Academic literature on the topic 'COPY-MOVE'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COPY-MOVE.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "COPY-MOVE"
Alam, Md Iftekhar Hossian Md Tasnim, and Jyotirmoy Ghose. "Image Forgery Detection Using Copy-Move Technique." International Journal of Research Publication and Reviews 4, no. 3 (March 2023): 1103–7. http://dx.doi.org/10.55248/gengpi.2023.32077.
Full textKuznetsov, A. V., and V. V. Myasnikov. "COPY-MOVE IMAGE FORENSICS DETECTION." Computer Optics 37, no. 2 (January 1, 2013): 244–53. http://dx.doi.org/10.18287/0134-2452-2013-37-2-244-253.
Full textWang, Yitian, and Sei-ichiro Kamata. "Copy Move Image Forgery Detection Based on Polar Fourier Representation." International Journal of Machine Learning and Computing 8, no. 2 (April 2018): 158–63. http://dx.doi.org/10.18178/ijmlc.2018.8.2.680.
Full textImannisa Rahma, Firstyani, and Ema Utami. "Gaussian Pyramid Decomposition in Copy-Move Image Forgery Detection with SIFT and Zernike Moment Algorithms." Telematika 15, no. 1 (February 28, 2022): 1–13. http://dx.doi.org/10.35671/telematika.v15i1.1322.
Full textPrakash, Choudhary Shyam, and Sushila Maheshkar. "Copy-Move Forgery Detection Using DyWT." International Journal of Multimedia Data Engineering and Management 8, no. 2 (April 2017): 1–9. http://dx.doi.org/10.4018/ijmdem.2017040101.
Full textGürbüz, Emre, Guzin Ulutas, and Mustafa Ulutas. "Source-destination discrimination on copy-move forgeries." Multimedia Tools and Applications 80, no. 8 (January 12, 2021): 12831–42. http://dx.doi.org/10.1007/s11042-020-10436-0.
Full textKaur, Sharanjit, and Manpreet Kaur. "Novel Method for Copy-Move Forgery Detection." International Journal of Computer Applications 174, no. 18 (February 16, 2021): 10–14. http://dx.doi.org/10.5120/ijca2021921064.
Full textRao, Dr Tekuru Chandra Sekhar. "Copy Move Forgery Detection Using Hybrid Algorithm." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (August 25, 2020): 5071–76. http://dx.doi.org/10.30534/ijatcse/2020/128942020.
Full textKumar, T. Sudheer. "Copy-Move Forgery Detection Using Moment Invariants." International Journal for Research in Applied Science and Engineering Technology 6, no. 1 (January 31, 2018): 1545–50. http://dx.doi.org/10.22214/ijraset.2018.1236.
Full textQazi, Tanzeela, Mushtaq Ali, Khizar Hayat, and Baptiste Magnier. "Seamless Copy–Move Replication in Digital Images." Journal of Imaging 8, no. 3 (March 10, 2022): 69. http://dx.doi.org/10.3390/jimaging8030069.
Full textDissertations / Theses on the topic "COPY-MOVE"
Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.
Full textBhatnagar, Kunal, and Gustav Ekner. "Copy-move Image Forgery Detection with Convolutional Neural Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302507.
Full textEn copy-move manipulation är en förfalskningsmetod för bilder som går ut på att kopiera en liten del av en bild till en annan del. Den här rapporten analyserar detekteringen av copy-move-förfalskningar med hjälp av Convolutional Neural Networks (CNN). Modellen som används utnyttjar ett redan existerande CNN-lager skapat för att identifiera egenskaper i bilden användbara för detektering av bildmanipulation. Modellen är både tränad och validerad på data med olika grader av manipulation för att bestämma vilka kombinationer som ger högst träffsäkerhet. Skalan bestäms av storleken på copy-move-operationerna, med ett spann mellan 10% och 60% av bilden. Resultatet visar att träning med bilder med små modifikationer i allmänhet ger bättre resultat än att träna på bilder med större modifikationer, oavsett om valideringen skett på bilder av låg eller hög manipuleringsgrad. Det kan även konstateras att det särskilda CNN-lagret är lämpligt för detektering av copy-move-operationer.
Li, Yuan Man. "SIFT-based image copy-move forgery detection and its adversarial attacks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3952093.
Full textProkop, Jeremy W. "The SRY Gene and Reductionism in Molecular Biology: How to Move from the Benchtop to a Systems Approach." University of Akron / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=akron1373365929.
Full textChen, Ling-Ying, and 陳怜穎. "Pyramid Structure for Copy-Move Forgery Detection." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/27911697635315331597.
Full text淡江大學
資訊工程學系碩士班
103
This paper solves the passive copy-move detection efficiently. A copy-move attack is defined as a region of an image being replaced by a copy of other region in the same image. The proposed scheme improves the performance on the assumption of the copy-move area being larger than a predefined block size. Test image is partitioned to non-overlapping segmented block according to previous predefined block size. Each comparison block, which is overlapped extracted from a segmented block, is compared with upper-left comparison block of all segmented block. Experimental results show that the computation time can be greatly reduced with the similar performance to other conventional schemes.
