Academic literature on the topic 'COPY-MOVE FORGERY'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'COPY-MOVE FORGERY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "COPY-MOVE FORGERY"

1

Alam, Md Iftekhar Hossian Md Tasnim, and Jyotirmoy Ghose. "Image Forgery Detection Using Copy-Move Technique." International Journal of Research Publication and Reviews 4, no. 3 (March 2023): 1103–7. http://dx.doi.org/10.55248/gengpi.2023.32077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Naincy and Ashok Kumar Bathla. "Comparative Study and Survey on Copy Move Image Forgery Detection Approaches." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 6 (June 30, 2015): 33–38. http://dx.doi.org/10.53555/nncse.v2i6.445.

Full text
Abstract:
Nowadays the demand of digital images in various application areas is increasing and thus it is becoming important to ensure the authenticity of images. Due to easy availability of various image editing tools, continuous manipulations are done to create fake or forged images. Although various techniques like copy-move, splicing, resampling etc. for image forgery are present but copy move image forgery has received significant attention these days. Thus the focus of this paper is on copy-move image forgery detection techniques. We have presented a review of commonly used copy move image forgery detection techniques and the comparison of same is also showed to evaluate their performance on basis of various parameters.
APA, Harvard, Vancouver, ISO, and other styles
3

Naincy and Ashok Kumar Bathla. "Comparative Study and Survey on Copy Move Image Forgery Detection Approaches." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 9 (September 30, 2015): 01–06. http://dx.doi.org/10.53555/nncse.v2i9.441.

Full text
Abstract:
Nowadays the demand of digital images in various application areas is increasing and thus it is becoming important to ensure the authenticity of images. Due to easy availability of various image editing tools, continuous manipulations are done to create fake or forged images. Although various techniques like copy-move, splicing, resampling etc. for image forgery are present but copy move image forgery has received significant attention these days. Thus the focus of this paper is on copy-move image forgery detection techniques. We have presented a review of commonly used copy move image forgery detection techniques and the comparison of same is also showed to evaluate their performance on basis of various parameters.
APA, Harvard, Vancouver, ISO, and other styles
4

Kashyap, Abhishek, Megha Agarwal, and Hariom Gupta. "Detection of copy-move image forgery using SVD and cuckoo search algorithm." International Journal of Engineering & Technology 7, no. 2.13 (April 15, 2018): 79. http://dx.doi.org/10.14419/ijet.v7i2.13.11604.

Full text
Abstract:
Copy-move Copy move forgery (CMF) is one of the straightforward strategies to create forged images. To detect this kind of forgery one of the widely used method is single value decomposition (SVD). Few methods based on SVD are most acceptable but some methods are less acceptable because these methods highly depend on those parameters value, which is manually selected depending upon the tampered images. For different images, we require different parameter values. In this paper, we have proposed a novel method, which uses both copy-move forgery detection using SVD and Cuckoo search (CS) algorithm. It utilizes Cuckoo search algorithm to generate customized parameter values for different tampered images, which are used in copy-move forgery detection (CMFD) under block based framework.
APA, Harvard, Vancouver, ISO, and other styles
5

Pham, Nam Thanh, Jong-Weon Lee, and Chun-Su Park. "Structural Correlation Based Method for Image Forgery Classification and Localization." Applied Sciences 10, no. 13 (June 28, 2020): 4458. http://dx.doi.org/10.3390/app10134458.

Full text
Abstract:
In the image forgery problems, previous works has been chiefly designed considering only one of two forgery types: copy-move and splicing. In this paper, we propose a scheme to handle both copy-move and splicing image forgery by concurrently classifying the image forgery types and localizing the forged regions. The structural correlations between images are employed in the forgery clustering algorithm to assemble relevant images into clusters. Then, we search for the matching of image regions inside each cluster to classify and localize tampered images. Comprehensive experiments are conducted on three datasets (MICC-600, GRIP, and CASIA 2) to demonstrate the better performance in forgery classification and localization of the proposed method in comparison with state-of-the-art methods. Further, in copy-move localization, the source and target regions are explicitly specified.
APA, Harvard, Vancouver, ISO, and other styles
6

Mallick, Devjani, Mantasha Shaikh, Anuja Gulhane, and Tabassum Maktum. "Copy Move and Splicing Image Forgery Detection using CNN." ITM Web of Conferences 44 (2022): 03052. http://dx.doi.org/10.1051/itmconf/20224403052.

