Results 21 to 30 of about 27,957 (184)

Copy Move and Splicing Image Forgery Detection using CNN [PDF]

open access: yesITM Web of Conferences, 2022
The boom of digital images coupled with the development of approachable image manipulation software has made image tampering easier than ever. As a result, there is massive increase in number of forged or falsified images that represent incorrect or ...
Mallick Devjani   +3 more
doaj   +1 more source

The detection of copy move forgery image methodologies

open access: yesMeasurement: Sensors, 2023
In every area that uses digital photos, image security is a major concern. Photos of suspects, crime scene photos, biometric photographs, and other images have long been used in forensic investigations and public safety.
Shahad Lateef abdulwahid
doaj   +1 more source

Copy move forgery detection using key point localized super pixel based on texture features [PDF]

open access: yesКомпьютерная оптика, 2019
The most important barrier in the image forensic is to ensue a forgery detection method such can detect the copied region which sustains rotation, scaling reflection, compressing or all.
C. Rajalakshmi   +2 more
doaj   +1 more source

Copy-move forgery detection using binary discriminant features

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Digital images have numerous applications in various fields such as cyber forensics, courts, newspapers, magazines, medical field and many more. Therefore, the trustfulness of the contents of an image is very essential. Image manipulation has become very
Priya Mariam Raju, Madhu S. Nair
doaj   +1 more source

Fusion of block and keypoints based approaches for effective copy-move image forgery detection [PDF]

open access: yes, 2016
Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large
Liu, Yanan   +5 more
core   +1 more source

Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers

open access: yesBig Data Mining and Analytics, 2023
Passive image forgery detection methods that identify forgeries without prior knowledge have become a key research focus. In copy-move forgery, the assailant intends to hide a portion of an image by pasting other portions of the same image. The detection
S. B. G. Tilak Babu, Ch Srinivasa Rao
doaj   +1 more source

Copy-Move Forgery Detection by Matching Triangles of Keypoints [PDF]

open access: yes, 2015
Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones,
ARDIZZONE, Edoardo   +2 more
core   +1 more source

Detection of Geometric Transformations in Copy-Move Forgery of Digital Images [PDF]

open access: yes, 2015
Digital Forensics is a branch of forensic science which is related to cyber crime. It basically involves the detection, recovery and investigation of material found in digital devices.
Shandilya, Meenal
core   +1 more source

Combining cellular automata and local binary patterns for copy-move forgery detection [PDF]

open access: yes, 2016
Detection of duplicated regions in digital images has been a highly investigated field in recent years since the editing of digital images has been notably simplified by the development of advanced image processing tools.
Faculty of Electrical Engineering and Computing, University of Zagreb   +5 more
core   +1 more source

Fast copy-move forgery detection algorithm based on group SIFT

open access: yesTongxin xuebao, 2020
Aiming at the high computational complexity of the existing copy-move image forgery detection algorithm,a copy-move forgery detection algorithm based on group scale-invariant feature transform (SIFT) was proposed.Firstly,the simple linear iterative ...
Bin XIAO   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy