Fusion of block and keypoints based approaches for effective copy-move image forgery detection

Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handl...

Full description

Saved in:
Bibliographic Details
Published inMultidimensional systems and signal processing Vol. 27; no. 4; pp. 989 - 1005
Main Authors Zheng, Jiangbin, Liu, Yanan, Ren, Jinchang, Zhu, Tingge, Yan, Yijun, Yang, Heng
Format Journal Article
LanguageEnglish
Published New York Springer US 01.10.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handle geometric transformations. On the contrary, keypoint-based approaches can overcome these two drawbacks yet are found difficult to deal with smooth regions. As a result, fusion of these two approaches is proposed for effective copy-move forgery detection. First, our scheme adaptively determines an appropriate initial size of regions to segment the image into non-overlapped regions. Feature points are extracted as keypoints using the scale invariant feature transform (SIFT) from the image. The ratio between the number of keypoints and the total number of pixels in that region is used to classify the region into smooth or non-smooth (keypoints) regions. Accordingly, block based approach using Zernike moments and keypoint based approach using SIFT along with filtering and post-processing are respectively applied to these two kinds of regions for effective forgery detection. Experimental results show that the proposed fusion scheme outperforms the keypoint-based method in reliability of detection and the block-based method in efficiency.
AbstractList Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image forgery schemes. In general, block-based methods suffer from high computational cost due to the large number of image blocks used and fail to handle geometric transformations. On the contrary, keypoint-based approaches can overcome these two drawbacks yet are found difficult to deal with smooth regions. As a result, fusion of these two approaches is proposed for effective copy-move forgery detection. First, our scheme adaptively determines an appropriate initial size of regions to segment the image into non-overlapped regions. Feature points are extracted as keypoints using the scale invariant feature transform (SIFT) from the image. The ratio between the number of keypoints and the total number of pixels in that region is used to classify the region into smooth or non-smooth (keypoints) regions. Accordingly, block based approach using Zernike moments and keypoint based approach using SIFT along with filtering and post-processing are respectively applied to these two kinds of regions for effective forgery detection. Experimental results show that the proposed fusion scheme outperforms the keypoint-based method in reliability of detection and the block-based method in efficiency.
Author Yang, Heng
Ren, Jinchang
Yan, Yijun
Zheng, Jiangbin
Liu, Yanan
Zhu, Tingge
Author_xml – sequence: 1
  givenname: Jiangbin
  surname: Zheng
  fullname: Zheng, Jiangbin
  organization: Department of Computer Science and Engineering, School of Computers, Northwestern Polytechnical University
– sequence: 2
  givenname: Yanan
  surname: Liu
  fullname: Liu, Yanan
  organization: Department of Computer Science and Engineering, School of Computers, Northwestern Polytechnical University
– sequence: 3
  givenname: Jinchang
  surname: Ren
  fullname: Ren, Jinchang
  email: jincang.ren@strath.ac.uk
  organization: Department of Electronic and Electrical Engineering, University of Strathclyde
– sequence: 4
  givenname: Tingge
  surname: Zhu
  fullname: Zhu, Tingge
  organization: Department of Computer Science and Engineering, School of Computers, Northwestern Polytechnical University
– sequence: 5
  givenname: Yijun
  surname: Yan
  fullname: Yan, Yijun
  organization: Department of Electronic and Electrical Engineering, University of Strathclyde
– sequence: 6
  givenname: Heng
  surname: Yang
  fullname: Yang, Heng
  organization: Xi’an Communications Institute
BookMark eNp9kMtOwzAQRS1UJNrCB7DzDxg8eTjJElUUkCqxgS2W7YxL-rAjO0XK3-OorFh0Y9-x54zm3gWZOe-QkHvgD8B59RgBeFEyDoLxIh1wReZQVjnjdVbMyJw3Wc5EKm7IIsYd54kCMSdf61PsvKPeUn3wZk-Va-kex953bohUq4gtVX0fvDLfGKn1gaK1aIbuB6nx_ciOPqnuqLY4_W4xjLTFYerw7pZcW3WIePd3L8nn-vlj9co27y9vq6cNM1ldD6wtWtXoDBvQZaWE4KLWGoQ2pkhal7ZSUEFVGp5hpkRd2rzWgCK9NVbXbb4k1XmuCT7GgFaablDTBkNQ3UECl1NM8hyTTNblFJOERMI_sg_JTBgvMtmZianXJcdy50_BJYMXoF8Ccn1c
CitedBy_id crossref_primary_10_1007_s11042_020_09816_3
crossref_primary_10_1186_s13640_019_0469_9
crossref_primary_10_1007_s11045_019_00688_x
crossref_primary_10_1007_s11277_024_10996_6
crossref_primary_10_3233_JIFS_191700
crossref_primary_10_1016_j_ipm_2021_102783
crossref_primary_10_1371_journal_pone_0221627
crossref_primary_10_1016_j_jisa_2019_01_002
crossref_primary_10_1080_00450618_2018_1424241
crossref_primary_10_1016_j_jisa_2019_01_007
crossref_primary_10_1016_j_jvcir_2020_102966
crossref_primary_10_1049_iet_ipr_2018_5576
crossref_primary_10_1007_s11277_024_10959_x
crossref_primary_10_1007_s11042_019_07817_5
crossref_primary_10_1007_s42001_024_00265_8
crossref_primary_10_1007_s11042_022_12010_2
crossref_primary_10_1007_s13042_024_02268_3
crossref_primary_10_1016_j_neucom_2022_09_017
crossref_primary_10_3390_sym11010083
crossref_primary_10_1007_s00530_021_00873_8
crossref_primary_10_1080_00450618_2023_2270575
crossref_primary_10_1007_s11045_016_0441_0
crossref_primary_10_1016_j_patcog_2018_03_028
crossref_primary_10_1007_s10489_022_04104_z
crossref_primary_10_1142_S0219467821500546
crossref_primary_10_1007_s00500_017_2694_4
crossref_primary_10_1016_j_procs_2024_04_319
crossref_primary_10_1049_iet_ipr_2017_0441
crossref_primary_10_3390_app10134458
crossref_primary_10_1016_j_ins_2019_09_085
crossref_primary_10_1109_ACCESS_2023_3304237
crossref_primary_10_1007_s11042_024_18399_2
crossref_primary_10_1007_s11042_016_4201_9
crossref_primary_10_1109_ACCESS_2020_2974804
crossref_primary_10_3103_S1060992X22010052
crossref_primary_10_1109_TIFS_2019_2957693
crossref_primary_10_36548_jiip_2022_4_001
crossref_primary_10_1007_s11042_018_6354_1
crossref_primary_10_1007_s11042_023_15506_7
crossref_primary_10_1142_S0219467823500250
crossref_primary_10_1007_s11042_023_17950_x
crossref_primary_10_1016_j_neunet_2019_03_015
crossref_primary_10_1016_j_ins_2018_06_040
crossref_primary_10_1007_s11042_022_12755_w
crossref_primary_10_1007_s12530_021_09367_4
crossref_primary_10_1007_s13198_022_01829_5
Cites_doi 10.1109/TIP.2009.2039056
10.3724/SP.J.1004.2009.01488
10.1109/LGRS.2014.2312754
10.1016/j.forsciint.2006.11.002
10.1109/34.3913
10.1109/TIFS.2011.2129512
10.1109/78.157290
10.1016/j.forsciint.2012.10.031
10.1109/TIFS.2013.2272377
