Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching

Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as r...

Full description

Saved in:
Bibliographic Details
Published inForensic science international Vol. 224; no. 1-3; pp. 59 - 67
Main Author Li, Yuenan
Format Journal Article
LanguageEnglish
Published Kidlington Elsevier Ireland Ltd 10.01.2013
Elsevier
Elsevier Limited
Subjects
Online AccessGet full text
ISSN0379-0738
1872-6283
1872-6283
DOI10.1016/j.forsciint.2012.10.031

Cover

Loading…
Abstract Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting.
AbstractList Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting.
Abstract Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting.
Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting.Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting.
Author Li, Yuenan
Author_xml – sequence: 1
  givenname: Yuenan
  surname: Li
  fullname: Li, Yuenan
  email: yuenanlee@yahoo.com.cn
  organization: School of Electronic and Information Engineering, Tianjin University, No. 92, Weijin Road, Tianjin, PR China
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=26846199$$DView record in Pascal Francis
https://www.ncbi.nlm.nih.gov/pubmed/23149318$$D View this record in MEDLINE/PubMed
BookMark eNqNkl2L1DAUhousuB_6F7Qggjcd89UkvVBZFj8WFrxQr0Oans5mbJMx6SzOv_eUmXVhQHauUtLnvDnnvO95cRJigKJ4RcmCEirfrRZ9TNl5H6YFI5Th7YJw-qQ4o1qxSjLNT4ozwlVTEcX1aXGe84oQUtdMPitOGaei4VSfFcP1aJdQurjeVmO8gxJ1l5C2ZQcTuMnHULY2Q1fixzoONiGafYBySjZkhMfShq6063WKf_xoJygD2AR5wtMvb9uYyowX7taH5fPiaW-HDC_250Xx8_OnH1dfq5tvX66vLm8qJ4mcKsV7yxg0dQO26zsQpCdK2KZrRcsaSXQjSG2FBi0s45xaBXXfU6CNJlTpll8Ub3e62NTvDfZiRp8dDIMNEDfZMNwEl7UQ-lGUclrLWqn6CJQpXhOhyIy-PkBXcZMCzoyU1EpQ3czUyz21aUfozDrhAtPW3LuDwJs9YLOzQ48rdz4_cFILSZsGufc7zqWYc4LeOD_Z2Tx0yQ-GEjOnxqzMv9SYOTXzD0wN1quD-vsnHq-83FUC2nnnIRmEIDjofML4mC76IzQ-HGi4wQePA_-CLeSHzZnMDDHf51TPoaZoo9D1PP7H_wsc1cJf5e8LQQ
CODEN FSINDR
CitedBy_id crossref_primary_10_1016_j_jvcir_2024_104075
crossref_primary_10_1016_j_dsp_2021_103032
crossref_primary_10_1016_j_forsciint_2018_12_004
crossref_primary_10_1109_TIP_2021_3132828
crossref_primary_10_1007_s11042_017_5374_6
crossref_primary_10_1007_s42452_020_3181_6
crossref_primary_10_1007_s11042_019_08343_0
crossref_primary_10_1049_iet_ipr_2018_5356
crossref_primary_10_1016_j_ins_2016_01_061
crossref_primary_10_1016_j_jvcir_2022_103658
crossref_primary_10_1007_s11042_020_09415_2
crossref_primary_10_1109_TPAMI_2022_3204971
crossref_primary_10_1016_j_jnca_2016_09_008
crossref_primary_10_1155_2022_7715753
crossref_primary_10_1007_s10489_022_04104_z
crossref_primary_10_5370_JEET_2015_10_4_1886
crossref_primary_10_1049_iet_ipr_2018_6035
crossref_primary_10_3390_app11041574
crossref_primary_10_1049_iet_ipr_2017_0441
crossref_primary_10_1016_j_ins_2019_09_085
crossref_primary_10_1155_2016_8713202
crossref_primary_10_1007_s11042_018_6201_4
crossref_primary_10_1016_j_asoc_2020_106728
crossref_primary_10_1109_TIFS_2016_2585118
crossref_primary_10_1109_TIFS_2019_2957693
crossref_primary_10_1142_S0218001422540167
crossref_primary_10_1007_s11042_017_4625_x
crossref_primary_10_1109_TMM_2023_3345160
