Keypoint based comprehensive copy‐move forgery detection

Image and video coding Computer vision and image processing techniques QA76.75-76.765 Optical, image and video signal processing Photography 0202 electrical engineering, electronic engineering, information engineering Image recognition Computer software 02 engineering and technology TR1-1050
DOI: 10.1049/ipr2.12105 Publication Date: 2020-12-28T06:58:42Z
ABSTRACT
Abstract Verifying the authenticity of a digital image has been challenging problem. The simplest tampering tricks is copy‐move forgery. In forgery copied portion pasted on another part same image. Geometrical transformations are used portions before pasting it for tampered to look realistic and visually convincing. To make more complex, other processing approaches may also be applied in forged region hiding traces These processings scale, rotation, JPEG compression, AWGN. this paper, an approach based features CenSurE keypoint detector FREAK descriptor proposed. This combination novelty itself as never purpose best authors' literature studies. detectors fast give stable accurate output even case rotated images, which we club with binary FREAK. Hierarchical clustering Neighbourhood search such way that can locate detect multiple forgeries. authors hopeful proposed real‐time authentication detection.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (37)
CITATIONS (20)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....