Academic literature on the topic 'Copy-move attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Copy-move attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Copy-move attack"
Imannisa Rahma, Firstyani, and Ema Utami. "Gaussian Pyramid Decomposition in Copy-Move Image Forgery Detection with SIFT and Zernike Moment Algorithms." Telematika 15, no. 1 (February 28, 2022): 1–13. http://dx.doi.org/10.35671/telematika.v15i1.1322.
Full textLiu, Bo, and Chi Man Pun. "HSV Based Image Forgery Detection for Copy-Move Attack." Applied Mechanics and Materials 556-562 (May 2014): 2825–28. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2825.
Full textAmerini, I., L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra. "A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery." IEEE Transactions on Information Forensics and Security 6, no. 3 (September 2011): 1099–110. http://dx.doi.org/10.1109/tifs.2011.2129512.
Full textWarif, Nor Bakiah Abd, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Rosli Salleh, and Fazidah Othman. "SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack." Journal of Visual Communication and Image Representation 46 (July 2017): 219–32. http://dx.doi.org/10.1016/j.jvcir.2017.04.004.
Full textRajalakshmi, C., Al M. Germanus, and R. Balasubramanian. "Copy move forgery detection using key point localized super pixel based on texture features." Computer Optics 43, no. 2 (April 2019): 270–76. http://dx.doi.org/10.18287/2412-6179-2019-43-2-270-276.
Full textMahmood, Toqeer, Tabassam Nawaz, Aun Irtaza, Rehan Ashraf, Mohsin Shah, and Muhammad Tariq Mahmood. "Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images." Mathematical Problems in Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8713202.
Full textTM, Shashidhar, and KB Ramesh. "Reviewing the Effectivity Factor in Existing Techniques of Image Forensics." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3558. http://dx.doi.org/10.11591/ijece.v7i6.pp3558-3569.
Full textGenç, Ziya Alper, Gabriele Lenzini, and Daniele Sgandurra. "Cut-and-Mouse and Ghost Control." Digital Threats: Research and Practice 2, no. 1 (March 2021): 1–23. http://dx.doi.org/10.1145/3431286.
Full textManoharan, J. Samuel. "Design of an Intelligent Approach on Capsule Networks to Detect Forged Images." September 2021 3, no. 3 (October 2, 2021): 205–21. http://dx.doi.org/10.36548/jtcsst.2021.3.004.
Full textWang, Xiaofeng, Guanghui He, Chao Tang, Yali Han, and Shangping Wang. "Keypoints-Based Image Passive Forensics Method for Copy-Move Attacks." International Journal of Pattern Recognition and Artificial Intelligence 30, no. 03 (February 22, 2016): 1655008. http://dx.doi.org/10.1142/s0218001416550089.
Full textDissertations / Theses on the topic "Copy-move attack"
Li, Yuan Man. "SIFT-based image copy-move forgery detection and its adversarial attacks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3952093.
Full textAMERINI, IRENE. "Image Forensics: sourceidentification and tamperingdetection." Doctoral thesis, 2010. http://hdl.handle.net/2158/520262.
Full textBook chapters on the topic "Copy-move attack"
Studiawan, Hudan, Rahmat Nazali Salimi, and Tohari Ahmad. "Forensic Analysis of Copy-Move Attack with Robust Duplication Detection." In Advances in Intelligent Systems and Computing, 404–13. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73689-7_39.
Full textSoni, Badal, Pradip K. Das, Dalton Meitei Thounaojam, and Debalina Biswas. "Copy–Move Attack Detection from Digital Images: An Image Forensic Approach." In Advances in Intelligent Systems and Computing, 69–76. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9683-0_8.
Full textIslam, Mohammad Manzurul, Joarder Kamruzzaman, Gour Karmakar, Manzur Murshed, and Gayan Kahandawa. "Passive Detection of Splicing and Copy-Move Attacks in Image Forgery." In Neural Information Processing, 555–67. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04212-7_49.
Full textAnand, Vijay, Mohammad Farukh Hashmi, and Avinash G. Keskar. "A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods." In Intelligent Information and Database Systems, 530–42. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05476-6_54.
Full textMehta, Sonam, and Pragya Shukla. "An Efficient Technique for Passive Image Forgery Detection Using Computational Intelligence." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 31–45. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3942-5.ch003.
Full textNeena Raj N.R. and Shreelekshmi R. "A Secure Image Authentication Scheme with Tamper Localization and Recovery." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2021. http://dx.doi.org/10.3233/faia210199.
Full textConference papers on the topic "Copy-move attack"
Franc, Igor, and Milos Stojmenovic. "Techniques of image manipulation and detection of copy-move attack." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419535.
Full textSoni, Badal, Pradip K. Das, and Dalton Meitei Thounaojam. "Improved Block-based Technique using SURF and FAST Keypoints Matching for Copy-Move Attack Detection." In 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2018. http://dx.doi.org/10.1109/spin.2018.8474093.
Full textLiu, Bo, and Chi-Man Pun. "A SIFT and local features based integrated method for copy-move attack detection in digital image." In 2013 IEEE International Conference on Information and Automation (ICIA). IEEE, 2013. http://dx.doi.org/10.1109/icinfa.2013.6720415.
Full textIslam, Mohammad Manzurul, Gour Karmakar, Joarder Kamruzzaman, Manzur Murshed, Gayan Kahandawa, and Nahida Parvin. "Detecting Splicing and Copy-Move Attacks in Color Images." In 2018 Digital Image Computing: Techniques and Applications (DICTA). IEEE, 2018. http://dx.doi.org/10.1109/dicta.2018.8615874.
Full textWang, Xiaofeng, Xiaoni Zhang, Zhen Li, and Shangping Wang. "A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks." In 2011 3rd International Conference on Multimedia Information Networking and Security (MINES). IEEE, 2011. http://dx.doi.org/10.1109/mines.2011.98.
Full textSadu, Chiranjeevi, and Pradip K. Das. "A Detection Method for Copy-Move Forgery Attacks in Digital Images." In TENCON 2022 - 2022 IEEE Region 10 Conference (TENCON). IEEE, 2022. http://dx.doi.org/10.1109/tencon55691.2022.9977490.
Full textNair, Gokul, Kaustubh Venkatesh, Dipankar Sen, and Reena Sonkusare. "Identification of Multiple Copy-move Attacks in Digital Images using FFT and CNN." In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9580052.
Full textAbbas, Muhammad Naveed, Mohammad Samar Ansari, Mamoona Naveed Asghar, Nadia Kanwal, Terry O'Neill, and Brian Lee. "Lightweight Deep Learning Model for Detection of Copy-Move Image Forgery with Post-Processed Attacks." In 2021 IEEE 19th World Symposium on Applied Machine Intelligence and Informatics (SAMI). IEEE, 2021. http://dx.doi.org/10.1109/sami50585.2021.9378690.
Full textSharma, Shashank, and Sunita V. Dhavale. "A review of passive forensic techniques for detection of copy-move attacks on digital videos." In 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS ). IEEE, 2016. http://dx.doi.org/10.1109/icaccs.2016.7586396.
Full text