Estimation of Illuminant Direction and Intensity of Multiple Light Sources
ECCV '02 Proceedings of the 7th European Conference on Computer Vision-Part IV
Exposing digital forgeries by detecting inconsistencies in lighting
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Exposing digital forgeries through chromatic aberration
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Robust Detection of Region-Duplication Forgery in Digital Image
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
A majority-voting based watermarking scheme for color image tamper detection and recovery
Computer Standards & Interfaces
Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 03
Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm
PACIIA '08 Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 02
Exposing digital forgeries by detecting traces of resampling
IEEE Transactions on Signal Processing
Exposing digital forgeries in color filter array interpolated images
IEEE Transactions on Signal Processing - Part II
A bibliography on blind methods for identifying image forgery
Image Communication
Region duplication detection using image feature matching
IEEE Transactions on Information Forensics and Security
A non-intrusive method for copy-move forgery detection
ISVC'11 Proceedings of the 7th international conference on Advances in visual computing - Volume Part II
Duplication forgery detection using improved DAISY descriptor
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
This paper proposes a method for detecting copy-move forgery over images tampered by copy-move. To detect such forgeries, the given image is divided into overlapping blocks of equal size, feature for each block is then extracted and represented as a vector, all the extracted feature vectors are then sorted using the radix sort. The difference (shift vector) of the positions of every pair of adjacent feature vectors in the sorting list is computed. The accumulated number of each of the shift vectors is evaluated. A large accumulated number is considered as possible presence of a duplicated region, and thus all the feature vectors corresponding to the shift vectors with large accumulated numbers are detected, whose corresponding blocks are then marked to form a tentative detected result. Finally, the medium filtering and connected component analysis are performed on the tentative detected result to obtain the final result. Compared with other methods, employing the radix sort makes the detection much more efficient without degradation of detection quality.