10.1109/TIFS.2014.2381872
10.1109/MSP.2014.2312071
10.4304/jmm.7.1.90-97
10.1080/01431161.2013.845924
10.1109/TPAMI.2012.120
10.1109/TGRS.2015.2393857
10.1145/358669.358692
10.1109/34.55109
10.1109/TBC.2011.2158252
10.1109/TGRS.2014.2374218
10.1109/TCSVT.2014.2381471
10.1109/TIFS.2014.2377671
10.1016/j.isprsjprs.2014.10.002
10.1109/TIFS.2012.2218597
10.1109/PACIIA.2008.240
10.12785/ijcds/040203
10.1109/MINES.2010.189
10.1145/1873951.1874249
10.1109/TIP.2010.2046599
10.1023/B:VISI.0000029664.99615.94
10.1109/CGIV.2011.29
10.1109/RIVF.2015.7049877
10.1109/ICCV.1999.790410
10.1109/ICASSP.2009.4959768
10.1109/CSSE.2008.876
10.1007/978-3-642-16435-4_5
10.1142/9789812836243_0015
ContentType Journal Article
Copyright Springer Science+Business Media New York 2016
Copyright_xml – notice: Springer Science+Business Media New York 2016
DBID AAYXX
CITATION
DOI 10.1007/s11045-016-0416-1
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1573-0824
EndPage 1005
ExternalDocumentID 10_1007_s11045_016_0416_1
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
8TC
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCEE
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9P
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SCV
SDH
SDM
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z83
Z88
Z8M
Z8R
Z8W
Z92
ZMTXR
_50
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
ID FETCH-LOGICAL-c288t-d4da9b2e91b57a66068bb16bcc4606b5f7a17175c02e2a685f38b1e67179fb8d3
IEDL.DBID U2A
ISSN 0923-6082
IngestDate Tue Jul 01 02:06:51 EDT 2025
Thu Apr 24 23:01:02 EDT 2025
Fri Feb 21 02:37:54 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Zernike moments
Image forensics
Copy-move image forgery detection
SIFT
Adaptive fusion
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c288t-d4da9b2e91b57a66068bb16bcc4606b5f7a17175c02e2a685f38b1e67179fb8d3
PageCount 17
ParticipantIDs crossref_citationtrail_10_1007_s11045_016_0416_1
crossref_primary_10_1007_s11045_016_0416_1
springer_journals_10_1007_s11045_016_0416_1
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20161000
2016-10-00
PublicationDateYYYYMMDD 2016-10-01
PublicationDate_xml – month: 10
  year: 2016
  text: 20161000
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle An International Journal
PublicationTitle Multidimensional systems and signal processing
PublicationTitleAbbrev Multidim Syst Sign Process
PublicationYear 2016
Publisher Springer US
Publisher_xml – name: Springer US
References Ren, Jiang, Vlachos (CR34) 2010; 19
Cheng, Han, Zhou, Guo (CR9) 2014; 98
Christlein, Riess, Jordan, Riess, Angelopoulou (CR10) 2012; 7
CR19
CR16
CR38
CR15
Lin, Wang, Kao (CR25) 2009; 5
CR36
CR12
CR32
Jing, Shao (CR18) 2012; 7
CR31
CR30
Cheng, Han, Guo, Liu, Bu, Ren (CR8) 2015; 53
Han, Zhang, Hu, Guo, Ren, Wu (CR14) 2015; 25
Li (CR22) 2013; 224
Pun, Yuan, Bi (CR33) 2015; 10
Mahdian, Saic (CR29) 2007; 171
Wang, Liu, Zhang, Dai, Wang (CR43) 2009; 35
Li, Li, Yang, Sun (CR23) 2015; 10
Teh, Chin (CR40) 1988; 10
CR4
Ren, Zabalza, Marshall, Zheng (CR35) 2014; 31
CR5
Li, Li, Zhu, Chu, Roddick, Pan (CR24) 2013; 4
Jiang, Kohler, Macwilliams, Zaletelj, Guntner, Horstmann (CR17) 2011; 57
Zhao, Li, Ren, Marshall (CR46) 2013; 34
CR7
Fischler, Bolles (CR11) 1981; 24
CR28
CR27
Amerini, Ballan, Caldelli, Del Bimbo, Del Tongo, Serra (CR3) 2013; 28
CR26
Khotanzad, Hong (CR20) 1990; 12