crossref_primary_10_1016_j_jfranklin_2020_01_025
crossref_primary_10_1080_18756891_2016_1161364
crossref_primary_10_1007_s10044_017_0678_8
crossref_primary_10_1016_j_ins_2018_06_040
crossref_primary_10_1007_s11042_022_12755_w
crossref_primary_10_1007_s11042_018_5899_3
crossref_primary_10_1007_s11042_016_4179_3
crossref_primary_10_1007_s11042_018_6922_4
crossref_primary_10_1109_TIFS_2015_2455334
crossref_primary_10_1007_s11042_022_13519_2
crossref_primary_10_1007_s11042_019_7342_9
crossref_primary_10_1007_s11045_018_0624_y
crossref_primary_10_1109_LSP_2013_2267775
crossref_primary_10_1016_j_image_2015_08_008
crossref_primary_10_1049_iet_ipr_2016_0229
crossref_primary_10_1080_13682199_2018_1461345
crossref_primary_10_1007_s11042_019_07817_5
crossref_primary_10_1109_ACCESS_2022_3212069
crossref_primary_10_1007_s11045_016_0416_1
crossref_primary_10_1007_s11042_016_3687_5
crossref_primary_10_1142_S0218001423500118
crossref_primary_10_1016_j_jvcir_2018_03_015
crossref_primary_10_1007_s10044_019_00840_0
crossref_primary_10_1007_s11042_024_19584_z
crossref_primary_10_1016_j_eswa_2021_115282
crossref_primary_10_1142_S0218001422540192
crossref_primary_10_1007_s11042_014_2362_y
crossref_primary_10_1109_ACCESS_2020_2995392
crossref_primary_10_1142_S0219467821500546
crossref_primary_10_1016_j_jisa_2020_102481
crossref_primary_10_1109_ACCESS_2019_2907316
crossref_primary_10_1007_s11042_019_7165_8
crossref_primary_10_1016_j_asoc_2021_107893
crossref_primary_10_1155_2014_975456
crossref_primary_10_1007_s11042_019_08354_x
crossref_primary_10_1016_j_jvcir_2024_104221
crossref_primary_10_1016_j_ipm_2024_103685
crossref_primary_10_1016_j_jvcir_2017_04_004
crossref_primary_10_1007_s10489_017_1038_5
crossref_primary_10_1007_s11265_018_1417_0
crossref_primary_10_1007_s11042_018_6666_1
crossref_primary_10_1007_s11042_019_7713_2
crossref_primary_10_1007_s11554_016_0622_y
crossref_primary_10_1007_s00500_019_04298_4
crossref_primary_10_3390_sym12040492
crossref_primary_10_1007_s11042_017_5094_y
crossref_primary_10_1109_TCSVT_2018_2804768
crossref_primary_10_1007_s11042_023_15506_7
crossref_primary_10_1016_j_jisa_2018_11_001
crossref_primary_10_1109_TMM_2017_2760098
crossref_primary_10_1007_s00500_022_07432_x
crossref_primary_10_1007_s11042_020_09655_2
crossref_primary_10_1080_13682199_2019_1663069
crossref_primary_10_1007_s11042_015_2872_2
crossref_primary_10_1016_j_patrec_2021_10_007
crossref_primary_10_1109_TIFS_2016_2553645
crossref_primary_10_1007_s11277_021_09227_z
Cites_doi 10.1109/TPAMI.2009.119
10.1016/j.forsciint.2006.11.002
10.1109/5.771070
10.1016/j.forsciint.2010.08.001
10.1109/MSP.2008.931079
ContentType Journal Article
Copyright 2012 Elsevier Ireland Ltd
Elsevier Ireland Ltd
2014 INIST-CNRS
Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Copyright_xml – notice: 2012 Elsevier Ireland Ltd
– notice: Elsevier Ireland Ltd
– notice: 2014 INIST-CNRS
– notice: Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
DBID AAYXX
CITATION
IQODW
NPM
3V.
7QP
7RV
7U7
7X7
7XB
88E
8FE
8FH
8FI
8FJ
8FK
8G5
ABUWG
AFKRA
AZQEC
BBNVY
BENPR
BHPHI
C1K
CCPQU
DWQXO
FYUFA
GHDGH
GNUQQ
GUQSH
HCIFZ
K9.