Full text
Abstract:
The boom of digital images coupled with the development of approachable image manipulation software has made image tampering easier than ever. As a result, there is massive increase in number of forged or falsified images that represent incorrect or false information. Hence, the issue of image forgery has become a major concern and it must be addressed with appropriate solution. Throughout the years, various computer vision and deep learning solutions have emerged with a purpose to detect forgery in case of digital images. This paper presents a novel approach to detect copy move and splicing image forgery using a Convolutional Neural Network (CNN) with three different models i.e. ELA (Error Level Analysis), VGG16 and VGG19. The proposed method applies the pre-processing technique to obtain the images at a particular compression rate. These images are then utilized to train the model and further the images are classified as authentic or forged. The paper also presents the experimental results of the proposed method and performance evaluation in terms of accuracy.
APA, Harvard, Vancouver, ISO, and other styles
7

Qazi, Tanzeela, Mushtaq Ali, Khizar Hayat, and Baptiste Magnier. "Seamless Copy–Move Replication in Digital Images." Journal of Imaging 8, no. 3 (March 10, 2022): 69. http://dx.doi.org/10.3390/jimaging8030069.

Full text
Abstract:
The importance and relevance of digital-image forensics has attracted researchers to establish different techniques for creating and detecting forgeries. The core category in passive image forgery is copy–move image forgery that affects the originality of image by applying a different transformation. In this paper, a frequency-domain image-manipulation method is presented. The method exploits the localized nature of discrete wavelet transform (DWT) to attain the region of the host image to be manipulated. Both patch and host image are subjected to DWT at the same level l to obtain 3l+1 sub-bands, and each sub-band of the patch is pasted to the identified region in the corresponding sub-band of the host image. Resulting manipulated host sub-bands are then subjected to inverse DWT to obtain the final manipulated host image. The proposed method shows good resistance against detection by two frequency-domain forgery detection methods from the literature. The purpose of this research work is to create a forgery and highlight the need to produce forgery detection methods that are robust against malicious copy–move forgery.
APA, Harvard, Vancouver, ISO, and other styles
8

Gupta, Anil. "A New Copy Move Forgery Detection Technique using Adaptive Over-segementation and Feature Point Matching." Bulletin of Electrical Engineering and Informatics 7, no. 3 (September 1, 2018): 345–49. http://dx.doi.org/10.11591/eei.v7i3.754.

Full text
Abstract:
With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
APA, Harvard, Vancouver, ISO, and other styles
9

Prakash, Choudhary Shyam, and Sushila Maheshkar. "Copy-Move Forgery Detection Using DyWT." International Journal of Multimedia Data Engineering and Management 8, no. 2 (April 2017): 1–9. http://dx.doi.org/10.4018/ijmdem.2017040101.

Full text
Abstract:
In this paper, we proposed a passive method for copy-move region duplication detection using dyadic wavelet transform (DyWT). DyWT is better than discrete wavelet transform (DWT) for data analysis as it is shift invariant. Initially we decompose the input image into approximation (LL1) and detail (HH1) sub-bands. Then LL1 and HH1 sub-bands are divided into overlapping sub blocks and find the similarity between the blocks. In LL1 sub-band the copied and moved blocks have high similarity rate than the HH1 sub-band, this is just because, there is noise inconsistency in the moved blocks. Then we sort the LL1 sub-band blocks pair based on high similarity and in HH1 blocks are sorted based on high dissimilarity. Then we apply threshold to get the copied moved blocks. Here we also applied some post processing operations to check the robustness of our method and we get the satisfactory results to validate the copy move forgery detection.
APA, Harvard, Vancouver, ISO, and other styles
10

Fu, Guiwei, Yujin Zhang, and Yongqi Wang. "Image Copy-Move Forgery Detection Based on Fused Features and Density Clustering." Applied Sciences 13, no. 13 (June 26, 2023): 7528. http://dx.doi.org/10.3390/app13137528.