Ryu, Kirchner, Lee, Lee (CR37) 2013; 8
Han, Zhang, Cheng, Guo, Ren (CR13) 2015; 53
CR21
CR42
CR41
Amerini, Ballan, Caldelli, Del Bimbo, Serra (CR2) 2011; 6
Shensa (CR39) 1992; 40
Zahra (CR45) 2012; 1
Achanta, Shaji, Smith, Lucchi, Fua, Susstrunk (CR1) 2012; 34
Bilmes (CR6) 1998; 4
Zabalza, Ren, Wang, Marshall, Wang (CR44) 2014; 11
A Khotanzad (416_CR20) 1990; 12
G Cheng (416_CR9) 2014; 98
416_CR7
416_CR5
M Zahra (416_CR45) 2012; 1
J Li (416_CR23) 2015; 10
L Li (416_CR24) 2013; 4
G Cheng (416_CR8) 2015; 53
416_CR27
C Zhao (416_CR46) 2013; 34
416_CR28
416_CR26
416_CR21
L Jing (416_CR18) 2012; 7
J Jiang (416_CR17) 2011; 57
416_CR41
416_CR42
H-J Lin (416_CR25) 2009; 5
J Han (416_CR14) 2015; 25
J Han (416_CR13) 2015; 53
S-J Ryu (416_CR37) 2013; 8
M Shensa (416_CR39) 1992; 40
R Achanta (416_CR1) 2012; 34
V Christlein (416_CR10) 2012; 7
C-H Teh (416_CR40) 1988; 10
J Ren (416_CR34) 2010; 19
MA Fischler (416_CR11) 1981; 24
I Amerini (416_CR2) 2011; 6
416_CR19
416_CR16
Y Li (416_CR22) 2013; 224
416_CR38
416_CR36
416_CR15
JA Bilmes (416_CR6) 1998; 4
416_CR12
I Amerini (416_CR3) 2013; 28
416_CR4
CM Pun (416_CR33) 2015; 10
416_CR32
J Ren (416_CR35) 2014; 31
416_CR30
J Zabalza (416_CR44) 2014; 11
416_CR31
J Wang (416_CR43) 2009; 35
B Mahdian (416_CR29) 2007; 171
References_xml – volume: 19
  start-page: 1379
  issue: 5
  year: 2010
  end-page: 1384
  ident: CR34
  article-title: High-accuracy sub-pixel motion estimation from noisy images in Fourier domain
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2009.2039056
– volume: 35
  start-page: 1488
  issue: 12
  year: 2009
  end-page: 1495
  ident: CR43
  article-title: Fast and robust forensics for image region-duplication forgery
  publication-title: Acta Automatica Sinica
  doi: 10.3724/SP.J.1004.2009.01488
– ident: CR4
– ident: CR16
– ident: CR12
– ident: CR30
– volume: 11
  start-page: 1886
  issue: 11
  year: 2014
  end-page: 1890
  ident: CR44
  article-title: Singular spectrum analysis for effective feature extraction in hyperspectral imaging
  publication-title: IEEE Geoscience and Remote Sensing Letters
  doi: 10.1109/LGRS.2014.2312754
– volume: 171
  start-page: 180
  issue: 2
  year: 2007
  end-page: 189
  ident: CR29
  article-title: Detection of copy-move forgery using a method based on blur moment invariants
  publication-title: Forensic Science International
  doi: 10.1016/j.forsciint.2006.11.002
– volume: 10
  start-page: 496
  issue: 4
  year: 1988
  end-page: 513
  ident: CR40
  article-title: On image analysis by the methods of moments
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/34.3913
– volume: 6
  start-page: 1099
  issue: 3
  year: 2011
  end-page: 1110
  ident: CR2
  article-title: A sift-based forensic method for copy-move attack detection and transformation recovery
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2129512
– volume: 40
  start-page: 2464
  issue: 10
  year: 1992
  end-page: 2482
  ident: CR39
  article-title: Discrete wavelet transform: Wedding the a trous and Mallat algorithms
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/78.157290
– volume: 4
  start-page: 126
  issue: 510
  year: 1998
  ident: CR6
  article-title: A gentle tutorial of the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models
  publication-title: International Computer Science Institute
– volume: 224
  start-page: 59
