47
Views
1
CrossRef citations to date
0
Altmetric
Articles

Spatial-contextual texture and edge analysis approach for unsupervised change detection of faces in counterfeit images

&
Pages 143-159 | Received 20 Jul 2015, Accepted 08 May 2016, Published online: 06 Jun 2016

References

  • Piva A. An overview on image forensics. ISRN Signal Process. 2013;2013:22, Article ID 496701. Italy: Department of Electronics and Telecommunications, University of Florence.
  • De Carvalho TJ, Riess C, Angelopoulou E, et al. Exposing Digital Image Forgeries by Illumination Color Classification. IEEE Trans. Inf. Forensics Secur. 2013;8:1182–1194.
  • www.google.co.in/
  • Beulah David D. Automatic change detection method for an indoor environment. Int. J. Adv. Networking Appl. 2011;2:956–962.
  • Beulah David D, Krishna BV. Comparison of analog and discrete hopfield neural network for image change detection. CIIT Int. J. Digital Image Process. 2010;2:313–317.
  • Beulah David D, Dr Dorairangaswamy MA. Diverse proportion unsupervised change detection system for satellite images. NCIICT 2014; 2014 Jan 23–24; SCSVMV University, Tamilnadu, India.
  • Beulah David D, Dr Dorairangaswamy MA. Automated discrete HNN method for change detection in raster graphics file formats. NCASG 2013; AVIT, Tamilnadu, India; 2013 May 3.
  • Beulah David D, Dr Dorairangaswamy MA. GA approach for detecting changes in images taken at different instances. ICMEB 2012; Tamilnadu, India. 2012 Mar 9–10.
  • Rocha A, Scheirer W, Boult TE, et al. Vision of the unseen: current trends and challenges in digital image and video forensics. ACM Comput. Surv. 2011;43:26:1–26:42.10.1145/1978802
  • Ostrovsky Y, Cavanagh P, Sinha P. Perceiving illumination inconsistencies in scenes. Perception. 2005;34:1301–1314.10.1068/p5418
  • Johnson M, Farid H. Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. Proceedings of the ACM Workshop on Multimedia and Security; New York (NY); 2005. p. 1–10
  • Johnson M, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Trans. Inf. Forensics Secur. 2007;2:450–461.10.1109/TIFS.2007.903848
  • Johnson M, Farid H. