메뉴 건너뛰기




Volumn , Issue , 2011, Pages 95-98

Robust copy-move image forgery detection using undecimated wavelets and Zernike moments

Author keywords

copy move; image forensics; image forgery detection; Zernike moments

Indexed keywords

COPY-MOVE; EUCLIDEAN DISTANCE; IMAGE FORENSICS; IMAGE FORGERY; SCALE AND ROTATION; TRANSLATION INVARIANTS; WAVELETS TRANSFORM; ZERNIKE MOMENTS;

EID: 80755169418     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2043674.2043702     Document Type: Conference Paper
Times cited : (9)

References (23)
  • 1
    • 57849140821 scopus 로고    scopus 로고
    • Digital image forensics using statistical features and neural network classifier
    • July 2008
    • Lu, W., et al. 2008. Digital image forensics using statistical features and neural network classifier, Proc. The 7th International Conference on Machine Learning and Cybernetics, pp. 2831-2834, July 2008.
    • (2008) Proc. The 7th International Conference on Machine Learning and Cybernetics , pp. 2831-2834
    • Lu, W.1
  • 2
    • 80755129784 scopus 로고
    • Alterations of photos raise host of legal, ethical issues
    • Jan 1989
    • Amsberry C. 1989. Alterations of photos raise host of legal, ethical issues, The Wall Street Journal, Jan 1989.
    • (1989) The Wall Street Journal
    • Amsberry, C.1
  • 3
    • 0043201448 scopus 로고    scopus 로고
    • Digital watermarking
    • Yeung, M. M. 1998. Digital watermarking, Communication ACM, vol. 41, no. 7, pp. 30-33.
    • (1998) Communication ACM , vol.41 , Issue.7 , pp. 30-33
    • Yeung, M.M.1
  • 5
    • 0036627368 scopus 로고    scopus 로고
    • A survey of watermarking algorithms for image authentication
    • Rey, C. and Dugelay, J. L. 2002. A survey of watermarking algorithms for image authentication, EURASIP Journal on applied Signal Processing. Vol. 2002 N6, pp. 613-621.
    • (2002) EURASIP Journal on Applied Signal Processing , vol.2002 , Issue.6 , pp. 613-621
    • Rey, C.1    Dugelay, J.L.2
  • 6
    • 56749161438 scopus 로고    scopus 로고
    • Multipurpose Watermarking Based on Multiscale Curvelet Transform
    • December 2008
    • Zhang, C., Cheng, L. L., Qiu, Z. and Cheng, L. M. 2008. Multipurpose Watermarking Based on Multiscale Curvelet Transform, IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 611-619,(December 2008).
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 611-619
    • Zhang, C.1    Cheng, L.L.2    Qiu, Z.3    Cheng, L.M.4
  • 7
    • 13244251141 scopus 로고    scopus 로고
    • Exposing Digital Forgeries by Detecting Traces of Re-sampling
    • Feb. 2005
    • Popescu, A. C. and Farid, H. 2005. Exposing Digital Forgeries by Detecting Traces of Re-sampling, IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 758-767, (Feb. 2005).
    • (2005) IEEE Trans. Signal Processing , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 9
    • 49549116860 scopus 로고    scopus 로고
    • Blind Authentication Using Periodic Properties of Interpolation
    • September 2008
    • Mahdian, B. and Saic, S. 2008. Blind Authentication Using Periodic Properties of Interpolation, IEEE Trans. on Inf. Forensics Security, vol. 3, no. 3, pp. 529-538, (September 2008).
    • (2008) IEEE Trans. on Inf. Forensics Security , vol.3 , Issue.3 , pp. 529-538
    • Mahdian, B.1    Saic, S.2
  • 10
    • 60449117421 scopus 로고    scopus 로고
    • Exposing Digital Forgeries from JPEG Ghosts
    • March 2009
    • Farid, H. 2009. Exposing Digital Forgeries From JPEG Ghosts, IEEE Trans. Inf. Forensics Security, vol. 4, no. 1, pp. 154-160, (March 2009).
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.1 , pp. 154-160
    • Farid, H.1
  • 11
