Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as r...
Saved in:
Published in | Forensic science international Vol. 224; no. 1-3; pp. 59 - 67 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Kidlington
Elsevier Ireland Ltd
10.01.2013
Elsevier Elsevier Limited |
Subjects | |
Online Access | Get full text |
ISSN | 0379-0738 1872-6283 1872-6283 |
DOI | 10.1016/j.forsciint.2012.10.031 |
Cover
Loading…
Abstract | Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting. |
---|---|
AbstractList | Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting. Abstract Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting. Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting.Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting. |
Author | Li, Yuenan |
Author_xml | – sequence: 1 givenname: Yuenan surname: Li fullname: Li, Yuenan email: yuenanlee@yahoo.com.cn organization: School of Electronic and Information Engineering, Tianjin University, No. 92, Weijin Road, Tianjin, PR China |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=26846199$$DView record in Pascal Francis https://www.ncbi.nlm.nih.gov/pubmed/23149318$$D View this record in MEDLINE/PubMed |
BookMark | eNqNkl2L1DAUhousuB_6F7Qggjcd89UkvVBZFj8WFrxQr0Oans5mbJMx6SzOv_eUmXVhQHauUtLnvDnnvO95cRJigKJ4RcmCEirfrRZ9TNl5H6YFI5Th7YJw-qQ4o1qxSjLNT4ozwlVTEcX1aXGe84oQUtdMPitOGaei4VSfFcP1aJdQurjeVmO8gxJ1l5C2ZQcTuMnHULY2Q1fixzoONiGafYBySjZkhMfShq6063WKf_xoJygD2AR5wtMvb9uYyowX7taH5fPiaW-HDC_250Xx8_OnH1dfq5tvX66vLm8qJ4mcKsV7yxg0dQO26zsQpCdK2KZrRcsaSXQjSG2FBi0s45xaBXXfU6CNJlTpll8Ub3e62NTvDfZiRp8dDIMNEDfZMNwEl7UQ-lGUclrLWqn6CJQpXhOhyIy-PkBXcZMCzoyU1EpQ3czUyz21aUfozDrhAtPW3LuDwJs9YLOzQ48rdz4_cFILSZsGufc7zqWYc4LeOD_Z2Tx0yQ-GEjOnxqzMv9SYOTXzD0wN1quD-vsnHq-83FUC2nnnIRmEIDjofML4mC76IzQ-HGi4wQePA_-CLeSHzZnMDDHf51TPoaZoo9D1PP7H_wsc1cJf5e8LQQ |
CODEN | FSINDR |
CitedBy_id | crossref_primary_10_1016_j_jvcir_2024_104075 crossref_primary_10_1016_j_dsp_2021_103032 crossref_primary_10_1016_j_forsciint_2018_12_004 crossref_primary_10_1109_TIP_2021_3132828 crossref_primary_10_1007_s11042_017_5374_6 crossref_primary_10_1007_s42452_020_3181_6 crossref_primary_10_1007_s11042_019_08343_0 crossref_primary_10_1049_iet_ipr_2018_5356 crossref_primary_10_1016_j_ins_2016_01_061 crossref_primary_10_1016_j_jvcir_2022_103658 crossref_primary_10_1007_s11042_020_09415_2 crossref_primary_10_1109_TPAMI_2022_3204971 crossref_primary_10_1016_j_jnca_2016_09_008 crossref_primary_10_1155_2022_7715753 crossref_primary_10_1007_s10489_022_04104_z crossref_primary_10_5370_JEET_2015_10_4_1886 crossref_primary_10_1049_iet_ipr_2018_6035 crossref_primary_10_3390_app11041574 crossref_primary_10_1049_iet_ipr_2017_0441 crossref_primary_10_1016_j_ins_2019_09_085 crossref_primary_10_1155_2016_8713202 crossref_primary_10_1007_s11042_018_6201_4 crossref_primary_10_1016_j_asoc_2020_106728 crossref_primary_10_1109_TIFS_2016_2585118 crossref_primary_10_1109_TIFS_2019_2957693 crossref_primary_10_1142_S0218001422540167 crossref_primary_10_1007_s11042_017_4625_x crossref_primary_10_1109_TMM_2023_3345160 crossref_primary_10_1016_j_jfranklin_2020_01_025 crossref_primary_10_1080_18756891_2016_1161364 crossref_primary_10_1007_s10044_017_0678_8 