KB0
LK8
M0S
M1P
M2O
M7P
MBDVC
NAPCQ
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
7X8
7U5
8FD
L7M
7S9
L.6
DOI 10.1016/j.forsciint.2012.10.031
DatabaseName CrossRef
Pascal-Francis
PubMed
ProQuest Central (Corporate)
Calcium & Calcified Tissue Abstracts
Nursing & Allied Health Database
Toxicology Abstracts
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Natural Science Collection
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
Biological Science Collection
ProQuest Central
Natural Science Collection
Environmental Sciences and Pollution Management
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Central Student
ProQuest Research Library
SciTech Premium Collection‎ (ProQuest)
ProQuest Health & Medical Complete (Alumni)
Nursing & Allied Health Database (Alumni Edition)
ProQuest Biological Science Collection
ProQuest Health & Medical Collection
PML(ProQuest Medical Library)
ProQuest research library
Biological Science Database
Research Library (Corporate)
Nursing & Allied Health Premium
ProQuest Central Premium
ProQuest One Academic
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
MEDLINE - Academic
Solid State and Superconductivity Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
AGRICOLA
AGRICOLA - Academic
DatabaseTitle CrossRef
PubMed
Research Library Prep
ProQuest Central Student
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest One Health & Nursing
Research Library (Alumni Edition)
ProQuest Natural Science Collection
ProQuest Central China
Environmental Sciences and Pollution Management
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
Natural Science Collection
ProQuest Central Korea
Health & Medical Research Collection
Biological Science Collection
ProQuest Research Library
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest Biological Science Collection
ProQuest Central Basic
Toxicology Abstracts
ProQuest One Academic Eastern Edition
ProQuest Nursing & Allied Health Source
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
Biological Science Database
ProQuest SciTech Collection
ProQuest Hospital Collection (Alumni)
Nursing & Allied Health Premium
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest Nursing & Allied Health Source (Alumni)
ProQuest One Academic
Calcium & Calcified Tissue Abstracts
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
Technology Research Database
Advanced Technologies Database with Aerospace
Solid State and Superconductivity Abstracts
AGRICOLA
AGRICOLA - Academic
DatabaseTitleList AGRICOLA
Technology Research Database
Research Library Prep


MEDLINE - Academic

PubMed
Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Public Health
EISSN 1872-6283
EndPage 67
ExternalDocumentID 2862842571
23149318
26846199
10_1016_j_forsciint_2012_10_031
S0379073812004859
1_s2_0_S0379073812004859
Genre Research Support, Non-U.S. Gov't
Journal Article
GroupedDBID ---
--K
--M
.1-
.4L
.FO
.~1
04C
0R~
186
1B1
1P~
1RT
1~.
1~5
4.4
457
4G.
5GY
5RE
5VS
7-5
71M
7RV
7X7
88E
8FE
8FH
8FI
8FJ
8G5
8P~
9JM
9JN
9JO
AABNK
AAEDT
AAEDW
AAFJI
AAHBH
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARLI
AATTM
AAXKI
AAXUO
AAYWO
ABBQC
ABFNM
ABFRF
ABGSF
ABJNI
ABLJU
ABMAC
ABMMH
ABMZM
ABOCM
ABUDA
ABUWG
ABWVN
ABXDB
ABZDS
ACDAQ
ACGFO
ACGFS
ACIEU
ACIUM
ACIWK
ACPRK
ACRLP
ACVFH
ADBBV
ADCNI
ADECG
ADEZE
ADFRT
ADUVX
AEBSH
AEFWE
AEHWI
AEIPS
AEKER
AENEX
AEUPX
AEVXI
AFKRA
AFPUW
AFRAH
AFRHN
AFTJW
AFXIZ
AFZHZ
AGCQF
AGHFR
AGUBO
AGYEJ
AHHHB
AHMBA
AIEXJ
AIIUN
AIKHN
AITUG
AJRQY
AJSZI
AJUYK
AKBMS
AKRWK
AKYEP
ALCLG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
ANZVX
AOMHK
AVARZ
AXJTR
AZQEC
BBNVY
BENPR
BHPHI
BKEYQ
BKOJK
BLXMC
BMSDO
BNPGV
BPHCQ
BVXVI
CCPQU
CS3
DU5
DWQXO
EBD
EBS
EFJIC
EFKBS
EIHBH
EJD
EO8
EO9
EP2
EP3
EX3
F5P
FDB
FIRID
FLBIZ
FNPLU
FYGXN
FYUFA
G-Q
GBLVA
GNUQQ
GUQSH
HCIFZ
HMCUK
I-F
IAO
IEA
IHE
ILT
IOF
J1W
KOM
LK8
M1P
M29
M2O
M41
M7P
MO0
N9A
NAPCQ
O-L
O9-
OAUVE
OG0
OGGZJ
OS0
OZT
P-8
P-9
P2P
PC.
