149
Views
2
CrossRef citations to date
0
Altmetric
Papers

Spectral-hashing-based image retrieval and copy-move forgery detection

&
Pages 643-658 | Received 12 Nov 2014, Accepted 01 Oct 2015, Published online: 22 Jan 2016

References

  • Huang H, Guo W, Zhang Y. Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Dec.2008;2:272–276.
  • Pan X, Lyu S. Region Duplication Detection Using Image Feature Matching. IEEE Transactions on Information Forensics and Security. Dec. 2010;5(4):857–867.10.1109/TIFS.2010.2078506
  • Kudke SH, Gawande AD. Copy- move attack forgery detection by using SIFT. International Journal of Innovative Technology and Exploring Engineering (IJITEE). Apr 2013;2(5):221–224.
  • Bo X, Junwen W, Guangjie L, Yuewei D. Image Copy-Move Forgery Detection Based on SURF. Multimedia Information Networking and Security. Nov. 2010, p. 889–892.
  • Shivakumar BL, SanthoshBaboo Lt Dr S. Detection of Region Duplication Forgery in Digital ImagesUsing SURF. IJCSI International Journal of Computer Science Issues. July 2011;8(4), No 1:199–205.
  • Fridrich J, Soukal D, Luk′aˇs J. Detection of copy-move forgery in digital images. Proc. of Digital Forensic Research Workshop; 2003.
  • Cao Yanjun, Gao Tiegang, Fan Li, Yang Qunting. A robust detection algorithm for copy-move forgery in digital images. Elsevier, Forensic Science International. 2012.
  • Bashar M, Noda K, Ohnishi N, Mori K. Exploring Duplicated Regions in Natural Images. IEEE Transactions on Image Processing. Mar. 2010, accepted for publication.
  • Bayram S, Sencar H, Memon N. An efficient and robust method for detecting copy-move forgery. IEEE International Conference on Acoustics, Speech, and Signal Processing. Apr. 2009, p. 1053–1056.
  • Shao Hong, Tianshu Yu, Xu Mengjia, Cui Wencheng. Image region duplication detection based on circular window expansion and phase correlation. Elsevier, Forensic Science International. 2012.
  • Yuenan Li. Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Elsevier, Forensic Science International. 2013.
  • Popescu AC, Farid H. Exposing digital forgeries by detecting duplicated image regions. Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004. Alberta, Canada; 2010. p. 51–65.
  • Kang X, Wei S Identifying tampered regions using singular value decomposition in digital image forensics. Int Conf Comput Sci Soft Eng. 2008;3:926–930.
  • Leida Li, Shushang Li, Hancheng Zhu, Xiaoyue Wu. Detecting copymove forgery under affine transforms for image forensics. Elsevier, Computers and Electrical Engineering; 2013.
  • Liu GJ, Wang JW, Lian SG, Wang ZQ. A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 011;34:1557–1565.
  • Ryu SJ, Lee MJ, Lee HK. Detection of copy-rotate-move forgery using Zernike moments. Proceedings of the 12th information hiding conference, 2010.
  • Mahdian B, Saic S. Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sci Int. 2007;171:180–189.10.1016/j.forsciint.2006.11.002
  • Zhang D, Wang J, Cai D, Lu J. Self-taught hashing for fast similarity search. Proceedings of the 33rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR); 2010; Geneva, Switzerland.
  • Li Peng, Wang Meng, Cheng Jian, Xu Changsheng, Lu Hanqing. Spectral hashing with semantically consistent graph for image indexing. IEEE Trans Multimedia. May 2012;15(1):141–152.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.