Full text
Abstract:
Image copy-move forgery is a common simple tampering technique. To address issues such as high time complexity in most copy-move forgery detection algorithms and difficulty detecting forgeries in smooth regions, this paper proposes an image copy-move forgery detection algorithm based on fused features and density clustering. Firstly, the algorithm combines two detection methods, speeded up robust features (SURF) and accelerated KAZE (A-KAZE), to extract descriptive features by setting a low contrast threshold. Then, the density-based spatial clustering of applications with noise (DBSCAN) algorithm removes mismatched pairs and reduces false positives. To improve the accuracy of forgery localization, the algorithm uses the original image and the image transformed by the affine matrix to compare similarities in the same position in order to locate the forged region. The proposed method was tested on two datasets (Ardizzone and CoMoFoD). The experimental results show that the method effectively improved the accuracy of forgery detection in smooth regions, reduced computational complexity, and exhibited strong robustness against post-processing operations such as rotation, scaling, and noise addition.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "COPY-MOVE FORGERY"

1

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Full text
Abstract:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Scale Invariant Feature Transform (DSIFT) has been improved by using a different method to estimate the canonical orientation of each circular block. The Fitting Function Rotation Invariant Descriptor (FFRID) has been developed by using the least squares method to fit the parameters of a quadratic function on each block curvatures. In the segmentation approach, three different methods were tested: the SLIC superpixels, the Bag of Words Image and the Rolling Guidance filter with the multi-thresholding method. We also developed the Segment Gradient Orientation Histogram (SGOH) to describe the gradient of irregularly shaped blocks (segments). The experimental results illustrate that our proposed algorithms can detect forgery in images containing copy-move objects with different types of transformation (translation, rotation, scaling, distortion and combined transformation). Moreover, the proposed methods are robust to post-processing (i.e. blurring, brightness change, colour reduction, JPEG compression, variations in contrast and added noise) and can detect multiple duplicated objects. In addition, we developed a new method to estimate the similarity threshold for each image by optimizing a cost function based probability distribution. This method can detect CMF better than using a fixed threshold for all the test images, because our proposed method reduces the false positive and the time required to estimate one threshold for different images in the dataset. Finally, we used the hysteresis to decrease the number of false matches and produce the best possible result.
APA, Harvard, Vancouver, ISO, and other styles
2

Bhatnagar, Kunal, and Gustav Ekner. "Copy-move Image Forgery Detection with Convolutional Neural Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302507.

Full text
Abstract:
Copy-move manipulation is a forgery method used on images where a small part is copied to another part. This thesis analyses the detection of copy-move forgeries with the help of Convolutional Neural Networks (CNN). The model used is utilizing an existing custom CNN layer to identify features useful for detecting manipulations. The model is trained and validated on data with different grades of manipulation to determine which combinations give the highest accuracy. The grades are determined by the copy-move size, ranging between 10% and 60% of the image size. The results show that training on images with more minor modifications generally gives better results than training on images with more considerable modifications, regardless of whether validated on small or large modified images. Also, it can be concluded that the particular convolutional layer, in general, is suitable for copy-move detection.
En copy-move manipulation är en förfalskningsmetod för bilder som går ut på att kopiera en liten del av en bild till en annan del. Den här rapporten analyserar detekteringen av copy-move-förfalskningar med hjälp av Convolutional Neural Networks (CNN). Modellen som används utnyttjar ett redan existerande CNN-lager skapat för att identifiera egenskaper i bilden användbara för detektering av bildmanipulation. Modellen är både tränad och validerad på data med olika grader av manipulation för att bestämma vilka kombinationer som ger högst träffsäkerhet. Skalan bestäms av storleken på copy-move-operationerna, med ett spann mellan 10% och 60% av bilden. Resultatet visar att träning med bilder med små modifikationer i allmänhet ger bättre resultat än att träna på bilder med större modifikationer, oavsett om valideringen skett på bilder av låg eller hög manipuleringsgrad. Det kan även konstateras att det särskilda CNN-lagret är lämpligt för detektering av copy-move-operationer.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yuan Man. "SIFT-based image copy-move forgery detection and its adversarial attacks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3952093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Ling-Ying, and 陳怜穎. "Pyramid Structure for Copy-Move Forgery Detection." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/27911697635315331597.

