A robust technique for copy-move forgery detection from small and extremely smooth tampered regions based on the DHE-SURF features and mDBSCAN clustering

The keypoint-based copy-move forgery (CMF) detection is one of the most widely used CMF detection methods; however the keypoint-based CMF detection method cannot effectively and efficiently detect ...

[1]  Mohamed Abdel-Basset,et al.  2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.

[2]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[3]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[4]  Chien-Chang Chen,et al.  Rotational copy-move forgery detection using SIFT and region growing strategies , 2019, Multimedia Tools and Applications.

[5]  M. Ali Akber Dewan,et al.  A Dynamic Histogram Equalization for Image Contrast Enhancement , 2007, IEEE Transactions on Consumer Electronics.

[6]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[7]  Zhihua Xia,et al.  A copy-move forgery detection method based on CMFD-SIFT , 2016, Multimedia Tools and Applications.

[8]  Edoardo Ardizzone,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .

[9]  Pradip K. Das,et al.  Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features , 2019, J. Inf. Secur. Appl..

[10]  Ghazali Sulong,et al.  Detection of copy-move image forgery based on discrete cosine transform , 2016, Neural Computing and Applications.

[11]  Babu M. Mehtre,et al.  Copy-move tampering detection using affine transformation property preservation on clustered keypoints , 2018, Signal Image Video Process..

[12]  Fan Yang,et al.  Copy-move forgery detection based on hybrid features , 2017, Eng. Appl. Artif. Intell..

[13]  Shuang Chen,et al.  Robust Region Duplication Detection on Log-Polar Domain Using Band Limitation , 2017 .

[14]  Vilas M. Thakare,et al.  A Survey on Keypoint Based Copy-paste Forgery Detection Techniques , 2016 .

[15]  Cordelia Schmid,et al.  A Performance Evaluation of Local Descriptors , 2005, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  Pradip K. Das,et al.  CMFD: a detailed review of block based and key feature based techniques in image copy-move forgery detection , 2018, IET Image Process..

[17]  Zulfiqar Habib,et al.  Copy-move and splicing image forgery detection and localization techniques: a review , 2017 .

[18]  R. Belk Extended Self in a Digital World , 2013 .

[19]  Chi-Man Pun,et al.  Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy-Move Forgery Detection , 2016, Inf. Sci..

[20]  RochaAnderson,et al.  Going deeper into copy-move forgery detection , 2015 .

[21]  Khizar Hayat,et al.  Forgery detection in digital images via discrete wavelet and discrete cosine transforms , 2017, Comput. Electr. Eng..

[22]  Zahid Mehmood,et al.  Data hiding technique in steganography for information security using number theory , 2018, J. Inf. Sci..

[23]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Zhi Zhang,et al.  An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features , 2018, Symmetry.

[25]  Ahmad Mahmoudi Aznaveh,et al.  Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.

[26]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[27]  Zahid Mehmood,et al.  A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform , 2018, J. Vis. Commun. Image Represent..

[28]  Zahid Mehmood,et al.  An efficient forensic technique for exposing region duplication forgery in digital images , 2017, Applied Intelligence.

[29]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[30]  Mohamed Deriche,et al.  A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..

[31]  Anderson Rocha,et al.  Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..

[32]  Sabu M. Thampi,et al.  Advances in Signal Processing and Intelligent Recognition Systems - selected and revised papers from the International Symposium on Signal Processing and Intelligent Recognition Systems, SIRS 2014, March 13-15, 2014, Trivandrum, India , 2014, SIRS.

[33]  Qi Han,et al.  Feature point-based copy-move forgery detection: covering the non-textured areas , 2014, Multimedia Tools and Applications.