crossref_primary_10_1016_j_ins_2018_06_040 crossref_primary_10_1007_s11042_022_12755_w crossref_primary_10_1007_s11042_018_5899_3 crossref_primary_10_1007_s11042_016_4179_3 crossref_primary_10_1007_s11042_018_6922_4 crossref_primary_10_1109_TIFS_2015_2455334 crossref_primary_10_1007_s11042_022_13519_2 crossref_primary_10_1007_s11042_019_7342_9 crossref_primary_10_1007_s11045_018_0624_y crossref_primary_10_1109_LSP_2013_2267775 crossref_primary_10_1016_j_image_2015_08_008 crossref_primary_10_1049_iet_ipr_2016_0229 crossref_primary_10_1080_13682199_2018_1461345 crossref_primary_10_1007_s11042_019_07817_5 crossref_primary_10_1109_ACCESS_2022_3212069 crossref_primary_10_1007_s11045_016_0416_1 crossref_primary_10_1007_s11042_016_3687_5 crossref_primary_10_1142_S0218001423500118 crossref_primary_10_1016_j_jvcir_2018_03_015 crossref_primary_10_1007_s10044_019_00840_0 crossref_primary_10_1007_s11042_024_19584_z crossref_primary_10_1016_j_eswa_2021_115282 crossref_primary_10_1142_S0218001422540192 crossref_primary_10_1007_s11042_014_2362_y crossref_primary_10_1109_ACCESS_2020_2995392 crossref_primary_10_1142_S0219467821500546 crossref_primary_10_1016_j_jisa_2020_102481 crossref_primary_10_1109_ACCESS_2019_2907316 crossref_primary_10_1007_s11042_019_7165_8 crossref_primary_10_1016_j_asoc_2021_107893 crossref_primary_10_1155_2014_975456 crossref_primary_10_1007_s11042_019_08354_x crossref_primary_10_1016_j_jvcir_2024_104221 crossref_primary_10_1016_j_ipm_2024_103685 crossref_primary_10_1016_j_jvcir_2017_04_004 crossref_primary_10_1007_s10489_017_1038_5 crossref_primary_10_1007_s11265_018_1417_0 crossref_primary_10_1007_s11042_018_6666_1 crossref_primary_10_1007_s11042_019_7713_2 crossref_primary_10_1007_s11554_016_0622_y crossref_primary_10_1007_s00500_019_04298_4 crossref_primary_10_3390_sym12040492 crossref_primary_10_1007_s11042_017_5094_y crossref_primary_10_1109_TCSVT_2018_2804768 crossref_primary_10_1007_s11042_023_15506_7 crossref_primary_10_1016_j_jisa_2018_11_001 crossref_primary_10_1109_TMM_2017_2760098 crossref_primary_10_1007_s00500_022_07432_x crossref_primary_10_1007_s11042_020_09655_2 crossref_primary_10_1080_13682199_2019_1663069 crossref_primary_10_1007_s11042_015_2872_2 crossref_primary_10_1016_j_patrec_2021_10_007 crossref_primary_10_1109_TIFS_2016_2553645 crossref_primary_10_1007_s11277_021_09227_z |
Cites_doi | 10.1109/TPAMI.2009.119 10.1016/j.forsciint.2006.11.002 10.1109/5.771070 10.1016/j.forsciint.2010.08.001 10.1109/MSP.2008.931079 |
ContentType | Journal Article |
Copyright | 2012 Elsevier Ireland Ltd Elsevier Ireland Ltd 2014 INIST-CNRS Copyright © 2012 Elsevier Ireland Ltd. All rights reserved. |
Copyright_xml | – notice: 2012 Elsevier Ireland Ltd – notice: Elsevier Ireland Ltd – notice: 2014 INIST-CNRS – notice: Copyright © 2012 Elsevier Ireland Ltd. All rights reserved. |
DBID | AAYXX CITATION IQODW NPM 3V. 7QP 7RV 7U7 7X7 7XB 88E 8FE 8FH 8FI 8FJ 8FK 8G5 ABUWG AFKRA AZQEC BBNVY BENPR BHPHI C1K CCPQU DWQXO FYUFA GHDGH GNUQQ GUQSH HCIFZ K9. KB0 LK8 M0S M1P M2O M7P MBDVC NAPCQ PHGZM PHGZT PJZUB PKEHL PPXIY PQEST PQGLB PQQKQ PQUKI PRINS Q9U 7X8 7U5 8FD L7M 7S9 L.6 |
