Fusion of block and keypoints based approaches for effective copy-move image forgery detection
Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handl...
Saved in:
Published in | Multidimensional systems and signal processing Vol. 27; no. 4; pp. 989 - 1005 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.10.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handle geometric transformations. On the contrary, keypoint-based approaches can overcome these two drawbacks yet are found difficult to deal with smooth regions. As a result, fusion of these two approaches is proposed for effective copy-move forgery detection. First, our scheme adaptively determines an appropriate initial size of regions to segment the image into non-overlapped regions. Feature points are extracted as keypoints using the scale invariant feature transform (SIFT) from the image. The ratio between the number of keypoints and the total number of pixels in that region is used to classify the region into smooth or non-smooth (keypoints) regions. Accordingly, block based approach using Zernike moments and keypoint based approach using SIFT along with filtering and post-processing are respectively applied to these two kinds of regions for effective forgery detection. Experimental results show that the proposed fusion scheme outperforms the keypoint-based method in reliability of detection and the block-based method in efficiency. |
---|---|
AbstractList | Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handle geometric transformations. On the contrary, keypoint-based approaches can overcome these two drawbacks yet are found difficult to deal with smooth regions. As a result, fusion of these two approaches is proposed for effective copy-move forgery detection. First, our scheme adaptively determines an appropriate initial size of regions to segment the image into non-overlapped regions. Feature points are extracted as keypoints using the scale invariant feature transform (SIFT) from the image. The ratio between the number of keypoints and the total number of pixels in that region is used to classify the region into smooth or non-smooth (keypoints) regions. Accordingly, block based approach using Zernike moments and keypoint based approach using SIFT along with filtering and post-processing are respectively applied to these two kinds of regions for effective forgery detection. Experimental results show that the proposed fusion scheme outperforms the keypoint-based method in reliability of detection and the block-based method in efficiency. |
Author | Yang, Heng Ren, Jinchang Yan, Yijun Zheng, Jiangbin Liu, Yanan Zhu, Tingge |
Author_xml | – sequence: 1 givenname: Jiangbin surname: Zheng fullname: Zheng, Jiangbin organization: Department of Computer Science and Engineering, School of Computers, Northwestern Polytechnical University – sequence: 2 givenname: Yanan surname: Liu fullname: Liu, Yanan organization: Department of Computer Science and Engineering, School of Computers, Northwestern Polytechnical University – sequence: 3 givenname: Jinchang surname: Ren fullname: Ren, Jinchang email: jincang.ren@strath.ac.uk organization: Department of Electronic and Electrical Engineering, University of Strathclyde – sequence: 4 givenname: Tingge surname: Zhu fullname: Zhu, Tingge organization: Department of Computer Science and Engineering, School of Computers, Northwestern Polytechnical University – sequence: 5 givenname: Yijun surname: Yan fullname: Yan, Yijun organization: Department of Electronic and Electrical Engineering, University of Strathclyde – sequence: 6 givenname: Heng surname: Yang fullname: Yang, Heng organization: Xi’an Communications Institute |
BookMark | eNp9kMtOwzAQRS1UJNrCB7DzDxg8eTjJElUUkCqxgS2W7YxL-rAjO0XK3-OorFh0Y9-x54zm3gWZOe-QkHvgD8B59RgBeFEyDoLxIh1wReZQVjnjdVbMyJw3Wc5EKm7IIsYd54kCMSdf61PsvKPeUn3wZk-Va-kex953bohUq4gtVX0fvDLfGKn1gaK1aIbuB6nx_ciOPqnuqLY4_W4xjLTFYerw7pZcW3WIePd3L8nn-vlj9co27y9vq6cNM1ldD6wtWtXoDBvQZaWE4KLWGoQ2pkhal7ZSUEFVGp5hpkRd2rzWgCK9NVbXbb4k1XmuCT7GgFaablDTBkNQ3UECl1NM8hyTTNblFJOERMI_sg_JTBgvMtmZianXJcdy50_BJYMXoF8Ccn1c |
CitedBy_id | crossref_primary_10_1007_s11042_020_09816_3 crossref_primary_10_1186_s13640_019_0469_9 crossref_primary_10_1007_s11045_019_00688_x crossref_primary_10_1007_s11277_024_10996_6 crossref_primary_10_3233_JIFS_191700 crossref_primary_10_1016_j_ipm_2021_102783 crossref_primary_10_1371_journal_pone_0221627 crossref_primary_10_1016_j_jisa_2019_01_002 crossref_primary_10_1080_00450618_2018_1424241 crossref_primary_10_1016_j_jisa_2019_01_007 crossref_primary_10_1016_j_jvcir_2020_102966 crossref_primary_10_1049_iet_ipr_2018_5576 crossref_primary_10_1007_s11277_024_10959_x crossref_primary_10_1007_s11042_019_07817_5 crossref_primary_10_1007_s42001_024_00265_8 crossref_primary_10_1007_s11042_022_12010_2 crossref_primary_10_1007_s13042_024_02268_3 crossref_primary_10_1016_j_neucom_2022_09_017 crossref_primary_10_3390_sym11010083 crossref_primary_10_1007_s00530_021_00873_8 crossref_primary_10_1080_00450618_2023_2270575 crossref_primary_10_1007_s11045_016_0441_0 crossref_primary_10_1016_j_patcog_2018_03_028 crossref_primary_10_1007_s10489_022_04104_z crossref_primary_10_1142_S0219467821500546 crossref_primary_10_1007_s00500_017_2694_4 crossref_primary_10_1016_j_procs_2024_04_319 crossref_primary_10_1049_iet_ipr_2017_0441 crossref_primary_10_3390_app10134458 crossref_primary_10_1016_j_ins_2019_09_085 crossref_primary_10_1109_ACCESS_2023_3304237 crossref_primary_10_1007_s11042_024_18399_2 crossref_primary_10_1007_s11042_016_4201_9 crossref_primary_10_1109_ACCESS_2020_2974804 crossref_primary_10_3103_S1060992X22010052 crossref_primary_10_1109_TIFS_2019_2957693 crossref_primary_10_36548_jiip_2022_4_001 crossref_primary_10_1007_s11042_018_6354_1 crossref_primary_10_1007_s11042_023_15506_7 crossref_primary_10_1142_S0219467823500250 crossref_primary_10_1007_s11042_023_17950_x crossref_primary_10_1016_j_neunet_2019_03_015 crossref_primary_10_1016_j_ins_2018_06_040 crossref_primary_10_1007_s11042_022_12755_w crossref_primary_10_1007_s12530_021_09367_4 crossref_primary_10_1007_s13198_022_01829_5 |