Full text
Abstract:
碩士
淡江大學
資訊工程學系碩士班
103
This paper solves the passive copy-move detection efficiently. A copy-move attack is defined as a region of an image being replaced by a copy of other region in the same image. The proposed scheme improves the performance on the assumption of the copy-move area being larger than a predefined block size. Test image is partitioned to non-overlapping segmented block according to previous predefined block size. Each comparison block, which is overlapped extracted from a segmented block, is compared with upper-left comparison block of all segmented block. Experimental results show that the computation time can be greatly reduced with the similar performance to other conventional schemes.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Ging-Chu, and 楊青矗. "Copy-Move Forgery Detection in Digital Image." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/7jw5nc.

Full text
Abstract:
碩士
佛光大學
資訊學系
97
Digital images are easy to be tempered and edited due to availability of image editing software. Generally, image tampering protection can be divided into two kinds: (1) active protection: The original digital image is embedded with a watermark which can be used to detect tampering. (2) passive protection: it does not need any digital watermark or signature but relies on the image processing technology to detect the forgery. Passive approaches have not yet been thoroughly researched. The most common ways to temper a digital image is copy-paste forgery which is used to conceal objects or produce a non-existing scene. To detect the copy-paste forgery, we divide the image into blocks as the basic feature for detection, and transfer every block to a feature vector with lower dimension for comparison. The number of blocks and dimension of characteristics are the major factor affecting the computation complexity. In this paper, we modify the previous methods by using less cumulative offsets for block matching. The experimental results show that our method can successfully detect the forgery part even when the forged image is saved in a lossy format such as JPEG. The performance of the proposed method is demonstrated on several forged images.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Han, and 王瀚. "Detecting Copy-Move Forgery Regions through Multi-Block Features." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/04495684675004787236.

Full text
Abstract:
碩士
淡江大學
資訊工程學系碩士班
104
This paper identifies copy-move forgery regions in an image through invariant features extracted from each block. First, an image is divided into overlapped blocks and 7 invariant moment features of the circle area under each block are calculated. Two features, mean and variance, are then acquired from the 7 moment features in each block. Each block is only compared to those blocks under the intersection of the same mean and variance feature sets. The copy-move forgery regions can be found by matching the detected blocks with the identical distance. Moreover, the adopted moment features are efficient on detecting rotational blocks. Experimental results show that the proposed scheme detects rotational duplicated regions well.
APA, Harvard, Vancouver, ISO, and other styles
7

Hao-ChiangHsu and 許豪江. "Detection of Copy-Move Forgery Image Using Gabor Descriptor." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/01528765039792755705.

Full text
Abstract:
碩士
國立成功大學
工程科學系碩博士班
100
With the advance of science and technology, images are easily accessible to everybody. It is also easy to be changed about the content. Images are usually as criminal evidences and news report. How to make sure if the content is not changed becomes a very important issue. In this research, the Gabor filter is mainly applied to get the features of the image under inspected. It is easy to get the rotation and/or scaling versions of the Gabor filter. An image is divided into overlapped sub-blocks with different block size. Each sub-block is convoluted with a proper Gabor filter with different rotation angle and scaling factor to get the called Gabor descriptor of the sub-block. These Gabor descriptors are conversed as the key point and feature vector of the sub-block. For comparing two sub-blocks, their Gabor descriptors are applied to find if there is any similarity between them. The proposed method not only can locate the duplicated regions precisely, but also estimate the rotation angle and scale factor of the inspected image. Experimental result shows that the proposed method can achieve high detection rate. It is also provided a good estimated rotation angle and scaling factor.
APA, Harvard, Vancouver, ISO, and other styles
8

D'Amiano, Luca. "A new technique for video copy-move forgery detection." Tesi di dottorato, 2017. http://www.fedoa.unina.it/12254/1/DAmiano_Luca_XXX.pdf.

Full text
Abstract:
This thesis describes an algorithm for detecting copy-move falsifications in digital video. The thesis is composed of 5 chapters. In the first chapter there is an introduction to forgery detection for digital images and videos. Chapters 2, 3 and 4 describe in detail the techniques used for the implementation of the detection algorithm. The experimental results are presented in the fifth and last chapter.
APA, Harvard, Vancouver, ISO, and other styles
9

DEEPAK. "A SUPER-SIFT APPROACH FOR COPY-MOVE FORGERY DETECTION." Thesis, 2017. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15910.

