메뉴 건너뛰기




Volumn , Issue , 2014, Pages 119-124

Adaptive matching for copy-move Forgery detection

Author keywords

adaptive threshold; Copy move forgery detection; duplicated region localization

Indexed keywords

ADAPTIVE MATCHING; ADAPTIVE THRESHOLDS; BLOCK BASED; COPY-MOVE FORGERIES; COPY-MOVE FORGERY DETECTIONS; DETECTION METHODS; DUPLICATED REGION LOCALIZATION; FALSE MATCHES; KEYPOINTS; LOCALISATION;

EID: 84929230919     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIFS.2014.7084314     Document Type: Conference Paper
Times cited : (40)

References (19)
  • 2
    • 84890463165 scopus 로고    scopus 로고
    • An overview on image forensics
    • A. Piva, An Overview on Image Forensics, ISRN Signal Processing, vol. 2013, p. 22, 2013
    • (2013) ISRN Signal Processing , vol.2013 , pp. 22
    • Piva, A.1
  • 3
    • 84855205141 scopus 로고    scopus 로고
    • A robust detection algorithm for copy-move forgery in digital images
    • Y. Cao, T. Gao, L. Fan, and Q. Yang, A robust detection algorithm for copy-move forgery in digital images, Forensic science international, vol. 214, pp. 33-43, 2012
    • (2012) Forensic Science International , vol.214 , pp. 33-43
    • Cao, Y.1    Gao, T.2    Fan, L.3    Yang, Q.4
  • 4
    • 78549275481 scopus 로고    scopus 로고
    • Detection of copy-rotate-move forgery using zernike moments
    • R. Böhme, P. L. Fong, and R. Safavi-Naini, Eds., ed Springer Berlin Heidelberg
    • S.-J. Ryu, M.-J. Lee, and H.-K. Lee, Detection of Copy-Rotate-Move Forgery Using Zernike Moments, in Information Hiding. vol. 6387, R. Böhme, P. L. Fong, and R. Safavi-Naini, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 51-65
    • (2010) Information Hiding , vol.6387 , pp. 51-65
    • Ryu, S.-J.1    Lee, M.-J.2    Lee, H.-K.3
  • 5
    • 63149091707 scopus 로고    scopus 로고
    • Detection of copy-move forgery in digital images using sift algorithm
    • PACIIA '08. Pacific-Asia Workshop on 2008
    • H. Hailing, G. Weiqiang, and Z. Yu, Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm, in Computational Intelligence and Industrial Application, 2008. PACIIA '08. Pacific-Asia Workshop on, 2008, pp. 272-276
    • (2008) Computational Intelligence and Industrial Application , pp. 272-276
    • Hailing, H.1    Weiqiang, G.2    Yu, Z.3
  • 8
    • 84872395718 scopus 로고    scopus 로고
    • Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
    • Y. Li, Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching, Forensic science international, vol. 224, pp. 59-67, 2013
    • (2013) Forensic Science International , vol.224 , pp. 59-67
    • Li, Y.1
  • 14
    • 46449096967 scopus 로고    scopus 로고
    • A sorted neighborhood approach for detecting duplicated regions in image forgeries based on dwt and svd
    • L. Guohui, W. Qiong, D. Tu, and S. Shaojie, A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD, in Multimedia and Expo, 2007 IEEE International Conference on, 2007, pp. 1750-1753
    • (2007) Multimedia and Expo 2007 IEEE International Conference on , pp. 1750-1753
    • Guohui, L.1    Qiong, W.2    Tu, D.3    Shaojie, S.4
  • 19
    • 84929134231 scopus 로고    scopus 로고
    • Counter-forensics: Attacking image forensics
    • H. T. Sencar and N. Memon, Eds., ed Springer New York
    • R. Böhme and M. Kirchner, Counter-Forensics: Attacking Image Forensics, in Digital Image Forensics, H. T. Sencar and N. Memon, Eds., ed: Springer New York, 2013, pp. 327-366
    • (2013) Digital Image Forensics , pp. 327-366
    • Böhme, R.1    Kirchner, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.