    • 67349211082 scopus 로고    scopus 로고
    • Using Noise Inconsistencies for Blind Image Forensics
    • doi: 10.1016/j.imavis.2009.02.001
    • Mahdian, B. and Saic, S. 2009. Using Noise Inconsistencies for Blind Image Forensics, Image and Vision Computing, doi: 10.1016/j.imavis.2009.02.001.
    • (2009) Image and Vision Computing
    • Mahdian, B.1    Saic, S.2
  • 12
    • 39449103666 scopus 로고    scopus 로고
    • Digital Image Forensics via Intrinsic Fingerprints
    • March 2008
    • Swaminathan, A., Wu, M., Liu, K. J. R. 2008. Digital Image Forensics via Intrinsic Fingerprints, IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, 101-117, (March 2008).
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.1 , pp. 101-117
    • Swaminathan, A.1    Wu, M.2    Liu, K.J.R.3
  • 13
    • 77953650817 scopus 로고    scopus 로고
    • A bibliography on blind methods for identifying image forgery
    • Mahdian, B. and Saic, S. 2010. A bibliography on blind methods for identifying image forgery. Signal Processing: Image Communication, vol. 25, pp. 389-399.
    • (2010) Signal Processing: Image Communication , vol.25 , pp. 389-399
    • Mahdian, B.1    Saic, S.2
  • 15
    • 70349199203 scopus 로고    scopus 로고
    • An efficient and robust method for detecting copy-move forgery
    • Bayram, S. et al. 2009. An efficient and robust method for detecting copy-move forgery. Proc. ICASSP09, pp. 1053-1056.
    • (2009) Proc. ICASSP09 , pp. 1053-1056
    • Bayram, S.1
  • 16
    • 34547689478 scopus 로고    scopus 로고
    • Detection of copy-move forgery using a method based on blur moment invariants
    • DOI 10.1016/j.forsciint.2006.11.002, PII S0379073806006748
    • Mahdian, B. and Saic, S. 2007. Detection of copy-move forgery using a method based on blur moment invariants. Forens. Sci. Int., vol. 171, no. 2-3, pp. 180-189. (Pubitemid 47211748)
    • (2007) Forensic Science International , vol.171 , Issue.2-3 , pp. 180-189
    • Mahdian, B.1    Saic, S.2
  • 17
    • 58149235809 scopus 로고    scopus 로고
    • A sorted neighborhood approach detecting duplicated forgeries based on DWT and SVD
    • Li, G. et al. 2007. A sorted neighborhood approach detecting duplicated forgeries based on DWT and SVD. Proc. ICME2007, pp. 1750-1753.
    • (2007) Proc. ICME2007 , pp. 1750-1753
    • Li, G.1
  • 18
    • 13444308154 scopus 로고    scopus 로고
    • Detection of copy-move forgery in digital images
    • Fridrich, J. et al. 2003. Detection of copy-move forgery in digital images. Digital Forensic Research Works, pp. 55-61.
    • (2003) Digital Forensic Research Works , pp. 55-61
    • Fridrich, J.1
  • 19
    • 58149213083 scopus 로고    scopus 로고
    • Tamper Detection Based on Regularity of Wavelet Transform Coefficients
    • Sutcu, Y. et al. 2007. Tamper Detection Based on Regularity of Wavelet Transform Coefficients. Proc. IEEE ICIP 2007.
    • (2007) Proc. IEEE ICIP 2007
    • Sutcu, Y.1
  • 20
    • 84898785264 scopus 로고
    • Characterization of signals from multiscale edges
    • July 1992
    • Mallat, S. G. and Zhong, S. 1992. Characterization of signals from multiscale edges. IEEE Trans. Pattern Anal. Machine Intell., vol. 14, pp. 710-732, (July 1992).
    • (1992) IEEE Trans. Pattern Anal. Machine Intell. , vol.14 , pp. 710-732
    • Mallat, S.G.1    Zhong, S.2
  • 22
    • 84937655864 scopus 로고
    • Visual Pattern Recognition by Moment Invariants
    • Hu M. K. 1962. Visual Pattern Recognition by Moment Invariants. IRE Transaction Information Theory, Vol. 2, pp 179-187.
    • (1962) IRE Transaction Information Theory , vol.2 , pp. 179-187
    • Hu, M.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.