  issue: 1
  year: 2013
  end-page: 67
  ident: CR22
  article-title: Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
  publication-title: Forensic Science International
  doi: 10.1016/j.forsciint.2012.10.031
– volume: 8
  start-page: 1355
  issue: 8
  year: 2013
  end-page: 1370
  ident: CR37
  article-title: Rotation invariant localization of duplicated image regions based on Zernike moments
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2013.2272377
– volume: 10
  start-page: 507
  issue: 3
  year: 2015
  end-page: 518
  ident: CR23
  article-title: Segmentation-based image copy-move forgery detection scheme
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2014.2381872
– ident: CR27
– ident: CR42
– volume: 31
  start-page: 149
  issue: 31
  year: 2014
  end-page: 154
  ident: CR35
  article-title: Effective feature extraction and data reduction in remote sensing using hyperspectral imaging [Applications Corner]
  publication-title: IEEE Signal Processing Magazine
  doi: 10.1109/MSP.2014.2312071
– ident: CR21
– ident: CR19
– volume: 7
  start-page: 90
  issue: 1
  year: 2012
  end-page: 97
  ident: CR18
  article-title: Image copy-move forgery detecting based on local invariant feature
  publication-title: Journal of Multimedia
  doi: 10.4304/jmm.7.1.90-97
– volume: 34
  start-page: 8669
  issue: 24
  year: 2013
  end-page: 8684
  ident: CR46
  article-title: Improved sparse representation using adaptive spatial support for effective target detection in hyperspectral imagery
  publication-title: International Journal of Remote Sensing
  doi: 10.1080/01431161.2013.845924
– volume: 34
  start-page: 2274
  issue: 11
  year: 2012
  end-page: 2282
  ident: CR1
  article-title: SLIC superpixels compared to state-of-the-art superpixel methods
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/TPAMI.2012.120
– volume: 53
  start-page: 4238
  issue: 8
  year: 2015
  end-page: 4249
  ident: CR8
  article-title: Effective and efficient midlevel visual elements-oriented land-use classification using VHR remote sensing images
  publication-title: IEEE Transactions on Geoscience and Remote Sensing
  doi: 10.1109/TGRS.2015.2393857
– ident: CR15
– ident: CR38
– volume: 24
  start-page: 381
  issue: 6
  year: 1981
  end-page: 395
  ident: CR11
  article-title: Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography
  publication-title: Communications of the ACM
  doi: 10.1145/358669.358692
– volume: 12
  start-page: 489
  issue: 5
  year: 1990
  end-page: 497
  ident: CR20
  article-title: Invariant image recognition by Zernike moments
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/34.55109
– ident: CR31
– volume: 57
  start-page: 646
  issue: 3
  year: 2011
  end-page: 661
  ident: CR17
  article-title: LIVE: An integrated production and feedback system for intelligent and interactive TV broadcasting
  publication-title: IEEE Transactions on Broadcasting
  doi: 10.1109/TBC.2011.2158252
– volume: 53
  start-page: 3325
  issue: 6
  year: 2015
  end-page: 3337
  ident: CR13
  article-title: Object detection in optical remote sensing images based on weakly supervised learning and high-level feature learning
  publication-title: IEEE Transactions on Geoscience and Remote Sensing
  doi: 10.1109/TGRS.2014.2374218
– volume: 25
  start-page: 1309
  issue: 8
  year: 2015