Cites_doi | 10.1109/TIP.2009.2039056 10.3724/SP.J.1004.2009.01488 10.1109/LGRS.2014.2312754 10.1016/j.forsciint.2006.11.002 10.1109/34.3913 10.1109/TIFS.2011.2129512 10.1109/78.157290 10.1016/j.forsciint.2012.10.031 10.1109/TIFS.2013.2272377 10.1109/TIFS.2014.2381872 10.1109/MSP.2014.2312071 10.4304/jmm.7.1.90-97 10.1080/01431161.2013.845924 10.1109/TPAMI.2012.120 10.1109/TGRS.2015.2393857 10.1145/358669.358692 10.1109/34.55109 10.1109/TBC.2011.2158252 10.1109/TGRS.2014.2374218 10.1109/TCSVT.2014.2381471 10.1109/TIFS.2014.2377671 10.1016/j.isprsjprs.2014.10.002 10.1109/TIFS.2012.2218597 10.1109/PACIIA.2008.240 10.12785/ijcds/040203 10.1109/MINES.2010.189 10.1145/1873951.1874249 10.1109/TIP.2010.2046599 10.1023/B:VISI.0000029664.99615.94 10.1109/CGIV.2011.29 10.1109/RIVF.2015.7049877 10.1109/ICCV.1999.790410 10.1109/ICASSP.2009.4959768 10.1109/CSSE.2008.876 10.1007/978-3-642-16435-4_5 10.1142/9789812836243_0015 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media New York 2016 |
Copyright_xml | – notice: Springer Science+Business Media New York 2016 |
DBID | AAYXX CITATION |
DOI | 10.1007/s11045-016-0416-1 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1573-0824 |
EndPage | 1005 |
ExternalDocumentID | 10_1007_s11045_016_0416_1 |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 29~ 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCEE ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9P PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RNI RNS ROL RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCV SDH SDM SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z83 Z88 Z8M Z8R Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION |
ID | FETCH-LOGICAL-c288t-d4da9b2e91b57a66068bb16bcc4606b5f7a17175c02e2a685f38b1e67179fb8d3 |
IEDL.DBID | U2A |
ISSN | 0923-6082 |
IngestDate | Tue Jul 01 02:06:51 EDT 2025 Thu Apr 24 23:01:02 EDT 2025 Fri Feb 21 02:37:54 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | Zernike moments Image forensics Copy-move image forgery detection SIFT Adaptive fusion |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c288t-d4da9b2e91b57a66068bb16bcc4606b5f7a17175c02e2a685f38b1e67179fb8d3 |
PageCount | 17 |
ParticipantIDs | crossref_citationtrail_10_1007_s11045_016_0416_1 crossref_primary_10_1007_s11045_016_0416_1 springer_journals_10_1007_s11045_016_0416_1 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20161000 2016-10-00 |
PublicationDateYYYYMMDD | 2016-10-01 |
PublicationDate_xml | – month: 10 year: 2016 text: 20161000 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationSubtitle | An International Journal |
PublicationTitle | Multidimensional systems and signal processing |
PublicationTitleAbbrev | Multidim Syst Sign Process |
PublicationYear | 2016 |
Publisher | Springer US |
Publisher_xml | – name: Springer US |
References | Ren, Jiang, Vlachos (CR34) 2010; 19 Cheng, Han, Zhou, Guo (CR9) 2014; 98 Christlein, Riess, Jordan, Riess, Angelopoulou (CR10) 2012; 7 CR19 CR16 CR38 CR15 Lin, Wang, Kao (CR25) 2009; 5 CR36 CR12 CR32 Jing, Shao (CR18) 2012; 7 CR31 CR30 Cheng, Han, Guo, Liu, Bu, Ren (CR8) 2015; 53 Han, Zhang, Hu, Guo, Ren, Wu (CR14) 2015; 25 Li (CR22) 2013; 224 Pun, Yuan, Bi (CR33) 2015; 10 Mahdian, Saic (CR29) 2007; 171 Wang, Liu, Zhang, Dai, Wang (CR43) 2009; 35 Li, Li, Yang, Sun (CR23) 2015; 10 Teh, Chin (CR40) 1988; 10 CR4 Ren, Zabalza, Marshall, Zheng (CR35) 2014; 31 CR5 Li, Li, Zhu, Chu, Roddick, Pan (CR24) 2013; 4 Jiang, Kohler, Macwilliams, Zaletelj, Guntner, Horstmann (CR17) 2011; 57 Zhao, Li, Ren, Marshall (CR46) 2013; 34 CR7 Fischler, Bolles (CR11) 1981; 24 CR28 CR27 