DOI | 10.1016/j.forsciint.2012.10.031 |
DatabaseName | CrossRef Pascal-Francis PubMed ProQuest Central (Corporate) Calcium & Calcified Tissue Abstracts Nursing & Allied Health Database Toxicology Abstracts Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) ProQuest SciTech Collection ProQuest Natural Science Collection Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials Biological Science Collection ProQuest Central Natural Science Collection Environmental Sciences and Pollution Management ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Central Student ProQuest Research Library SciTech Premium Collection (ProQuest) ProQuest Health & Medical Complete (Alumni) Nursing & Allied Health Database (Alumni Edition) ProQuest Biological Science Collection ProQuest Health & Medical Collection PML(ProQuest Medical Library) ProQuest research library Biological Science Database Research Library (Corporate) Nursing & Allied Health Premium ProQuest Central Premium ProQuest One Academic ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic MEDLINE - Academic Solid State and Superconductivity Abstracts Technology Research Database Advanced Technologies Database with Aerospace AGRICOLA AGRICOLA - Academic |
DatabaseTitle | CrossRef PubMed Research Library Prep ProQuest Central Student ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest One Health & Nursing Research Library (Alumni Edition) ProQuest Natural Science Collection ProQuest Central China Environmental Sciences and Pollution Management ProQuest Central ProQuest One Applied & Life Sciences ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) Natural Science Collection ProQuest Central Korea Health & Medical Research Collection Biological Science Collection ProQuest Research Library ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest Biological Science Collection ProQuest Central Basic Toxicology Abstracts ProQuest One Academic Eastern Edition ProQuest Nursing & Allied Health Source ProQuest Hospital Collection Health Research Premium Collection (Alumni) Biological Science Database ProQuest SciTech Collection ProQuest Hospital Collection (Alumni) Nursing & Allied Health Premium ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest Nursing & Allied Health Source (Alumni) ProQuest One Academic Calcium & Calcified Tissue Abstracts ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic Technology Research Database Advanced Technologies Database with Aerospace Solid State and Superconductivity Abstracts AGRICOLA AGRICOLA - Academic |
DatabaseTitleList | AGRICOLA Technology Research Database Research Library Prep MEDLINE - Academic PubMed |
Database_xml | – sequence: 1 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Public Health |
EISSN | 1872-6283 |
EndPage | 67 |
ExternalDocumentID | 2862842571 23149318 26846199 10_1016_j_forsciint_2012_10_031 S0379073812004859 1_s2_0_S0379073812004859 |
Genre | Research Support, Non-U.S. Gov't Journal Article |