  end-page: 1321
  ident: CR14
  article-title: Background prior-based salient object detection via deep reconstruction residual
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
  doi: 10.1109/TCSVT.2014.2381471
– volume: 28
  start-page: 659
  issue: 6
  year: 2013
  end-page: 669
  ident: CR3
  article-title: Copy-move forgery detection and localization by means of robust clustering with J-Linkage
  publication-title: Signal Processing: Image Communication
– ident: CR32
– volume: 5
  start-page: 188
  issue: 5
  year: 2009
  end-page: 197
  ident: CR25
  article-title: Fast copy-move forgery detection
  publication-title: WSEAS Transactions on Signal Processing
– ident: CR36
– ident: CR5
– volume: 10
  start-page: 1
  year: 2015
  end-page: 1
  ident: CR33
  article-title: Image forgery detection using adaptive over-segmentation and feature points matching
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2014.2377671
– ident: CR7
– volume: 1
  start-page: 1
  issue: 12
  year: 2012
  end-page: 6
  ident: CR45
  article-title: Image duplication forgery detection using two robust features
  publication-title: Research Journal of Recent Sciences
– volume: 98
  start-page: 119
  issue: 1
  year: 2014
  end-page: 132
  ident: CR9
  article-title: Multi-class geospatial object detection and geographic image classification based on collection of part detectors
  publication-title: Isprs Journal of Photogrammetry and Remote Sensing
  doi: 10.1016/j.isprsjprs.2014.10.002
– volume: 4
  start-page: 46
  year: 2013
  end-page: 56
  ident: CR24
  article-title: An efficient scheme for detecting copy-move forged images by local binary patterns
  publication-title: Journal of Information Hiding and Multimedia Signal Processing
– ident: CR28
– ident: CR41
– ident: CR26
– volume: 7
  start-page: 1841
  issue: 6
  year: 2012
  end-page: 1854
  ident: CR10
  article-title: An evaluation of popular copy-move forgery detection approaches
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2012.2218597
– volume: 28
  start-page: 659
  issue: 6
  year: 2013
  ident: 416_CR3
  publication-title: Signal Processing: Image Communication
– volume: 34
  start-page: 8669
  issue: 24
  year: 2013
  ident: 416_CR46
  publication-title: International Journal of Remote Sensing
  doi: 10.1080/01431161.2013.845924
– volume: 25
  start-page: 1309
  issue: 8
  year: 2015
  ident: 416_CR14
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
  doi: 10.1109/TCSVT.2014.2381471
– ident: 416_CR15
  doi: 10.1109/PACIIA.2008.240
– volume: 10
  start-page: 496
  issue: 4
  year: 1988
  ident: 416_CR40
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/34.3913
– volume: 8
  start-page: 1355
  issue: 8
  year: 2013
  ident: 416_CR37
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2013.2272377
– volume: 53
  start-page: 4238
  issue: 8
  year: 2015
  ident: 416_CR8
  publication-title: IEEE Transactions on Geoscience and Remote Sensing
  doi: 10.1109/TGRS.2015.2393857
– volume: 53
  start-page: 3325
  issue: 6
  year: 2015
  ident: 416_CR13
  publication-title: IEEE Transactions on Geoscience and Remote Sensing
  doi: 10.1109/TGRS.2014.2374218
– volume: 19
  start-page: 1379
  issue: 5
  year: 2010
  ident: 416_CR34
  publication-title: IEEE Transactions on Image Processing
  doi: 10.1109/TIP.2009.2039056
– volume: 1
