A Study of Copy-Move Forgery Detection Scheme Based on Segmentation

被引:0
作者
Ikhlayel, Mohammed [1 ,2 ]
Hariadi, Mochamad [3 ]
Pumama, Ketut Eddy [4 ]
机构
[1] Inst Teknol Sepuluh Nopember, Dept Elect Engn, Surabaya, Indonesia
[2] Al Quds Open Univ, Fac Technol & Appl Sci, Ramallah, Palestine
[3] Inst Teknol Sepuluh Nopember, Dept Elect Engn, Surabaya, Indonesia
[4] Inst Teknol Sepuluh Nopember, Dept Comp Engn, Surabaya, Indonesia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2018年 / 18卷 / 07期
关键词
copy-move forgery detection; segmentation; Multi-Scale Feature Extraction; Adaptive Patch Matching;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A copy-move forgery in digital image is a type of passive technique it will contain a part of the copied image and pasted to another parts in the same image. This may be occurring by a forger to cover part of object or validity or to enhance the visual effect in the image. Nowadays, there are many advance editing software in digital image are used to tampering, the forger can easily tamper the image, as a result, the image truth or validity is lost. In this study we will introduce three scheme for copy-move forgery detection(CMFD) based on segmentation and comparing between them, we will discuss the Segmentation-Based Image CMFD, then, adaptive Oversegmentation and Feature Point Matching, Finally, Multi-scale feature extraction and adaptive matching for CMFD. The results indicate the very good performance of each schemes.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 23 条
  • [1] SLIC Superpixels Compared to State-of-the-Art Superpixel Methods
    Achanta, Radhakrishna
    Shaji, Appu
    Smith, Kevin
    Lucchi, Aurelien
    Fua, Pascal
    Suesstrunk, Sabine
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2012, 34 (11) : 2274 - 2281
  • [2] Copy-move forgery detection and localization by means of robust clustering with J-Linkage
    Amerini, Irene
    Ballan, Lamberto
    Caldelli, Roberto
    Del Bimbo, Alberto
    Del Tongo, Luca
    Serra, Giuseppe
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (06) : 659 - 669
  • [3] A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery
    Amerini, Irene
    Ballan, Lamberto
    Caldelli, Roberto
    Del Bimbo, Alberto
    Serra, Giuseppe
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 1099 - 1110
  • [4] Ardizzone E., 2010, P 2 ACM WORKSHOP MUL, P59
  • [5] AN EFFICIENT AND ROBUST METHOD FOR DETECTING COPY-MOVE FORGERY
    Bayram, Sevinc
    Sencar, Husrev Taha
    Memon, Nasir
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 1053 - +
  • [6] Bhanu MPB, 2017, PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), P224, DOI 10.1109/ISCO.2017.7855986
  • [7] Multi-scale feature extraction and adaptive matching for copy-move forgery detection
    Bi, XiuLi
    Pun, Chi-Man
    Yuan, Xiao-Chen
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 363 - 385
  • [8] Christlein V, 2010, P IEEE INT WORKSH IN, P1
  • [9] Fridrich J, 2003, P DIG FOR RES WORKSH, P55, DOI DOI 10.1109/PACIIA.2008.240
  • [10] Ghorbani M, 2011, 18 INT C SYST SIGN I, P1