GroupedDBID | --- --K --M .1- .4L .FO .~1 04C 0R~ 186 1B1 1P~ 1RT 1~. 1~5 4.4 457 4G. 5GY 5RE 5VS 7-5 71M 7RV 7X7 88E 8FE 8FH 8FI 8FJ 8G5 8P~ 9JM 9JN 9JO AABNK AAEDT AAEDW AAFJI AAHBH AAIKJ AAKOC AALRI AAOAW AAQFI AARLI AATTM AAXKI AAXUO AAYWO ABBQC ABFNM ABFRF ABGSF ABJNI ABLJU ABMAC ABMMH ABMZM ABOCM ABUDA ABUWG ABWVN ABXDB ABZDS ACDAQ ACGFO ACGFS ACIEU ACIUM ACIWK ACPRK ACRLP ACVFH ADBBV ADCNI ADECG ADEZE ADFRT ADUVX AEBSH AEFWE AEHWI AEIPS AEKER AENEX AEUPX AEVXI AFKRA AFPUW AFRAH AFRHN AFTJW AFXIZ AFZHZ AGCQF AGHFR AGUBO AGYEJ AHHHB AHMBA AIEXJ AIIUN AIKHN AITUG AJRQY AJSZI AJUYK AKBMS AKRWK AKYEP ALCLG ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU ANZVX AOMHK AVARZ AXJTR AZQEC BBNVY BENPR BHPHI BKEYQ BKOJK BLXMC BMSDO BNPGV BPHCQ BVXVI CCPQU CS3 DU5 DWQXO EBD EBS EFJIC EFKBS EIHBH EJD EO8 EO9 EP2 EP3 EX3 F5P FDB FIRID FLBIZ FNPLU FYGXN FYUFA G-Q GBLVA GNUQQ GUQSH HCIFZ HMCUK I-F IAO IEA IHE ILT IOF J1W KOM LK8 M1P M29 M2O M41 M7P MO0 N9A NAPCQ O-L O9- OAUVE OG0 OGGZJ OS0 OZT P-8 P-9 P2P PC. PHGZM PHGZT PJZUB PPXIY PQGLB PQQKQ PRBVW PROAC PSQYO PUEGO Q38 RNS ROL RPZ SAE SCC SDF SDG SDP SEL SES SPC SPCBC SSB SSH SSK SSO SSP SSU SSZ T5K TAE TN5 UKHRP ULE WH7 WOW Z5R ~02 ~G- .GJ 29H 3O- 3V. 53G AACTN AAQXK ACNNM ACRPL ADMUD ADNMO AFCTW AFFNX AFJKZ AFKWA AGRDE AJOXV ALIPV AMFUW ASPBG AVWKF AZFZN FEDTE FGOYB G-2 HDY HMK HMO HVGLF HZ~ ITC PKN R2- RIG SCB SEW WUQ ZGI AAIAV AATCM ABLVK ABYKQ AJBFU AKYCK DOVZS EFLBG LCYCR AAYXX AGQPQ AGRNS AIGII APXCP CITATION IQODW NPM 7QP 7U7 7XB 8FK C1K K9. MBDVC PKEHL PQEST PQUKI PRINS Q9U 7X8 7U5 8FD L7M 7S9 L.6 |
ID | FETCH-LOGICAL-c606t-73fa22e959eadfde40f074a9db4b296089405a48e84a2331a7e5ff1e1980178b3 |
IEDL.DBID | .~1 |
ISSN | 0379-0738 1872-6283 |
IngestDate | Fri Jul 11 12:28:51 EDT 2025 Fri Jul 11 09:23:34 EDT 2025 Mon Jul 21 11:23:30 EDT 2025 Wed Aug 13 07:39:08 EDT 2025 Thu Apr 03 06:53:50 EDT 2025 Wed Apr 02 07:49:47 EDT 2025 Tue Jul 01 00:47:40 EDT 2025 Thu Apr 24 23:02:34 EDT 2025 Fri Feb 23 02:19:25 EST 2024 Sun Feb 23 10:19:24 EST 2025 Tue Aug 26 17:15:25 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1-3 |
Keywords | Duplicated region detection Image forensics Authentication Copy-move forgery Transformation Forensic science Legal medicine Forensic aspect Diagnosis Detection Image |
Language | English |
License | https://www.elsevier.com/tdm/userlicense/1.0 CC BY 4.0 Copyright © 2012 Elsevier Ireland Ltd. All rights reserved. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c606t-73fa22e959eadfde40f074a9db4b296089405a48e84a2331a7e5ff1e1980178b3 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 content type line 14 ObjectType-Undefined-1 ObjectType-Feature-3 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 ObjectType-Feature-1 |
PMID | 23149318 |
PQID | 1268741898 |
PQPubID | 1226354 |
PageCount | 9 |
ParticipantIDs | proquest_miscellaneous_2000365448 proquest_miscellaneous_1315657758 proquest_miscellaneous_1273504708 proquest_journals_1268741898 pubmed_primary_23149318 pascalfrancis_primary_26846199 crossref_citationtrail_10_1016_j_forsciint_2012_10_031 crossref_primary_10_1016_j_forsciint_2012_10_031 elsevier_sciencedirect_doi_10_1016_j_forsciint_2012_10_031 elsevier_clinicalkeyesjournals_1_s2_0_S0379073812004859 elsevier_clinicalkey_doi_10_1016_j_forsciint_2012_10_031 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2013-01-10 |
PublicationDateYYYYMMDD | 2013-01-10 |