PHGZM
PHGZT
PJZUB
PPXIY
PQGLB
PQQKQ
PRBVW
PROAC
PSQYO
PUEGO
Q38
RNS
ROL
RPZ
SAE
SCC
SDF
SDG
SDP
SEL
SES
SPC
SPCBC
SSB
SSH
SSK
SSO
SSP
SSU
SSZ
T5K
TAE
TN5
UKHRP
ULE
WH7
WOW
Z5R
~02
~G-
.GJ
29H
3O-
3V.
53G
AACTN
AAQXK
ACNNM
ACRPL
ADMUD
ADNMO
AFCTW
AFFNX
AFJKZ
AFKWA
AGRDE
AJOXV
ALIPV
AMFUW
ASPBG
AVWKF
AZFZN
FEDTE
FGOYB
G-2
HDY
HMK
HMO
HVGLF
HZ~
ITC
PKN
R2-
RIG
SCB
SEW
WUQ
ZGI
AAIAV
AATCM
ABLVK
ABYKQ
AJBFU
AKYCK
DOVZS
EFLBG
LCYCR
AAYXX
AGQPQ
AGRNS
AIGII
APXCP
CITATION
IQODW
NPM
7QP
7U7
7XB
8FK
C1K
K9.
MBDVC
PKEHL
PQEST
PQUKI
PRINS
Q9U
7X8
7U5
8FD
L7M
7S9
L.6
ID FETCH-LOGICAL-c606t-73fa22e959eadfde40f074a9db4b296089405a48e84a2331a7e5ff1e1980178b3
IEDL.DBID .~1
ISSN 0379-0738
1872-6283
IngestDate Fri Jul 11 12:28:51 EDT 2025
Fri Jul 11 09:23:34 EDT 2025
Mon Jul 21 11:23:30 EDT 2025
Wed Aug 13 07:39:08 EDT 2025
Thu Apr 03 06:53:50 EDT 2025
Wed Apr 02 07:49:47 EDT 2025
Tue Jul 01 00:47:40 EDT 2025
Thu Apr 24 23:02:34 EDT 2025
Fri Feb 23 02:19:25 EST 2024
Sun Feb 23 10:19:24 EST 2025
Tue Aug 26 17:15:25 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1-3
Keywords Duplicated region detection
Image forensics
Authentication
Copy-move forgery
Transformation
Forensic science
Legal medicine
Forensic aspect
Diagnosis
Detection
Image
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
CC BY 4.0
Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c606t-73fa22e959eadfde40f074a9db4b296089405a48e84a2331a7e5ff1e1980178b3
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Undefined-1
ObjectType-Feature-3
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
ObjectType-Feature-1
PMID 23149318
PQID 1268741898
PQPubID 1226354
PageCount 9
ParticipantIDs proquest_miscellaneous_2000365448
proquest_miscellaneous_1315657758
proquest_miscellaneous_1273504708
proquest_journals_1268741898
pubmed_primary_23149318
pascalfrancis_primary_26846199
crossref_citationtrail_10_1016_j_forsciint_2012_10_031
crossref_primary_10_1016_j_forsciint_2012_10_031
elsevier_sciencedirect_doi_10_1016_j_forsciint_2012_10_031
elsevier_clinicalkeyesjournals_1_s2_0_S0379073812004859
elsevier_clinicalkey_doi_10_1016_j_forsciint_2012_10_031
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2013-01-10
PublicationDateYYYYMMDD 2013-01-10
PublicationDate_xml – month: 01
  year: 2013
  text: 2013-01-10
  day: 10
PublicationDecade 2010
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
– name: Ireland
– name: Amsterdam
PublicationTitle Forensic science international
PublicationTitleAlternate Forensic Sci Int
PublicationYear 2013
Publisher Elsevier Ireland Ltd
Elsevier
Elsevier Limited
Publisher_xml – name: Elsevier Ireland Ltd
– name: Elsevier
– name: Elsevier Limited
References Bayram, Sencar, Memon (bib0040) 2009
Datar, Immorlica, Indyk, Mirrokni (bib0065) 2004
Fridrich, Soukal, Lukáš (bib0020) 2003
Li, Wu, Tu, Sun (bib0035) 2007
Kundur, Hatzinakos (bib0010) 1999; 87
Roy, Sun (bib0015) 2007
.
