, digital image forgeries have already become a serious social problem. In this paper we describe an effective method to detect Copy-Move forgery in digital images. This method works by first extracting SIFT descriptors of an image, which are invariant to changes in illumination, rotation, scaling etc. Owing to the similarity between pasted region and copied region, descriptors are then matched between each other to seek for any possible forgery in images. Experiments have been performed to demonstrate the efficiency of this method on different forgeries and quantify its robustness and sensitivity to post image processing, such as additive noise and lossy JPEG compression etc, or even compound processing.