Amerini, Ballan, Caldelli, Del Bimbo, Del Tongo, Serra (CR3) 2013; 28 CR26 Khotanzad, Hong (CR20) 1990; 12 Ryu, Kirchner, Lee, Lee (CR37) 2013; 8 Han, Zhang, Cheng, Guo, Ren (CR13) 2015; 53 CR21 CR42 CR41 Amerini, Ballan, Caldelli, Del Bimbo, Serra (CR2) 2011; 6 Shensa (CR39) 1992; 40 Zahra (CR45) 2012; 1 Achanta, Shaji, Smith, Lucchi, Fua, Susstrunk (CR1) 2012; 34 Bilmes (CR6) 1998; 4 Zabalza, Ren, Wang, Marshall, Wang (CR44) 2014; 11 A Khotanzad (416_CR20) 1990; 12 G Cheng (416_CR9) 2014; 98 416_CR7 416_CR5 M Zahra (416_CR45) 2012; 1 J Li (416_CR23) 2015; 10 L Li (416_CR24) 2013; 4 G Cheng (416_CR8) 2015; 53 416_CR27 C Zhao (416_CR46) 2013; 34 416_CR28 416_CR26 416_CR21 L Jing (416_CR18) 2012; 7 J Jiang (416_CR17) 2011; 57 416_CR41 416_CR42 H-J Lin (416_CR25) 2009; 5 J Han (416_CR14) 2015; 25 J Han (416_CR13) 2015; 53 S-J Ryu (416_CR37) 2013; 8 M Shensa (416_CR39) 1992; 40 R Achanta (416_CR1) 2012; 34 V Christlein (416_CR10) 2012; 7 C-H Teh (416_CR40) 1988; 10 J Ren (416_CR34) 2010; 19 MA Fischler (416_CR11) 1981; 24 I Amerini (416_CR2) 2011; 6 416_CR19 416_CR16 Y Li (416_CR22) 2013; 224 416_CR38 416_CR36 416_CR15 JA Bilmes (416_CR6) 1998; 4 416_CR12 I Amerini (416_CR3) 2013; 28 416_CR4 CM Pun (416_CR33) 2015; 10 416_CR32 J Ren (416_CR35) 2014; 31 416_CR30 J Zabalza (416_CR44) 2014; 11 416_CR31 J Wang (416_CR43) 2009; 35 B Mahdian (416_CR29) 2007; 171 |
References_xml | – volume: 19 start-page: 1379 issue: 5 year: 2010 end-page: 1384 ident: CR34 article-title: High-accuracy sub-pixel motion estimation from noisy images in Fourier domain publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2009.2039056 – volume: 35 start-page: 1488 issue: 12 year: 2009 end-page: 1495 ident: CR43 article-title: Fast and robust forensics for image region-duplication forgery publication-title: Acta Automatica Sinica doi: 10.3724/SP.J.1004.2009.01488 – ident: CR4 – ident: CR16 – ident: CR12 – ident: CR30 – volume: 11 start-page: 1886 issue: 11 year: 2014 end-page: 1890 ident: CR44 article-title: Singular spectrum analysis for effective feature extraction in hyperspectral imaging publication-title: IEEE Geoscience and Remote Sensing Letters doi: 10.1109/LGRS.2014.2312754 – volume: 171 start-page: 180 issue: 2 year: 2007 end-page: 189 ident: CR29 article-title: Detection of copy-move forgery using a method based on blur moment invariants publication-title: Forensic Science International doi: 10.1016/j.forsciint.2006.11.002 – volume: 10 start-page: 496 issue: 4 year: 1988 end-page: 513 ident: CR40 article-title: On image analysis by the methods of moments publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/34.3913 – volume: 6 start-page: 1099 issue: 3 year: 2011 end-page: 1110 ident: CR2 article-title: A sift-based forensic method for copy-move attack detection and transformation recovery publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2129512 – volume: 40 start-page: 2464 issue: 10 year: 1992 end-page: 2482 ident: CR39 article-title: Discrete wavelet transform: Wedding the a trous and Mallat algorithms publication-title: IEEE Transactions on Signal Processing doi: 10.1109/78.157290 – volume: 4 start-page: 126 issue: 510 year: 1998 ident: CR6 article-title: A gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models