PublicationDate_xml | – month: 01 year: 2013 text: 2013-01-10 day: 10 |
PublicationDecade | 2010 |
PublicationPlace | Kidlington |
PublicationPlace_xml | – name: Kidlington – name: Ireland – name: Amsterdam |
PublicationTitle | Forensic science international |
PublicationTitleAlternate | Forensic Sci Int |
PublicationYear | 2013 |
Publisher | Elsevier Ireland Ltd Elsevier Elsevier Limited |
Publisher_xml | – name: Elsevier Ireland Ltd – name: Elsevier – name: Elsevier Limited |
References | Bayram, Sencar, Memon (bib0040) 2009 Datar, Immorlica, Indyk, Mirrokni (bib0065) 2004 Fridrich, Soukal, Lukáš (bib0020) 2003 Li, Wu, Tu, Sun (bib0035) 2007 Kundur, Hatzinakos (bib0010) 1999; 87 Roy, Sun (bib0015) 2007 . Database for object and concept recognition. Available A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004. Deng, Dong, Socher, Li, Li, Li (bib0070) 2009 Huang, Lu, Sun, Long (bib0025) 2011; 206 Indyk, Motwani (bib0060) 1998 Ryu, Lee, Lee (bib0045) 2010 Mahdian, Saic (bib0050) 2007; 171 Farid (bib0005) 2009; 26 Yap, Jiang, Kot (bib0055) 2010; 32 Kodak lossless true color image suite. Available 10.1016/j.forsciint.2012.10.031_bib0075 10.1016/j.forsciint.2012.10.031_bib0030 Roy (10.1016/j.forsciint.2012.10.031_bib0015) 2007 Indyk (10.1016/j.forsciint.2012.10.031_bib0060) 1998 10.1016/j.forsciint.2012.10.031_bib0080 Deng (10.1016/j.forsciint.2012.10.031_bib0070) 2009 Kundur (10.1016/j.forsciint.2012.10.031_bib0010) 1999; 87 Li (10.1016/j.forsciint.2012.10.031_bib0035) 2007 Huang (10.1016/j.forsciint.2012.10.031_bib0025) 2011; 206 Mahdian (10.1016/j.forsciint.2012.10.031_bib0050) 2007; 171 Datar (10.1016/j.forsciint.2012.10.031_bib0065) 2004 Bayram (10.1016/j.forsciint.2012.10.031_bib0040) 2009 Ryu (10.1016/j.forsciint.2012.10.031_bib0045) 2010 Yap (10.1016/j.forsciint.2012.10.031_bib0055) 2010; 32 Fridrich (10.1016/j.forsciint.2012.10.031_bib0020) 2003 Farid (10.1016/j.forsciint.2012.10.031_bib0005) 2009; 26 |
References_xml | – volume: 206 start-page: 178 year: 2011 end-page: 184 ident: bib0025 article-title: Improved DCT-based detection of copy-move forgery in images publication-title: Forensic Sci. Int. – reference: Kodak lossless true color image suite. Available: – start-page: 604 year: 1998 end-page: 613 ident: bib0060 article-title: Approximate nearest neighbors: towards removing the curse of dimensionality publication-title: Proc. 30th ACM Symp. Theory of Computing – reference: Database for object and concept recognition. Available: – start-page: 117 year: 2007 end-page: 120 ident: bib0015 article-title: Robust hash for detecting and localizing image tampering publication-title: Proc. IEEE Conf. Image Processing – start-page: 51 year: 2010 end-page: 65 ident: bib0045 article-title: Detection of copy-rotate-move forgery using Zernike moments publication-title: Proc. Information Hiding – year: 2003 ident: bib0020 article-title: Detection of copy-move forgery in digital images publication-title: Proc. Digital Forensic Research Workshop – start-page: 1750 year: 2007 end-page: 1753 ident: bib0035 article-title: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD publication-title: Proc. IEEE