Full text
Abstract:
Today’s technological era is described by the outspread of digital images. They are the most ordinary formation of conveying information whether through newspapers, internet, books, magazine, scientific journals or social media. They are used as a powerful proof against various crimes, frauds and as an evidence in various situations. With the evolution of image processing in past few years and many other image editing software, capturing, creating or altering images according to our perspective has become very simple and available. There are several kinds of image tampering like copy-move forgery, image enhancement, image splicing, image morphing, image retouching whereas copy-move forgery is the most frequent and trendy manipulation of digital images. In copy move forgery here, a part of particular image is copied and then pasted into that same image with the motive of veiling some important object or displaying a fictitious scenario. Because the duplicate or in other terms the copied portion comes from the same image, All the image properties like texture, noise, resolution, brightness, contrast will be suited with the original portion of the image making it more difficult for the experts to distinguish and detect the alteration. There are mostly two kinds of forgery detection techniques one is block based method and the other is based on key points. In past few years feature based approach like SIFT gain attention of researchers in the field of image forgery detection. I proposed a SUPER-SIFT method for copy move forgery detection. This work improves the fundamental concept of SIFT algorithm which is Feature Extraction. We use SISR for improving the quality of image. The proposed work consist of three main tasks, firstly we preprocess the input image with SISR algorithm to get a high resolution image. Then on high resolution image we apply SIFT algorithm for keypoint detection. After that we apply a fast potential based hierarchical agglomerative clustering method on the output of previous step to filter out the false matches and to groups the key points that have the same affine transform. On the basis of number of key points in a particular cluster, it can be said that the image having forgery or not. The experimental outcome shows that the proposed approach for the detection of copy-move forgery is efficient and powerful even when the copied portion undergoes various transformations like rotation, shearing, scaling or other post processing like adding noise and blurring.
APA, Harvard, Vancouver, ISO, and other styles
10

Chou, Chih-Hung, and 周志鴻. "Robustness of Copy-Move Forgery Detection Against JPEG Compression Artifacts." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/96109216455528448807.

Full text
Abstract:
碩士
大葉大學
電機工程學系
102
In recent years, the popularity of digital cameras, smart phones and tablet computers has made the acquisition of digital images become easier. In addition, modern photo-editing software package such as Photoshop and PhotoImpact makes it relatively simple to create digital image forgeries, on which people almost cannot perceive the difference between the original image and its tampered version. The most common approach used to create a digital image forgery is the so-called copy-move method, which copies a specific block of image and then pastes it into another region in the same image to achieve information hiding. Most forgery images are delivered over internet to achieve information hiding for confusing the publics. Usually, digital images are compressed to some extent to save bandwidth prior to delivery. Compression inevitably destroys the feature such as gray intensity of that image and makes copy-move forgery detection becomes difficult. Therefore, keeping stable detection rate under different compression ratios is the major purpose of this study. In this paper, three different feature extraction methods, namely the principal component analysis (PCA), singular value decomposition (SVD) and Fourier transform method (FFT), are used to capture the feature of “variance” of scanning blocks. The Euclidean distance is adopted to match the original and duplicated blocks. Finally, the offset of block coordinates are counted and output the matching points greater than the preset threshold. In this thesis, we chose five real world images to test the robustness of the proposed method. Experimental results show that 100% accuracy rate and 1% or less false detection rate can be achieved for uncompressed images. Moreover, the proposed method can achieve 99% accuracy rate with less than 7% false detection rate even if the compression factor is as low as 20%.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "COPY-MOVE FORGERY"

1

Soni, Badal, and Pradip K. Das. Image Copy-Move Forgery Detection. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

J, Indumathi. State-of-The-Art in Block based Copy Move Forgery Detection: ICCS 2014. Edited by Kokula Krishna Hari K. Bangkok, Thailand: Association of Scientists, Developers and Faculties, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Pradip K., and Badal Soni. Image Copy-Move Forgery Detection: New Tools and Techniques. Springer Singapore Pte. Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "COPY-MOVE FORGERY"