publication-title: International Computer Science Institute – volume: 224 start-page: 59 issue: 1 year: 2013 end-page: 67 ident: CR22 article-title: Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching publication-title: Forensic Science International doi: 10.1016/j.forsciint.2012.10.031 – volume: 8 start-page: 1355 issue: 8 year: 2013 end-page: 1370 ident: CR37 article-title: Rotation invariant localization of duplicated image regions based on Zernike moments publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2013.2272377 – volume: 10 start-page: 507 issue: 3 year: 2015 end-page: 518 ident: CR23 article-title: Segmentation-based image copy-move forgery detection scheme publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2014.2381872 – ident: CR27 – ident: CR42 – volume: 31 start-page: 149 issue: 31 year: 2014 end-page: 154 ident: CR35 article-title: Effective feature extraction and data reduction in remote sensing using hyperspectral imaging [Applications Corner] publication-title: IEEE Signal Processing Magazine doi: 10.1109/MSP.2014.2312071 – ident: CR21 – ident: CR19 – volume: 7 start-page: 90 issue: 1 year: 2012 end-page: 97 ident: CR18 article-title: Image copy-move forgery detecting based on local invariant feature publication-title: Journal of Multimedia doi: 10.4304/jmm.7.1.90-97 – volume: 34 start-page: 8669 issue: 24 year: 2013 end-page: 8684 ident: CR46 article-title: Improved sparse representation using adaptive spatial support for effective target detection in hyperspectral imagery publication-title: International Journal of Remote Sensing doi: 10.1080/01431161.2013.845924 – volume: 34 start-page: 2274 issue: 11 year: 2012 end-page: 2282 ident: CR1 article-title: SLIC superpixels compared to state-of-the-art superpixel methods publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/TPAMI.2012.120 – volume: 53 start-page: 4238 issue: 8 year: 2015 end-page: 4249 ident: CR8 article-title: Effective and efficient midlevel visual elements-oriented land-use classification using VHR remote sensing images publication-title: IEEE Transactions on Geoscience and Remote Sensing doi: 10.1109/TGRS.2015.2393857 – ident: CR15 – ident: CR38 – volume: 24 start-page: 381 issue: 6 year: 1981 end-page: 395 ident: CR11 article-title: Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography publication-title: Communications of the ACM doi: 10.1145/358669.358692 – volume: 12 start-page: 489 issue: 5 year: 1990 end-page: 497 ident: CR20 article-title: Invariant image recognition by Zernike moments publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/34.55109 – ident: CR31 – volume: 57 start-page: 646 issue: 3 year: 2011 end-page: 661 ident: CR17 article-title: LIVE: An integrated production and feedback system for intelligent and interactive TV broadcasting publication-title: IEEE Transactions on Broadcasting doi: 10.1109/TBC.2011.2158252 – volume: 53 start-page: 3325 issue: 6 year: 2015 end-page: 3337 ident: CR13 article-title: Object detection in optical remote sensing images based on weakly supervised learning and high-level feature learning publication-title: IEEE Transactions on Geoscience and Remote Sensing doi: 10.1109/TGRS.2014.2374218 – volume: 25 start-page: 1309 issue: 8 year: 2015 end-page: 1321 ident: CR14 article-title: Background prior-based salient object detection via deep reconstruction residual publication-title: IEEE Transactions on Circuits and Systems for Video Technology doi: 10.1109/TCSVT.2014.2381471 – volume: 28 start-page: 659 issue: 6 year: 2013 end-page: 669 ident: CR3 article-title: Copy-move forgery detection and localization by means of robust clustering with J-Linkage publication-title: Signal Processing: Image Communication – ident: CR32 – volume: 5 start-page: 188 issue: 5 year: 2009 end-page: 197 ident: CR25 article-title: Fast copy-move forgery detection publication-title: WSEAS Transactions on Signal Processing – ident: CR36 – ident: CR5 – volume: 10 start-page: 1 year: 2015 end-page: 1 ident: CR33 article-title: Image forgery detection using adaptive over-segmentation and feature points matching publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2014.2377671 – ident: CR7 – volume: 1 start-page: 1 issue: 12 year: 2012 end-page: 6 ident: CR45 article-title: Image duplication forgery detection using two robust features publication-title: Research Journal of Recent Sciences – volume: 98 start-page: 119 issue: 1 year: 2014 end-page: 132 ident: CR9 article-title: Multi-class geospatial object detection and geographic image classification based on collection of part detectors publication-title: Isprs Journal of Photogrammetry and Remote Sensing doi: 10.1016/j.isprsjprs.2014.10.002 – volume: 4 start-page: 46 year: 2013 end-page: 56 ident: CR24 article-title: An efficient scheme for detecting copy-move forged images by local binary patterns publication-title: Journal of Information Hiding and Multimedia Signal Processing – ident: CR28 – ident: CR41 – ident: CR26 – volume: 7 start-page: 1841 issue: 6 year: 2012 end-page: 1854 ident: CR10 article-title: An evaluation of popular copy-move forgery detection approaches publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2012.2218597 – volume: 28 start-page: 659 issue: 6 year: 2013 ident: 416_CR3 publication-title: Signal Processing: Image Communication – volume: 34 start-page: 8669 issue: 24 year: 2013 ident: 416_CR46 publication-title: International Journal of Remote Sensing doi: 10.1080/01431161.2013.845924 – volume: 25 start-page: 1309 issue: 8 year: 2015 ident: 416_CR14 publication-title: IEEE Transactions on Circuits and Systems for Video Technology doi: 10.1109/TCSVT.2014.2381471 – ident: 416_CR15 doi: 10.1109/PACIIA.2008.240 – volume: 10 start-page: 496 issue: 4 year: 1988 ident: 416_CR40 publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/34.3913 – volume: 8 start-page: 1355 issue: 8 year: 2013 ident: 416_CR37 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2013.2272377 – volume: 53 start-page: 4238 issue: 8 year: 2015 ident: 416_CR8 publication-title: IEEE Transactions on Geoscience and Remote Sensing doi: 10.1109/TGRS.2015.2393857 – volume: 53 start-page: 3325 issue: 6 year: 2015 ident: 416_CR13 publication-title: IEEE Transactions on Geoscience and Remote Sensing doi: 10.1109/TGRS.2014.2374218 – volume: 19 start-page: 1379 issue: 5 year: 2010 ident: 416_CR34 publication-title: IEEE Transactions on Image Processing doi: 