Yang, Ging-Chu, and 楊青矗. "Copy-Move Forgery Detection in Digital Image." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/7jw5nc.
Full text佛光大學
資訊學系
97
Digital images are easy to be tempered and edited due to availability of image editing software. Generally, image tampering protection can be divided into two kinds: (1) active protection: The original digital image is embedded with a watermark which can be used to detect tampering. (2) passive protection: it does not need any digital watermark or signature but relies on the image processing technology to detect the forgery. Passive approaches have not yet been thoroughly researched. The most common ways to temper a digital image is copy-paste forgery which is used to conceal objects or produce a non-existing scene. To detect the copy-paste forgery, we divide the image into blocks as the basic feature for detection, and transfer every block to a feature vector with lower dimension for comparison. The number of blocks and dimension of characteristics are the major factor affecting the computation complexity. In this paper, we modify the previous methods by using less cumulative offsets for block matching. The experimental results show that our method can successfully detect the forgery part even when the forged image is saved in a lossy format such as JPEG. The performance of the proposed method is demonstrated on several forged images.
Wang, Han, and 王瀚. "Detecting Copy-Move Forgery Regions through Multi-Block Features." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/04495684675004787236.
Full text淡江大學
資訊工程學系碩士班
104
This paper identifies copy-move forgery regions in an image through invariant features extracted from each block. First, an image is divided into overlapped blocks and 7 invariant moment features of the circle area under each block are calculated. Two features, mean and variance, are then acquired from the 7 moment features in each block. Each block is only compared to those blocks under the intersection of the same mean and variance feature sets. The copy-move forgery regions can be found by matching the detected blocks with the identical distance. Moreover, the adopted moment features are efficient on detecting rotational blocks. Experimental results show that the proposed scheme detects rotational duplicated regions well.
Hao-ChiangHsu and 許豪江. "Detection of Copy-Move Forgery Image Using Gabor Descriptor." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/01528765039792755705.
Full text國立成功大學
工程科學系碩博士班
100
With the advance of science and technology, images are easily accessible to everybody. It is also easy to be changed about the content. Images are usually as criminal evidences and news report. How to make sure if the content is not changed becomes a very important issue. In this research, the Gabor filter is mainly applied to get the features of the image under inspected. It is easy to get the rotation and/or scaling versions of the Gabor filter. An image is divided into overlapped sub-blocks with different block size. Each sub-block is convoluted with a proper Gabor filter with different rotation angle and scaling factor to get the called Gabor descriptor of the sub-block. These Gabor descriptors are conversed as the key point and feature vector of the sub-block. For comparing two sub-blocks, their Gabor descriptors are applied to find if there is any similarity between them. The proposed method not only can locate the duplicated regions precisely, but also estimate the rotation angle and scale factor of the inspected image. Experimental result shows that the proposed method can achieve high detection rate. It is also provided a good estimated rotation angle and scaling factor.
D'Amiano, Luca. "A new technique for video copy-move forgery detection." Tesi di dottorato, 2017. http://www.fedoa.unina.it/12254/1/DAmiano_Luca_XXX.pdf.
Full textDEEPAK. "A SUPER-SIFT APPROACH FOR COPY-MOVE FORGERY DETECTION." Thesis, 2017. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15910.
Full textBooks on the topic "COPY-MOVE"
Soni, Badal, and Pradip K. Das. Image Copy-Move Forgery Detection. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9.
Full textJ, Indumathi. State-of-The-Art in Block based Copy Move Forgery Detection: ICCS 2014. Edited by Kokula Krishna Hari K. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.
Find full textPhiladelphia fire: A novel. New York: Holt, 1990.
Find full textPhiladelphia fire. New York: Houghton Mifflin Co., 2005.
Find full textWideman, John Edgar. Philadelphia fire: A novel. New York: Vintage Books, 1991.
Find full textOn The Move Copy Colour. Golden Books Publishing Company, Inc., 1992.
Find full textMove to Strike Proof Copy. Piatkus Books, 2001.
Find full textShaped Copy Colouring - on the Move. Egmont Childrens Books, 1994.
Find full textCopy Colour and Trace : On the Move. Egmont Childrens Books, 1991.
Find full textDas, Pradip K., and Badal Soni. Image Copy-Move Forgery Detection: New Tools and Techniques. Springer Singapore Pte. Limited, 2022.
Find full textBook chapters on the topic "COPY-MOVE"
Soni, Badal, and Pradip K. Das. "Oriented FAST Rotated BRIEF and Trie-Based Efficient Copy-Move Forgery Detection Algorithm." In Image Copy-Move Forgery Detection, 101–29. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_8.