Database for object and concept recognition. Available
A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.
Deng, Dong, Socher, Li, Li, Li (bib0070) 2009
Huang, Lu, Sun, Long (bib0025) 2011; 206
Indyk, Motwani (bib0060) 1998
Ryu, Lee, Lee (bib0045) 2010
Mahdian, Saic (bib0050) 2007; 171
Farid (bib0005) 2009; 26
Yap, Jiang, Kot (bib0055) 2010; 32
Kodak lossless true color image suite. Available
10.1016/j.forsciint.2012.10.031_bib0075
10.1016/j.forsciint.2012.10.031_bib0030
Roy (10.1016/j.forsciint.2012.10.031_bib0015) 2007
Indyk (10.1016/j.forsciint.2012.10.031_bib0060) 1998
10.1016/j.forsciint.2012.10.031_bib0080
Deng (10.1016/j.forsciint.2012.10.031_bib0070) 2009
Kundur (10.1016/j.forsciint.2012.10.031_bib0010) 1999; 87
Li (10.1016/j.forsciint.2012.10.031_bib0035) 2007
Huang (10.1016/j.forsciint.2012.10.031_bib0025) 2011; 206
Mahdian (10.1016/j.forsciint.2012.10.031_bib0050) 2007; 171
Datar (10.1016/j.forsciint.2012.10.031_bib0065) 2004
Bayram (10.1016/j.forsciint.2012.10.031_bib0040) 2009
Ryu (10.1016/j.forsciint.2012.10.031_bib0045) 2010
Yap (10.1016/j.forsciint.2012.10.031_bib0055) 2010; 32
Fridrich (10.1016/j.forsciint.2012.10.031_bib0020) 2003
Farid (10.1016/j.forsciint.2012.10.031_bib0005) 2009; 26
References_xml – volume: 206
  start-page: 178
  year: 2011
  end-page: 184
  ident: bib0025
  article-title: Improved DCT-based detection of copy-move forgery in images
  publication-title: Forensic Sci. Int.
– reference: Kodak lossless true color image suite. Available:
– start-page: 604
  year: 1998
  end-page: 613
  ident: bib0060
  article-title: Approximate nearest neighbors: towards removing the curse of dimensionality
  publication-title: Proc. 30th ACM Symp. Theory of Computing
– reference: Database for object and concept recognition. Available:
– start-page: 117
  year: 2007
  end-page: 120
  ident: bib0015
  article-title: Robust hash for detecting and localizing image tampering
  publication-title: Proc. IEEE Conf. Image Processing
– start-page: 51
  year: 2010
  end-page: 65
  ident: bib0045
  article-title: Detection of copy-rotate-move forgery using Zernike moments
  publication-title: Proc. Information Hiding
– year: 2003
  ident: bib0020
  article-title: Detection of copy-move forgery in digital images
  publication-title: Proc. Digital Forensic Research Workshop
– start-page: 1750
  year: 2007
  end-page: 1753
  ident: bib0035
  article-title: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
  publication-title: Proc. IEEE Conf. Multimedia and Expo
– reference: .
– reference: A.C. Popescu, H. Farid, Exposing digital forgeries by detecting duplicated image regions, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.
– volume: 26
  start-page: 16
  year: 2009
  end-page: 25
  ident: bib0005
  article-title: Image forgery detection: a survey
  publication-title: IEEE Signal Process. Mag.
– start-page: 1053
  year: 2009
  end-page: 1056
  ident: bib0040
  article-title: An efficient and robust method for detecting copy-move forgery
  publication-title: Proc. IEEE Conf. Acoustics, Speech and Signal Processing
– start-page: 253
  year: 2004
  end-page: 262
  ident: bib0065
  article-title: Locality-sensitive hashing scheme based on p-stable distributions
  publication-title: Proc. 20th ACM Symp. Computational Geometry
– volume: 171
  start-page: 180
  year: 2007
  end-page: 189
  ident: bib0050
  article-title: Detection of copy-move forgery using a method based on blur moment invariants
  publication-title: Forensic Sci. Int.