10.1109/TIP.2009.2039056 – volume: 1 start-page: 1 issue: 12 year: 2012 ident: 416_CR45 publication-title: Research Journal of Recent Sciences – volume: 24 start-page: 381 issue: 6 year: 1981 ident: 416_CR11 publication-title: Communications of the ACM doi: 10.1145/358669.358692 – volume: 10 start-page: 1 year: 2015 ident: 416_CR33 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2014.2377671 – volume: 171 start-page: 180 issue: 2 year: 2007 ident: 416_CR29 publication-title: Forensic Science International doi: 10.1016/j.forsciint.2006.11.002 – volume: 34 start-page: 2274 issue: 11 year: 2012 ident: 416_CR1 publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/TPAMI.2012.120 – volume: 11 start-page: 1886 issue: 11 year: 2014 ident: 416_CR44 publication-title: IEEE Geoscience and Remote Sensing Letters doi: 10.1109/LGRS.2014.2312754 – volume: 57 start-page: 646 issue: 3 year: 2011 ident: 416_CR17 publication-title: IEEE Transactions on Broadcasting doi: 10.1109/TBC.2011.2158252 – volume: 12 start-page: 489 issue: 5 year: 1990 ident: 416_CR20 publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/34.55109 – volume: 5 start-page: 188 issue: 5 year: 2009 ident: 416_CR25 publication-title: WSEAS Transactions on Signal Processing – ident: 416_CR21 doi: 10.12785/ijcds/040203 – ident: 416_CR7 doi: 10.1109/MINES.2010.189 – ident: 416_CR42 doi: 10.1145/1873951.1874249 – volume: 4 start-page: 46 year: 2013 ident: 416_CR24 publication-title: Journal of Information Hiding and Multimedia Signal Processing – ident: 416_CR32 – ident: 416_CR4 doi: 10.1109/TIP.2010.2046599 – ident: 416_CR27 doi: 10.1023/B:VISI.0000029664.99615.94 – ident: 416_CR30 doi: 10.1109/CGIV.2011.29 – ident: 416_CR16 doi: 10.1109/RIVF.2015.7049877 – volume: 6 start-page: 1099 issue: 3 year: 2011 ident: 416_CR2 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2129512 – ident: 416_CR28 – volume: 98 start-page: 119 issue: 1 year: 2014 ident: 416_CR9 publication-title: Isprs Journal of Photogrammetry and Remote Sensing doi: 10.1016/j.isprsjprs.2014.10.002 – volume: 7 start-page: 1841 issue: 6 year: 2012 ident: 416_CR10 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2012.2218597 – ident: 416_CR26 doi: 10.1109/ICCV.1999.790410 – volume: 10 start-page: 507 issue: 3 year: 2015 ident: 416_CR23 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2014.2381872 – ident: 416_CR12 – volume: 31 start-page: 149 issue: 31 year: 2014 ident: 416_CR35 publication-title: IEEE Signal Processing Magazine doi: 10.1109/MSP.2014.2312071 – volume: 40 start-page: 2464 issue: 10 year: 1992 ident: 416_CR39 publication-title: IEEE Transactions on Signal Processing doi: 10.1109/78.157290 – ident: 416_CR41 – volume: 35 start-page: 1488 issue: 12 year: 2009 ident: 416_CR43 publication-title: Acta Automatica Sinica doi: 10.3724/SP.J.1004.2009.01488 – ident: 416_CR5 doi: 10.1109/ICASSP.2009.4959768 – ident: 416_CR31 – volume: 4 start-page: 126 issue: 510 year: 1998 ident: 416_CR6 publication-title: International Computer Science Institute – ident: 416_CR19 doi: 10.1109/CSSE.2008.876 – volume: 224 start-page: 59 issue: 1 year: 2013 ident: 416_CR22 publication-title: Forensic Science International doi: 10.1016/j.forsciint.2012.10.031 – volume: 7 start-page: 90 issue: 1 year: 2012 ident: 416_CR18 publication-title: Journal of Multimedia doi: 10.4304/jmm.7.1.90-97 – ident: 416_CR36 doi: 10.1007/978-3-642-16435-4_5 – ident: 416_CR38 doi: 10.1142/9789812836243_0015 |