Full textSoni, Badal, and Pradip K. Das. "Summing Up." In Image Copy-Move Forgery Detection, 131–33. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_9.
Full textSoni, Badal, and Pradip K. Das. "Key-Points Based Enhanced CMFD System Using DBSCAN Clustering Algorithm." In Image Copy-Move Forgery Detection, 69–83. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_6.
Full textSoni, Badal, and Pradip K. Das. "Copy-Move Forgery Detection Using Local Binary Pattern Histogram Fourier Features." In Image Copy-Move Forgery Detection, 33–42. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_3.
Full textSoni, Badal, and Pradip K. Das. "Blur Invariant Block-Based CMFD System Using FWHT Features." In Image Copy-Move Forgery Detection, 43–50. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_4.
Full textSoni, Badal, and Pradip K. Das. "Introduction." In Image Copy-Move Forgery Detection, 1–10. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_1.
Full textSoni, Badal, and Pradip K. Das. "Geometric Transformation Invariant Improved Block-Based Copy-Move Forgery Detection." In Image Copy-Move Forgery Detection, 51–67. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_5.
Full textSoni, Badal, and Pradip K. Das. "Background Study and Analysis." In Image Copy-Move Forgery Detection, 11–31. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_2.
Full textSoni, Badal, and Pradip K. Das. "Image Copy-Move Forgery Detection Using Deep Convolutional Neural Networks." In Image Copy-Move Forgery Detection, 85–99. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_7.
Full textKharanghar, Monika, and Amit Doegar. "Copy-Move Forgery Detection Methods: A Critique." In Advances in Information Communication Technology and Computing, 501–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5421-6_49.
Full textConference papers on the topic "COPY-MOVE"
Patankar, A. B., A. Sukhpal, S. Shetye, and A. ShroffShroff. "Copy move forgery detection." In International Conference & Workshop on Electronics & Telecommunication Engineering (ICWET 2016). Institution of Engineering and Technology, 2016. http://dx.doi.org/10.1049/cp.2016.1145.
Full textJaafar, Roqaya Hamad, Zahraa H. Rasool, and Abbas H. Hassin Alasadi. "New Copy-Move Forgery Detection Algorithm." In 2019 International Russian Automation Conference. IEEE, 2019. http://dx.doi.org/10.1109/rusautocon.2019.8867813.
Full textBhavya Bhanu M P and Arun Kumar M N. "Copy-move forgery detection using segmentation." In 2017 11th International Conference on Intelligent Systems and Control (ISCO). IEEE, 2017. http://dx.doi.org/10.1109/isco.2017.7855986.
Full textKarsh, Ram Kumar, Anurag Das, G. Lavanya Swetha, Abhishek Medhi, Rabul Hussain Laskar, Utkarsh Arya, and Rohit Kumar Agarwal. "Copy-move forgery detection using ASIFT." In 2016 1st India International Conference on Information Processing (IICIP). IEEE, 2016. http://dx.doi.org/10.1109/iicip.2016.7975329.
Full textKang, Li, and Xiao-ping Cheng. "Copy-move forgery detection in digital image." In 2010 3rd International Congress on Image and Signal Processing (CISP). IEEE, 2010. http://dx.doi.org/10.1109/cisp.2010.5648249.
Full textGurbuz, Emre, Guzin Ulutas, and Mustafa Ulutas. "Rotation invariant copy move forgery detection method." In 2015 9th International Conference on Electrical and Electronics Engineering (ELECO). IEEE, 2015. http://dx.doi.org/10.1109/eleco.2015.7394451.
Full textPandey, Ramesh Chand, Sanjay Kumar Singh, and K. K. Shukla. "Passive copy-move forgery detection in videos." In 2014 International Conference on Computer and Communication Technology (ICCCT). IEEE, 2014. http://dx.doi.org/10.1109/iccct.2014.7001509.
Full textTurk, Salih, Ozkan Bingol, and Guzin Ulutas. "Detection of copy-move forgery using DoGCode." In 2015 23th Signal Processing and Communications Applications Conference (SIU). IEEE, 2015. http://dx.doi.org/10.1109/siu.2015.7130356.
Full textLiu, Zihan, and Wei Lu. "Fast Copy-Move Detection of Digital Audio." In 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC). IEEE, 2017. http://dx.doi.org/10.1109/dsc.2017.11.
Full textNguyen, Hieu Cuong, and Stefan Katzenbeisser. "Security of copy-move forgery detection techniques." In ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2011. http://dx.doi.org/10.1109/icassp.2011.5946869.
Full textReports on the topic "COPY-MOVE"
Tautges, Timothy J., and Rajeev Jain. Mesh Copy/Move/Merge Tool for Reactor Simulation Applications. Office of Scientific and Technical Information (OSTI), April 2014. http://dx.doi.org/10.2172/1171187.
Full text