– start-page: 248
  year: 2009
  end-page: 255
  ident: bib0070
  article-title: ImageNet: a large-scale hierarchical image database
  publication-title: Proc. IEEE Conf. Computer Vision and Pattern Recognition
– volume: 87
  start-page: 1167
  year: 1999
  end-page: 1180
  ident: bib0010
  article-title: Digital watermarking for telltale tamper proofing and authentication
  publication-title: Proc. IEEE
– volume: 32
  start-page: 1259
  year: 2010
  end-page: 1270
  ident: bib0055
  article-title: Two-dimensional polar harmonic transforms for invariant image representation
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
– volume: 32
  start-page: 1259
  issue: 7
  year: 2010
  ident: 10.1016/j.forsciint.2012.10.031_bib0055
  article-title: Two-dimensional polar harmonic transforms for invariant image representation
  publication-title: IEEE Trans. Pattern Anal. Mach. Intell.
  doi: 10.1109/TPAMI.2009.119
– start-page: 604
  year: 1998
  ident: 10.1016/j.forsciint.2012.10.031_bib0060
  article-title: Approximate nearest neighbors: towards removing the curse of dimensionality
– start-page: 117
  year: 2007
  ident: 10.1016/j.forsciint.2012.10.031_bib0015
  article-title: Robust hash for detecting and localizing image tampering
– start-page: 253
  year: 2004
  ident: 10.1016/j.forsciint.2012.10.031_bib0065
  article-title: Locality-sensitive hashing scheme based on p-stable distributions
– start-page: 1053
  year: 2009
  ident: 10.1016/j.forsciint.2012.10.031_bib0040
  article-title: An efficient and robust method for detecting copy-move forgery
– ident: 10.1016/j.forsciint.2012.10.031_bib0030
– volume: 171
  start-page: 180
  issue: 2–3
  year: 2007
  ident: 10.1016/j.forsciint.2012.10.031_bib0050
  article-title: Detection of copy-move forgery using a method based on blur moment invariants
  publication-title: Forensic Sci. Int.
  doi: 10.1016/j.forsciint.2006.11.002
– ident: 10.1016/j.forsciint.2012.10.031_bib0075
– volume: 87
  start-page: 1167
  issue: 7
  year: 1999
  ident: 10.1016/j.forsciint.2012.10.031_bib0010
  article-title: Digital watermarking for telltale tamper proofing and authentication
  publication-title: Proc. IEEE
  doi: 10.1109/5.771070
– volume: 206
  start-page: 178
  issue: 1–3
  year: 2011
  ident: 10.1016/j.forsciint.2012.10.031_bib0025
  article-title: Improved DCT-based detection of copy-move forgery in images
  publication-title: Forensic Sci. Int.
  doi: 10.1016/j.forsciint.2010.08.001
– ident: 10.1016/j.forsciint.2012.10.031_bib0080
– year: 2003
  ident: 10.1016/j.forsciint.2012.10.031_bib0020
  article-title: Detection of copy-move forgery in digital images
– start-page: 51
  year: 2010
  ident: 10.1016/j.forsciint.2012.10.031_bib0045
  article-title: Detection of copy-rotate-move forgery using Zernike moments
– volume: 26
  start-page: 16
  issue: 2
  year: 2009
  ident: 10.1016/j.forsciint.2012.10.031_bib0005
  article-title: Image forgery detection: a survey
  publication-title: IEEE Signal Process. Mag.
  doi: 10.1109/MSP.2008.931079
– start-page: 248
  year: 2009
  ident: 10.1016/j.forsciint.2012.10.031_bib0070
  article-title: ImageNet: a large-scale hierarchical image database
– start-page: 1750
  year: 2007
  ident: 10.1016/j.forsciint.2012.10.031_bib0035
  article-title: A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD
SSID ssj0005526
Score 2.4324992
Snippet Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same...
Abstract Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the...