Conf. Multimedia and Expo – reference: . – reference: A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004. – volume: 26 start-page: 16 year: 2009 end-page: 25 ident: bib0005 article-title: Image forgery detection: a survey publication-title: IEEE Signal Process. Mag. – start-page: 1053 year: 2009 end-page: 1056 ident: bib0040 article-title: An efficient and robust method for detecting copy-move forgery publication-title: Proc. IEEE Conf. Acoustics, Speech and Signal Processing – start-page: 253 year: 2004 end-page: 262 ident: bib0065 article-title: Locality-sensitive hashing scheme based on p-stable distributions publication-title: Proc. 20th ACM Symp. Computational Geometry – volume: 171 start-page: 180 year: 2007 end-page: 189 ident: bib0050 article-title: Detection of copy-move forgery using a method based on blur moment invariants publication-title: Forensic Sci. Int. – start-page: 248 year: 2009 end-page: 255 ident: bib0070 article-title: ImageNet: a large-scale hierarchical image database publication-title: Proc. IEEE Conf. Computer Vision and Pattern Recognition – volume: 87 start-page: 1167 year: 1999 end-page: 1180 ident: bib0010 article-title: Digital watermarking for telltale tamper proofing and authentication publication-title: Proc. IEEE – volume: 32 start-page: 1259 year: 2010 end-page: 1270 ident: bib0055 article-title: Two-dimensional polar harmonic transforms for invariant image representation publication-title: IEEE Trans. Pattern Anal. Mach. Intell. – volume: 32 start-page: 1259 issue: 7 year: 2010 ident: 10.1016/j.forsciint.2012.10.031_bib0055 article-title: Two-dimensional polar harmonic transforms for invariant image representation publication-title: IEEE Trans. Pattern Anal. Mach. Intell. doi: 10.1109/TPAMI.2009.119 – start-page: 604 year: 1998 ident: 10.1016/j.forsciint.2012.10.031_bib0060 article-title: Approximate nearest neighbors: towards removing the curse of dimensionality – start-page: 117 year: 2007 ident: 10.1016/j.forsciint.2012.10.031_bib0015 article-title: Robust hash for detecting and localizing image tampering – start-page: 253 year: 2004 ident: 10.1016/j.forsciint.2012.10.031_bib0065 article-title: Locality-sensitive hashing scheme based on p-stable distributions – start-page: 1053 year: 2009 ident: 10.1016/j.forsciint.2012.10.031_bib0040 article-title: An efficient and robust method for detecting copy-move forgery – ident: 10.1016/j.forsciint.2012.10.031_bib0030 – volume: 171 start-page: 180 issue: 2–3 year: 2007 ident: 10.1016/j.forsciint.2012.10.031_bib0050 article-title: Detection of copy-move forgery using a method based on blur moment invariants publication-title: Forensic Sci. Int. doi: 10.1016/j.forsciint.2006.11.002 – ident: 10.1016/j.forsciint.2012.10.031_bib0075 – volume: 87 start-page: 1167 issue: 7 year: 1999 ident: 10.1016/j.forsciint.2012.10.031_bib0010 article-title: Digital watermarking for telltale tamper proofing and authentication publication-title: Proc. IEEE doi: 10.1109/5.771070 – volume: 206 start-page: 178 issue: 1–3 year: 2011 ident: 10.1016/j.forsciint.2012.10.031_bib0025 article-title: Improved DCT-based detection of copy-move forgery in