SSID | ssj0010016 |
Score | 2.3835733 |
Snippet | Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image... |
SourceID | crossref springer |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 989 |
SubjectTerms | Artificial Intelligence Circuits and Systems Electrical Engineering Engineering Signal,Image and Speech Processing |
Title | Fusion of block and keypoints based approaches for effective copy-move image forgery detection |
URI | https://link.springer.com/article/10.1007/s11045-016-0416-1 |
Volume | 27 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA-yXfQgfuL8GDl4UgJN23TJcZPVobiTg3mxNF8wdO2w3cH_3peu3Ryo4KmhfS3lJe8r771fELqmnpWGKUGYFSEJI5sSSXVKRKCFZ4VWQYV48zSORpPwYcqmdR930VS7NynJSlNvmt0gcnCFZhABgxdBIORpMxe6wyKe-P116sA5MRXAnh-QCAxck8r86RPbxmg7E1oZmPgA7deeIe6vpvIQ7ZjsCO19wws8Rq_x0m1u4dxiCUboDaeZxiCFi3yWlQV2FknjBiXcFBgcUrwq2ACdhlW--CTzHEazOWgR99R1RGNtyqoeKztBk3j4fDci9QEJRPmcl0SHOhXSN4JK1ksjiEW4lDSSSoUwlsz2UgrhGlOeb_w04swGXFITwT1hJdfBKWpleWbOEKYSfiZwSD6RBDG2PA1tyIyvesIIYXkHeQ2nElWjh7tDLN6TDe6xY27iKsYccxPaQTfrVxYr6Iy_iG8b9ie1FBW_U5__i_oC7fpuzqsSvEvUKj-W5gpciVJ2UbsfDwZjd71_eRx2q6X0BWpQwyY |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZQGYAB8RTl6YEJZKlxYtceK0RVoO3USp2I4pdUQZOKpAP_nnOatFQCJDYruUTROee78333GaHboOWUZVoS5mREIu4SogKTEBka2XLS6LBkvBkMeW8cPU_YpOrjzmu0e12SLFfqdbMbZA4eaAYZMEQRBFKebYgFhMdxjWlnVTrwQUxJsEdDwsHB1aXMn16x6Yw2K6Glg-keoP0qMsSd5VQeoi2bHqG9b3yBx-i1u_CbWzhzWIETesNJajBY4TybpkWOvUcyuGYJtzmGgBQvARuwpmGdzT_JLIPRdAariL_rO6KxsUWJx0pP0Lj7OHrokeqABKKpEAUxkUmkolYGirUTDrmIUCrgSusIxoq5dhJAusZ0i1qacMFcKFRgOVyTTgkTnqJGmqX2DOFAwceEnsmHKzBjJ5LIRcxS3ZZWSieaqFVrKtYVe7g_xOI9XvMee-XGHjHmlRsHTXS3emS-pM74S_i-Vn9cWVH-u_T5v6Rv0E5vNOjH_afhywXapX7-SzjeJWoUHwt7BWFFoa7L3-gLhofDCQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kguhBfGJ97sGTsjS7eTR7LGrwWTxY6MmQfUHRJsGkB_-9s3m0FlTwtiSTEGZ3XpmZbxA6p44R2pec-IZ7xAtMQgRVCeGu4o7hSroV4s3TMLgdefdjf9zMOS3aavc2JVn3NFiUprTs5cr0Fo1vEEXYojOIhsGjIBD-rII2pvZYj9hgnkawDk0FtsdcEoCxa9OaP71i2TAtZ0UrYxNtoc3GS8SDelu30YpOd9DGN-zAXfQazeyPLpwZLMAgveEkVRgkMs8maVlga50UbhHDdYHBOcV18QboNyyz_JNMM1hNpqBR7F3bHY2VLqvarHQPjaKbl6tb0gxLIJKFYUmUpxIumOZU-P0kgLgkFIIGQkoP1sI3_YRC6OZLh2mWBKFv3FBQHcA1bkSo3H3USbNUHyBMBXyMa1F9AgEibcLEM56vmexzzbkJu8hpORXLBkncDrR4jxcYyJa5sa0es8yNaRddzB_JaxiNv4gvW_bHjUQVv1Mf_ov6DK09X0fx493w4QitM7v9VWXeMeqUHzN9Ah5GKU6rU_QFFnHHRQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fusion+of+block+and+keypoints+based+approaches+for+effective+copy-move+image+forgery+detection&rft.jtitle=Multidimensional+systems+and+signal+processing&rft.au=Zheng%2C+Jiangbin&rft.au=Liu%2C+Yanan&rft.au=Ren%2C+Jinchang&rft.au=Zhu%2C+Tingge&rft.date=2016-10-01&rft.pub=Springer+US&rft.issn=0923-6082&rft.eissn=1573-0824&rft.volume=27&rft.issue=4&rft.spage=989&rft.epage=1005&rft_id=info:doi/10.1007%2Fs11045-016-0416-1&rft.externalDocID=10_1007_s11045_016_0416_1 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0923-6082&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0923-6082&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0923-6082&client=summon |