SourceID proquest
pubmed
pascalfrancis
crossref
elsevier
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 59
SubjectTerms Accuracy
Algorithms
Approximation
Authentication
Biological and medical sciences
Copy-move forgery
detection
Duplicated region detection
Forensic medicine
Forensic sciences
Forgery
General aspects
Genital system. Mammary gland
image analysis
Image forensics
Investigative techniques, diagnostic techniques (general aspects)
Medical sciences
Missiles
Pathology
Pathology. Cytology. Biochemistry. Spectrometry. Miscellaneous investigative techniques
Post-processing
Principal components analysis
Public health. Hygiene
Public health. Hygiene-occupational medicine
Reproduction
Robustness
Searching
Studies
tampering
Transforms
SummonAdditionalLinks – databaseName: Health & Medical Collection
  dbid: 7X7
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fi9QwEA56vgiH-NvqeUTwtdomTZP4IiIepw--6MG-haRN5OQurbYn-t8706ZdDtw7YaELTbrZzmTmm-TLDCEvQ-G4FK3Lq0bXuHQTcgd6lDPPKy_g49qJIPu5Pj6pPm3EJi24DYlWudjEyVC3XYNr5K9LVivMtKLV2_5HjlWjcHc1ldC4SW5h6jKkdMmN3FI8BKsvcboAB4JjOY1IoizZK6R18XKXR9rv7QDvKcwFLnYj0MkTHd0ldxKEpO9mmd8jN3y8T_bn9Tc6Hyt6QM4-noOloE3X_8nPu1-ehm46_0xbP07sq0jRgbUUvvQY3kJTpMDTcUGy1MaWTinHf58CrPU0YrrbYYQrBPSgOjRtQ8RvD8nJ0Yev74_zVFkhbyBgGXPJg2XMa6FBkULrqyIAlLC6dZVjENMoDTjOVsqryjLOSyu9CKH0pQaHJpXjj8he7KJ_QigYicCcDqywEJs5p0KlAoA27rUNkruM1MvbNU1KO47VL87Mwi_7blaxGBQL3gCxZKRYO_Zz5o3ru6hFfGY5WAqm0IB3uL6r_FdXP6QpPZjSDMwU5kvBpQa7CMAIrZ_QGXmz9kyoZUYj__ezh5e0bP2nmIQHYlt4-sGidmY7lHUuZOTFehvsAm722Oi7C2wjuSgqWVzVhpe46w0h4-42bEpZJCCKz8jjWe23g-QQX4NTeHr1IJ-R22wqIoLkyQOyN_688M8Byo3ucJqvfwFCRUtw
  priority: 102
  providerName: ProQuest
Title Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching
URI https://www.clinicalkey.com/#!/content/1-s2.0-S0379073812004859
https://www.clinicalkey.es/playcontent/1-s2.0-S0379073812004859
https://dx.doi.org/10.1016/j.forsciint.2012.10.031
https://www.ncbi.nlm.nih.gov/pubmed/23149318
https://www.proquest.com/docview/1268741898
https://www.proquest.com/docview/1273504708
https://www.proquest.com/docview/1315657758
https://www.proquest.com/docview/2000365448
Volume 224
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELem8YI0Ib4JjMpIvGZNbKe2eRvTpg6kCgGT-mbZjY2KtiQi2TRe-Nu5y9eooAwJqUqq2Je6vsvd_eK7MyGvQ-K4zHIXi5We4aubEDuQo5h5LnwGH5e3AbKL2fxMvFtmyx1yNOTCYFhlr_s7nd5q6_7KtJ_NabVeTz8lXAKyA4uDjFYZJvEJIVHKD378EuaRsW69UmKyDlcbMV7gF8Kt1wUGVabsAMO8eLrNQu1VtoZ5C92GF9s90tYyndwn93qXkh52o35AdnzxkOx17-Nol2b0iJyfXoDmoKuy-h5flFeehrLNh6a5b9porIKiQcspfKkQ7kJXDImnzeDZUlvktC1Bfr0GN9fTAsvf1g2cAeCDKNF-WaL48picnRx_PprH_U4L8QoATBNLHixjXmcaBCvkXiQBXAurcyccA4yjNPh1ViivhGWcp1b6LITUpxoMnFSOPyG7RVn4Z4SC0gjM6cASC1jNORWECuDEca9tkNxFZDbMrln1ZchxN4xzM8SbfTUjWwyyBRuALRFJRsKqq8RxO4ka2GeGRFNQjQasxe2k8k-kvu4f8dqkpmYmMb-JYUTejJQbkvxvPzvZkLLxn2JRHsC6cPf9QezMzVCgFasQaRWRV2Mz6Alc_LGFLy-xj-RZImTytz48xVVwgJDb-7C2hFEGqD4iTzuxvxkkB7wNRuL5_0zBC3KXtVuOYKjlPtltvl36l-D4NW7SPtlwlEs5IXcOT9_PF3B-e7z48PEnMMVcTA