images publication-title: Forensic Sci. Int. doi: 10.1016/j.forsciint.2010.08.001 – ident: 10.1016/j.forsciint.2012.10.031_bib0080 – year: 2003 ident: 10.1016/j.forsciint.2012.10.031_bib0020 article-title: Detection of copy-move forgery in digital images – start-page: 51 year: 2010 ident: 10.1016/j.forsciint.2012.10.031_bib0045 article-title: Detection of copy-rotate-move forgery using Zernike moments – volume: 26 start-page: 16 issue: 2 year: 2009 ident: 10.1016/j.forsciint.2012.10.031_bib0005 article-title: Image forgery detection: a survey publication-title: IEEE Signal Process. Mag. doi: 10.1109/MSP.2008.931079 – start-page: 248 year: 2009 ident: 10.1016/j.forsciint.2012.10.031_bib0070 article-title: ImageNet: a large-scale hierarchical image database – start-page: 1750 year: 2007 ident: 10.1016/j.forsciint.2012.10.031_bib0035 article-title: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD |
SSID | ssj0005526 |
Score | 2.4324992 |
Snippet | Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same... Abstract Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the... |
SourceID | proquest pubmed pascalfrancis crossref elsevier |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 59 |
SubjectTerms | Accuracy Algorithms Approximation Authentication Biological and medical sciences Copy-move forgery detection Duplicated region detection Forensic medicine Forensic sciences Forgery General aspects Genital system. Mammary gland image analysis Image forensics Investigative techniques, diagnostic techniques (general aspects) Medical sciences Missiles Pathology Pathology. Cytology. Biochemistry. Spectrometry. Miscellaneous investigative techniques Post-processing Principal components analysis Public health. Hygiene Public health. Hygiene-occupational medicine Reproduction Robustness Searching Studies tampering Transforms |
SummonAdditionalLinks | – databaseName: Health & Medical Collection dbid: 7X7 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fi9QwEA56vgiH-NvqeUTwtdomTZP4IiIepw--6MG-haRN5OQurbYn-t8706ZdDtw7YaELTbrZzmTmm-TLDCEvQ-G4FK3Lq0bXuHQTcgd6lDPPKy_g49qJIPu5Pj6pPm3EJi24DYlWudjEyVC3XYNr5K9LVivMtKLV2_5HjlWjcHc1ldC4SW5h6jKkdMmN3FI8BKsvcboAB4JjOY1IoizZK6R18XKXR9rv7QDvKcwFLnYj0MkTHd0ldxKEpO9mmd8jN3y8T_bn9Tc6Hyt6QM4-noOloE3X_8nPu1-ehm46_0xbP07sq0jRgbUUvvQY3kJTpMDTcUGy1MaWTinHf58CrPU0YrrbYYQrBPSgOjRtQ8RvD8nJ0Yev74_zVFkhbyBgGXPJg2XMa6FBkULrqyIAlLC6dZVjENMoDTjOVsqryjLOSyu9CKH0pQaHJpXjj8he7KJ_QigYicCcDqywEJs5p0KlAoA27rUNkruM1MvbNU1KO47VL87Mwi_7blaxGBQL3gCxZKRYO_Zz5o3ru6hFfGY5WAqm0IB3uL6r_FdXP6QpPZjSDMwU5kvBpQa7CMAIrZ_QGXmz9kyoZUYj__ezh5e0bP2nmIQHYlt4-sGidmY7lHUuZOTFehvsAm722Oi7C2wjuSgqWVzVhpe46w0h4-42bEpZJCCKz8jjWe23g-QQX4NTeHr1IJ-R22wqIoLkyQOyN_688M8Byo3ucJqvfwFCRUtw priority: 102 providerName: ProQuest |
Title | Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching |
URI | https://www.clinicalkey.com/#!/content/1-s2.0-S0379073812004859 https://www.clinicalkey.es/playcontent/1-s2.0-S0379073812004859 https://dx.doi.org/10.1016/j.forsciint.2012.10.031 https://www.ncbi.nlm.nih.gov/pubmed/23149318 https://www.proquest.com/docview/1268741898 https://www.proquest.com/docview/1273504708 https://www.proquest.com/docview/1315657758 https://www.proquest.com/docview/2000365448 |
