References
- Zhang Z, Wang C, Zhou X. A survey on passive image copy-move forgery detection. J Inf Process Syst. 2018;14(1):6–31. doi:https://doi.org/10.3745/JIPS.02.0078
- Shanmugapriya S, Jegatheesan R. Improved football game optimization for state estimation and power quality enhancement. Comput Electr Eng. 2020;81. doi:https://doi.org/10.1016/j.compeleceng.2019.106547
- Jabeen S, Mehmood Z, Mahmood T, Saba T, Rehman A, Mahmood M. An effective content-based image retrieval technique for image visuals representation based on the bag-of-visual-words model. PLoS ONE. 2018;13(4). doi:https://doi.org/10.1371/journal.pone.0194526
- Sarwar A, Mehmood Z, Saba T, Qazi K, Adnan A, Jamal H. A novel method for content-based image retrieval to improve the effectiveness of the bag-of-words model using a support vector machine. J Inf Sci. 2018. doi:https://doi.org/10.1177/0165551518782825
- Mehmood Z, Syed MA, Muhammad A. A novel image retrieval based on rectangular spatial histograms of visual words. Kuwait J Sci. 2018;45(1):54–69.
- Sharif U, Mehmood Z, Mahmood T, Javid MA, Rehman A, Saba T. Scene analysis and search using local features and support vector machine for effective content-based image retrieval. Artif Intell Rev. 2019;52(2):901–925. doi:https://doi.org/10.1007/s10462-018-9636-0.
- Li G, Wu Q, Tu D, Sun SJ. A Sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. Proceedings IEEE Int Conf Multimedia and Expo. 2007;1750–1753. doi:https://doi.org/10.1109/ICME.2007.4285009
- Mahdian B, Saic S. Using noise inconsistencies for blind image forensics. Image Vis Comput. 2009;27(10):1497–1503. doi:https://doi.org/10.1016/j.imavis.2009.02.001
- Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G. A SIFT-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur. 2011;6(3):1099–1110. doi:https://doi.org/10.1109/tifs.2011.2129512
- Muhammad G, Hussain M, Bebis G. Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Invest. 2012;9(1):49–57. doi:https://doi.org/10.1016/j.diin.2012.04.004
- Hashmi MF, Hambarde AR, Keskar AG. Copy-move forgery detection using DCT and SIFT. Int J Comput Appl. 2013;70(7):30–34. doi:https://doi.org/10.5120/11977-7847
- Mehak TG. Optimization of copy-move forgery detection technique. Comput Eng Appl J. 2013;2(2). doi:https://doi.org/10.18495/comengapp.v2i2.23
- Yu L, Han Q, Niu X. Feature point-based copy-move forgery detection: covering the non-textured areas. Multimed Tools Appl. 2014;75(2):1159–1176. doi:https://doi.org/10.1007/s11042-014-2362-y
- Hashmi M, Anand V, Keskar A. Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia. 2014;9:.84–91. doi:https://doi.org/10.1016/j.aasri.2014.09.015
- Yohannan RP, Manuel M. Detection of copy-move forgery based on Gabor filter. In 2016 IEEE Int Conf Eng Technol. 2016;3(2). doi:https://doi.org/10.21090/ijaerd.030223
- Shivakumar BL, Baboo SS. Detection of region duplication forgery in digital images using SURF. Int J Comput Sci Issues. 2017;14(6):1–7. doi:https://doi.org/10.20943/01201706.17
- Kiruthika K, Mahalakshmi SD, Vijayalakshmi K. Detecting multiple copies of copy-move forgery based on SURF. Int J Innovative Res Sci, Eng Technol. 2019;8(6S):676–680. doi:https://doi.org/10.35940/ijeat.f1133.0886s19
- Huang H, Ciou A. Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation. EURASIP J Image Video Process. 1;2019. doi:https://doi.org/10.1186/s13640-019-0469-9
- Paul KH, Akshatha KR, Karunakar AK, Seshadri S. Forgery detection based on KNN classifier using SURF feature extraction. Int J Recent Technol Eng. 2019;8(2):1600–1607. doi:https://doi.org/10.35940/ijrte.b2311.078219
- Tian X, Zhou G, Xu M. Image copy-move forgery detection algorithm based on ORB and novel similarity metric. IET Image Process. 2020;14(10):2092–2100. doi:https://doi.org/10.1049/iet-ipr.2019.1145
- Priyanka SG, Singh K. An improved block based copy-move forgery detection technique. Multimed Tools Appl. 2020;79(19–20):13011–13035. doi:https://doi.org/10.1007/s11042-019-08354
- Park J, Kang T, Moon Y, Eom I. Copy-move forgery detection using scale invariant feature and reduced local binary pattern histogram. Symmetry. 2020;12(4):492. doi:https://doi.org/10.3390/sym12040492
- Bilal M, Habib HA, Mehmood Z, Yousaf RM, Saba T, Rehman A. A robust technique for copy-move forgery detection from small and extremely smooth tampered regions based on the DHE-SURF features and mDBSCAN clustering. Aust J Forensic Sci. 2020;1–24. doi:https://doi.org/10.1080/00450618.2020.1715479
- Bilal M, Habib HA, Mehmood Z, Saba T, Rashid M. Single and multiple copy–move forgery detection and localization in digital images based on the sparsely encoded distinctive features and DBSCAN clustering. Arab J Sci Eng. 2020;45(4):2975–2992. doi:https://doi.org/10.1007/s13369-019-04238-2.
- Warif N, Wahab A, Idris M, Ramli R, Salleh R, Shamshirband S, Choo KKR. Copy-move forgery detection: survey, challenges and future directions. J Network Comput Appl. 2016;75:.259–278. doi:https://doi.org/10.1016/j.jnca.2016.09.008
- Wang L, Zhang Y, Feng J. On the Euclidean distance of images. IEEE Trans Pattern Anal Mach Intell. 2005;27(8):1334–1339. doi:https://doi.org/10.1109/tpami.2005.165
- Fischler M, Bolles R. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun ACM. 1981;24(6):381–395. doi:https://doi.org/10.1145/358669.358692
- Harris CG, Stephens M. A combined corner and edge detector. 4th Alvey Vision Conf. 1988;6(1):53. doi:https://doi.org/10.1016/0262-8856(88)90047-9
- Zhang Y, Wu L. An Mr Brain images classifier via principal component analysis and Kernel support vector machine. Prog Electromagn Res. 2012;130:.369–388. doi:https://doi.org/10.2528/pier12061410
- Morissette L, Chartier S. The k-means clustering technique: general considerations and implementation in mathematica. Tutor Quant Methods Psychol. 2013;9(1):15–24. doi:https://doi.org/10.20982/tqmp.09.1.p015s
- Pinar C, Erkan B. Bernstain-search differential evolution algorithm for numerical function optimization. Expert Syst Appl. 2019;138:.112831. doi:https://doi.org/10.1016/j.eswa.2019.112831
- Qazi KA, Nawaz T, Mehmood Z, Rashid M, Habib HA. A hybrid technique for speech segregation and classification using a sophisticated deep neural network. PLoS One. 2018;13(3):e0194151. doi:https://doi.org/10.1371/journal.pone.0194151
- Yang F, Li J, Lu W, Weng J. Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell. 2017;59(3):73–83. doi:https://doi.org/10.1016/j.engappai.2016.12.022
- Huang Y, Lu W, Sun W, Long D. Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int. 2011;206(1–3):178–184. doi:https://doi.org/10.1016/j.forsciint.2010.08.001