  start-page: 1
  issue: 12
  year: 2012
  ident: 416_CR45
  publication-title: Research Journal of Recent Sciences
– volume: 24
  start-page: 381
  issue: 6
  year: 1981
  ident: 416_CR11
  publication-title: Communications of the ACM
  doi: 10.1145/358669.358692
– volume: 10
  start-page: 1
  year: 2015
  ident: 416_CR33
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2014.2377671
– volume: 171
  start-page: 180
  issue: 2
  year: 2007
  ident: 416_CR29
  publication-title: Forensic Science International
  doi: 10.1016/j.forsciint.2006.11.002
– volume: 34
  start-page: 2274
  issue: 11
  year: 2012
  ident: 416_CR1
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/TPAMI.2012.120
– volume: 11
  start-page: 1886
  issue: 11
  year: 2014
  ident: 416_CR44
  publication-title: IEEE Geoscience and Remote Sensing Letters
  doi: 10.1109/LGRS.2014.2312754
– volume: 57
  start-page: 646
  issue: 3
  year: 2011
  ident: 416_CR17
  publication-title: IEEE Transactions on Broadcasting
  doi: 10.1109/TBC.2011.2158252
– volume: 12
  start-page: 489
  issue: 5
  year: 1990
  ident: 416_CR20
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/34.55109
– volume: 5
  start-page: 188
  issue: 5
  year: 2009
  ident: 416_CR25
  publication-title: WSEAS Transactions on Signal Processing
– ident: 416_CR21
  doi: 10.12785/ijcds/040203
– ident: 416_CR7
  doi: 10.1109/MINES.2010.189
– ident: 416_CR42
  doi: 10.1145/1873951.1874249
– volume: 4
  start-page: 46
  year: 2013
  ident: 416_CR24
  publication-title: Journal of Information Hiding and Multimedia Signal Processing
– ident: 416_CR32
– ident: 416_CR4
  doi: 10.1109/TIP.2010.2046599
– ident: 416_CR27
  doi: 10.1023/B:VISI.0000029664.99615.94
– ident: 416_CR30
  doi: 10.1109/CGIV.2011.29
– ident: 416_CR16
  doi: 10.1109/RIVF.2015.7049877
– volume: 6
  start-page: 1099
  issue: 3
  year: 2011
  ident: 416_CR2
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2129512
– ident: 416_CR28
– volume: 98
  start-page: 119
  issue: 1
  year: 2014
  ident: 416_CR9
  publication-title: Isprs Journal of Photogrammetry and Remote Sensing
  doi: 10.1016/j.isprsjprs.2014.10.002
– volume: 7
  start-page: 1841
  issue: 6
  year: 2012
  ident: 416_CR10
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2012.2218597
– ident: 416_CR26
  doi: 10.1109/ICCV.1999.790410
– volume: 10
  start-page: 507
  issue: 3
  year: 2015
  ident: 416_CR23
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2014.2381872
– ident: 416_CR12
– volume: 31
  start-page: 149
  issue: 31
  year: 2014
  ident: 416_CR35
  publication-title: IEEE Signal Processing Magazine
  doi: 10.1109/MSP.2014.2312071
– volume: 40
  start-page: 2464
  issue: 10
  year: 1992
  ident: 416_CR39
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/78.157290
– ident: 416_CR41
– volume: 35
  start-page: 1488
  issue: 12
  year: 2009
  ident: 416_CR43
  publication-title: Acta Automatica Sinica
  doi: 10.3724/SP.J.1004.2009.01488
– ident: 416_CR5
  doi: 10.1109/ICASSP.2009.4959768
– ident: 416_CR31
– volume: 4
  start-page: 126
  issue: 510
  year: 1998
  ident: 416_CR6
  publication-title: International Computer Science Institute
– ident: 416_CR19
  doi: 10.1109/CSSE.2008.876
– volume: 224
  start-page: 59
  issue: 1
  year: 2013
  ident: 416_CR22
  publication-title: Forensic Science International
  doi: 10.1016/j.forsciint.2012.10.031
– volume: 7
  start-page: 90
  issue: 1
  year: 2012
  ident: 416_CR18
  publication-title: Journal of Multimedia
  doi: 10.4304/jmm.7.1.90-97
– ident: 416_CR36
  doi: 10.1007/978-3-642-16435-4_5
– ident: 416_CR38
  doi: 10.1142/9789812836243_0015
SSID ssj0010016
Score 2.3835733
Snippet Keypoint-based and block-based methods are two main categories of techniques for detecting copy-move forged images, one of the most common digital image...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 989
SubjectTerms Artificial Intelligence
Circuits and Systems
Electrical Engineering
Engineering
Signal,Image and Speech Processing
Title Fusion of block and keypoints based approaches for effective copy-move image forgery detection
URI https://link.springer.com/article/10.1007/s11045-016-0416-1
Volume 27
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA-yXfQgfuL8GDl4UgJN23TJcZPVobiTg3mxNF8wdO2w3cH_3peu3Ryo4KmhfS3lJe8r771fELqmnpWGKUGYFSEJI5sSSXVKRKCFZ4VWQYV48zSORpPwYcqmdR930VS7NynJSlNvmt0gcnCFZhABgxdBIORpMxe6wyKe-P116sA5MRXAnh-QCAxck8r86RPbxmg7E1oZmPgA7deeIe6vpvIQ7ZjsCO19wws8Rq_x0m1u4dxiCUboDaeZxiCFi3yWlQV2FknjBiXcFBgcUrwq2ACdhlW--CTzHEazOWgR99R1RGNtyqoeKztBk3j4fDci9QEJRPmcl0SHOhXSN4JK1ksjiEW4lDSSSoUwlsz2UgrhGlOeb_w04swGXFITwT1hJdfBKWpleWbOEKYSfiZwSD6RBDG2PA1tyIyvesIIYXkHeQ2nElWjh7tDLN6TDe6xY27iKsYccxPaQTfrVxYr6Iy_iG8b9ie1FBW_U5__i_oC7fpuzqsSvEvUKj-W5gpciVJ2UbsfDwZjd71_eRx2q6X0BWpQwyY
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZQGYAB8RTl6YEJZKlxYtceK0RVoO3USp2I4pdUQZOKpAP_nnOatFQCJDYruUTROee78333GaHboOWUZVoS5mREIu4SogKTEBka2XLS6LBkvBkMeW8cPU_YpOrjzmu0e12SLFfqdbMbZA4eaAYZMEQRBFKebYgFhMdxjWlnVTrwQUxJsEdDwsHB1aXMn16x6Yw2K6Glg-keoP0qMsSd5VQeoi2bHqG9b3yBx-i1u_CbWzhzWIETesNJajBY4TybpkWOvUcyuGYJtzmGgBQvARuwpmGdzT_JLIPRdAariL_rO6KxsUWJx0pP0Lj7OHrokeqABKKpEAUxkUmkolYGirUTDrmIUCrgSusIxoq5dhJAusZ0i1qacMFcKFRgOVyTTgkTnqJGmqX2DOFAwceEnsmHKzBjJ5LIRcxS3ZZWSieaqFVrKtYVe7g_xOI9XvMee-XGHjHmlRsHTXS3emS-pM74S_i-Vn9cWVH-u_T5v6Rv0E5vNOjH_afhywXapX7-SzjeJWoUHwt7BWFFoa7L3-gLhofDCQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF6kguhBfGJ97sGTsjS7eTR7LGrwWTxY6MmQfUHRJsGkB_-9s3m0FlTwtiSTEGZ3XpmZbxA6p44R2pec-IZ7xAtMQgRVCeGu4o7hSroV4s3TMLgdefdjf9zMOS3aavc2JVn3NFiUprTs5cr0Fo1vEEXYojOIhsGjIBD-rII2pvZYj9hgnkawDk0FtsdcEoCxa9OaP71i2TAtZ0UrYxNtoc3GS8SDelu30YpOd9DGN-zAXfQazeyPLpwZLMAgveEkVRgkMs8maVlga50UbhHDdYHBOcV18QboNyyz_JNMM1hNpqBR7F3bHY2VLqvarHQPjaKbl6tb0gxLIJKFYUmUpxIumOZU-P0kgLgkFIIGQkoP1sI3_YRC6OZLh2mWBKFv3FBQHcA1bkSo3H3USbNUHyBMBXyMa1F9AgEibcLEM56vmexzzbkJu8hpORXLBkncDrR4jxcYyJa5sa0es8yNaRddzB_JaxiNv4gvW_bHjUQVv1Mf_ov6DK09X0fx493w4QitM7v9VWXeMeqUHzN9Ah5GKU6rU_QFFnHHRQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fusion+of+block+and+keypoints+based+approaches+for+effective+copy-move+image+forgery+detection&rft.jtitle=Multidimensional+systems+and+signal+processing&rft.au=Zheng%2C+Jiangbin&rft.au=Liu%2C+Yanan&rft.au=Ren%2C+Jinchang&rft.au=Zhu%2C+Tingge&rft.date=2016-10-01&rft.pub=Springer+US&rft.issn=0923-6082&rft.eissn=1573-0824&rft.volume=27&rft.issue=4&rft.spage=989&rft.epage=1005&rft_id=info:doi/10.1007%2Fs11045-016-0416-1&rft.externalDocID=10_1007_s11045_016_0416_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0923-6082&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0923-6082&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0923-6082&client=summon