Volume | 224 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELem8YI0Ib4JjMpIvGZNbKe2eRvTpg6kCgGT-mbZjY2KtiQi2TRe-Nu5y9eooAwJqUqq2Je6vsvd_eK7MyGvQ-K4zHIXi5We4aubEDuQo5h5LnwGH5e3AbKL2fxMvFtmyx1yNOTCYFhlr_s7nd5q6_7KtJ_NabVeTz8lXAKyA4uDjFYZJvEJIVHKD378EuaRsW69UmKyDlcbMV7gF8Kt1wUGVabsAMO8eLrNQu1VtoZ5C92GF9s90tYyndwn93qXkh52o35AdnzxkOx17-Nol2b0iJyfXoDmoKuy-h5flFeehrLNh6a5b9porIKiQcspfKkQ7kJXDImnzeDZUlvktC1Bfr0GN9fTAsvf1g2cAeCDKNF-WaL48picnRx_PprH_U4L8QoATBNLHixjXmcaBCvkXiQBXAurcyccA4yjNPh1ViivhGWcp1b6LITUpxoMnFSOPyG7RVn4Z4SC0gjM6cASC1jNORWECuDEca9tkNxFZDbMrln1ZchxN4xzM8SbfTUjWwyyBRuALRFJRsKqq8RxO4ka2GeGRFNQjQasxe2k8k-kvu4f8dqkpmYmMb-JYUTejJQbkvxvPzvZkLLxn2JRHsC6cPf9QezMzVCgFasQaRWRV2Mz6Alc_LGFLy-xj-RZImTytz48xVVwgJDb-7C2hFEGqD4iTzuxvxkkB7wNRuL5_0zBC3KXtVuOYKjlPtltvl36l-D4NW7SPtlwlEs5IXcOT9_PF3B-e7z48PEnMMVcTA |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3rb9MwELdG9wGkCfGmMIaR4GMgsZ2HkRDisallo0KwSfvm2Yk9irYkkAzYP8XfyF1e1SS68WVSpVbKXeL6Lne_s893hDx1vuFxmBlPpDLCpRvnGdAjj1kubAgfkzUJsrNosic-7If7K-RPfxYG0yp7m9gY6qxIcY38RcCiBCutyOR1-d3DrlG4u9q30GjVYtue_oKQrXo1fQ_yfcbY1ubuu4nXdRXwUgDrtRdzpxmzMpQwiS6zwnfgRrXMjDAM8HwiAcNokdhEaMZ5oGMbOhdYiM6xlb3hcN8rZFVwCGVGZPXt5uzT50VSSciiM1lkgDzBlc1zTNsM2HNMJOPBMh-4VuoKJOPalhrLMW_j-7ZukOsdaKVvWi27SVZsfoustSt-tD3IdJscTY_BNtG0KE-94-Knpa5oTlzTzNZNvldO0WVmFH6UGFADKSbd07rHzlTnGW2KnP-eA5C2NMcCu1UN3_PDr6CstNv4yA_vkL1LmfW7ZJQXub1PKJglx4x0zNcQDRqTOJE4gIncSu1ibsYk6mdXpV2hc-y3caT6jLZvahCLQrHgBRDLmPgDY9nW-riYJenFp_qjrGB8Ffiji1njf7HaqjMilQpUxZSvvvg8lmCJAYqhvQ3lmLwcODuc1OKf_3vsxhktG_4plv2BaBruvt6rnVoMZXj7xuTJcBksEW4v6dwWJ0gT89AXsX8eDQ9wnx2C1OU0rCmSFAoBNPdatV8MkkNED27owfmDfEyuTnY_7qid6Wz7IbnGmhYmmLq5Tkb1jxP7CIBkbTa6t5eSg8s2GH8BXi2JKw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1taxQxEA61gghFfPe01gj6ce1ukt1sBBGxHj0rRdDCfYvJblJP2t3V3ar9a_46Z_btKHitXwoHd7DJbm5nMvNM8mSGkGc-tFzGuQ1EphJcuvGBBT0KmOPCxfCxeUuQ3U92D8T7eTxfI3-GszBIqxxsYmuo8zLDNfLtiCUpZlpR6bbvaREfd6avq-8BVpDCndahnEanInvu9BeEb_Wr2Q7I-jlj03ef3-4GfYWBIAPg3gSSe8OYU7GCF-pzJ0IPLtWo3ArLANunCvCMEalLhWGcR0a62PvIQaSOZe0th_teIVcljyOcY3Iul_SSmCVn-GSAQcGpLQokcEbsBVLKeLTKG25UpgYZ-a64xmr023rB6U1yo4ev9E2nb7fImituk41u7Y92R5rukKPZMVgpmpXVaXBc_nTUl-3Za5q7pmV-FRSdZ07hR4WhNTRF-j1tBhRNTZHTNt357wVAakcLTLVbN_C9OPwKakv7LZDi8C45uJR3fo-sF2XhHhAKBsozqzwLDcSF1qZepB4AI3fKeMnthCTD29VZn_IcK28c6YHb9k2PYtEoFrwAYpmQcOxYdVk_Lu6SDuLTw6FWMMMaPNPFXeW_urq6Nye1jnTNdKg_hVwqsMkAytDyxmpCXo49e8TUIaH_e-zWGS0b_ykmAIK4Gu6-OaidXg5lnIcT8nS8DDYJN5pM4coTbAMzIhQyPK8Nj3DHHcLV1W1Ymy4pFgLa3O_UfjlIDrE9OKSH5w_yCbkGZkJ_mO3vPSLXWVvLBDmcm2S9-XHiHgOibOxWO3Up-XLZtuIvC-aL-w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+copy-move+forgery+detection+based+on+polar+cosine+transform+and+approximate+nearest+neighbor+searching&rft.jtitle=Forensic+science+international&rft.au=Li%2C+Yuenan&rft.date=2013-01-10&rft.issn=0379-0738&rft.volume=224&rft.issue=1-3&rft.spage=59&rft.epage=67&rft_id=info:doi/10.1016%2Fj.forsciint.2012.10.031&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_forsciint_2012_10_031 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fcdn.clinicalkey.com%2Fck-thumbnails%2F03790738%2FS0379073812X00112%2Fcov150h.gif |