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3rb9MwELdG9wGkCfGmMIaR4GMgsZ2HkRDisallo0KwSfvm2Yk9irYkkAzYP8XfyF1e1SS68WVSpVbKXeL6Lne_s893hDx1vuFxmBlPpDLCpRvnGdAjj1kubAgfkzUJsrNosic-7If7K-RPfxYG0yp7m9gY6qxIcY38RcCiBCutyOR1-d3DrlG4u9q30GjVYtue_oKQrXo1fQ_yfcbY1ubuu4nXdRXwUgDrtRdzpxmzMpQwiS6zwnfgRrXMjDAM8HwiAcNokdhEaMZ5oGMbOhdYiM6xlb3hcN8rZFVwCGVGZPXt5uzT50VSSciiM1lkgDzBlc1zTNsM2HNMJOPBMh-4VuoKJOPalhrLMW_j-7ZukOsdaKVvWi27SVZsfoustSt-tD3IdJscTY_BNtG0KE-94-Knpa5oTlzTzNZNvldO0WVmFH6UGFADKSbd07rHzlTnGW2KnP-eA5C2NMcCu1UN3_PDr6CstNv4yA_vkL1LmfW7ZJQXub1PKJglx4x0zNcQDRqTOJE4gIncSu1ibsYk6mdXpV2hc-y3caT6jLZvahCLQrHgBRDLmPgDY9nW-riYJenFp_qjrGB8Ffiji1njf7HaqjMilQpUxZSvvvg8lmCJAYqhvQ3lmLwcODuc1OKf_3vsxhktG_4plv2BaBruvt6rnVoMZXj7xuTJcBksEW4v6dwWJ0gT89AXsX8eDQ9wnx2C1OU0rCmSFAoBNPdatV8MkkNED27owfmDfEyuTnY_7qid6Wz7IbnGmhYmmLq5Tkb1jxP7CIBkbTa6t5eSg8s2GH8BXi2JKw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1taxQxEA61gghFfPe01gj6ce1ukt1sBBGxHj0rRdDCfYvJblJP2t3V3ar9a_46Z_btKHitXwoHd7DJbm5nMvNM8mSGkGc-tFzGuQ1EphJcuvGBBT0KmOPCxfCxeUuQ3U92D8T7eTxfI3-GszBIqxxsYmuo8zLDNfLtiCUpZlpR6bbvaREfd6avq-8BVpDCndahnEanInvu9BeEb_Wr2Q7I-jlj03ef3-4GfYWBIAPg3gSSe8OYU7GCF-pzJ0IPLtWo3ArLANunCvCMEalLhWGcR0a62PvIQaSOZe0th_teIVcljyOcY3Iul_SSmCVn-GSAQcGpLQokcEbsBVLKeLTKG25UpgYZ-a64xmr023rB6U1yo4ev9E2nb7fImituk41u7Y92R5rukKPZMVgpmpXVaXBc_nTUl-3Za5q7pmV-FRSdZ07hR4WhNTRF-j1tBhRNTZHTNt357wVAakcLTLVbN_C9OPwKakv7LZDi8C45uJR3fo-sF2XhHhAKBsozqzwLDcSF1qZepB4AI3fKeMnthCTD29VZn_IcK28c6YHb9k2PYtEoFrwAYpmQcOxYdVk_Lu6SDuLTw6FWMMMaPNPFXeW_urq6Nye1jnTNdKg_hVwqsMkAytDyxmpCXo49e8TUIaH_e-zWGS0b_ykmAIK4Gu6-OaidXg5lnIcT8nS8DDYJN5pM4coTbAMzIhQyPK8Nj3DHHcLV1W1Ymy4pFgLa3O_UfjlIDrE9OKSH5w_yCbkGZkJ_mO3vPSLXWVvLBDmcm2S9-XHiHgOibOxWO3Up-XLZtuIvC-aL-w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+copy-move+forgery+detection+based+on+polar+cosine+transform+and+approximate+nearest+neighbor+searching&rft.jtitle=Forensic+science+international&rft.au=Li%2C+Yuenan&rft.date=2013-01-10&rft.issn=0379-0738&rft.volume=224&rft.issue=1-3&rft.spage=59&rft.epage=67&rft_id=info:doi/10.1016%2Fj.forsciint.2012.10.031&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_forsciint_2012_10_031
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fcdn.clinicalkey.com%2Fck-thumbnails%2F03790738%2FS0379073812X00112%2Fcov150h.gif