1

Soni, Badal, and Pradip K. Das. "Oriented FAST Rotated BRIEF and Trie-Based Efficient Copy-Move Forgery Detection Algorithm." In Image Copy-Move Forgery Detection, 101–29. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Soni, Badal, and Pradip K. Das. "Summing Up." In Image Copy-Move Forgery Detection, 131–33. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soni, Badal, and Pradip K. Das. "Key-Points Based Enhanced CMFD System Using DBSCAN Clustering Algorithm." In Image Copy-Move Forgery Detection, 69–83. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Soni, Badal, and Pradip K. Das. "Copy-Move Forgery Detection Using Local Binary Pattern Histogram Fourier Features." In Image Copy-Move Forgery Detection, 33–42. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Soni, Badal, and Pradip K. Das. "Blur Invariant Block-Based CMFD System Using FWHT Features." In Image Copy-Move Forgery Detection, 43–50. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Soni, Badal, and Pradip K. Das. "Introduction." In Image Copy-Move Forgery Detection, 1–10. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Soni, Badal, and Pradip K. Das. "Geometric Transformation Invariant Improved Block-Based Copy-Move Forgery Detection." In Image Copy-Move Forgery Detection, 51–67. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Soni, Badal, and Pradip K. Das. "Background Study and Analysis." In Image Copy-Move Forgery Detection, 11–31. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Soni, Badal, and Pradip K. Das. "Image Copy-Move Forgery Detection Using Deep Convolutional Neural Networks." In Image Copy-Move Forgery Detection, 85–99. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9041-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kharanghar, Monika, and Amit Doegar. "Copy-Move Forgery Detection Methods: A Critique." In Advances in Information Communication Technology and Computing, 501–23. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5421-6_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "COPY-MOVE FORGERY"

1

Patankar, A. B., A. Sukhpal, S. Shetye, and A. ShroffShroff. "Copy move forgery detection." In International Conference & Workshop on Electronics & Telecommunication Engineering (ICWET 2016). Institution of Engineering and Technology, 2016. http://dx.doi.org/10.1049/cp.2016.1145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jaafar, Roqaya Hamad, Zahraa H. Rasool, and Abbas H. Hassin Alasadi. "New Copy-Move Forgery Detection Algorithm." In 2019 International Russian Automation Conference. IEEE, 2019. http://dx.doi.org/10.1109/rusautocon.2019.8867813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhavya Bhanu M P and Arun Kumar M N. "Copy-move forgery detection using segmentation." In 2017 11th International Conference on Intelligent Systems and Control (ISCO). IEEE, 2017. http://dx.doi.org/10.1109/isco.2017.7855986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karsh, Ram Kumar, Anurag Das, G. Lavanya Swetha, Abhishek Medhi, Rabul Hussain Laskar, Utkarsh Arya, and Rohit Kumar Agarwal. "Copy-move forgery detection using ASIFT." In 2016 1st India International Conference on Information Processing (IICIP). IEEE, 2016. http://dx.doi.org/10.1109/iicip.2016.7975329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kang, Li, and Xiao-ping Cheng. "Copy-move forgery detection in digital image." In 2010 3rd International Congress on Image and Signal Processing (CISP). IEEE, 2010. http://dx.doi.org/10.1109/cisp.2010.5648249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gurbuz, Emre, Guzin Ulutas, and Mustafa Ulutas. "Rotation invariant copy move forgery detection method." In 2015 9th International Conference on Electrical and Electronics Engineering (ELECO). IEEE, 2015. http://dx.doi.org/10.1109/eleco.2015.7394451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pandey, Ramesh Chand, Sanjay Kumar Singh, and K. K. Shukla. "Passive copy-move forgery detection in videos." In 2014 International Conference on Computer and Communication Technology (ICCCT). IEEE, 2014. http://dx.doi.org/10.1109/iccct.2014.7001509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Turk, Salih, Ozkan Bingol, and Guzin Ulutas. "Detection of copy-move forgery using DoGCode." In 2015 23th Signal Processing and Communications Applications Conference (SIU). IEEE, 2015. http://dx.doi.org/10.1109/siu.2015.7130356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Hieu Cuong, and Stefan Katzenbeisser. "Security of copy-move forgery detection techniques." In ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2011. http://dx.doi.org/10.1109/icassp.2011.5946869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ulutas, G., M. Ulutas, and V. V. Nabiyev. "Copy move forgery detection based on LBP." In 2013 21st Signal Processing and Communications Applications Conference (SIU). IEEE, 2013. http://dx.doi.org/10.1109/siu.2013.6531569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography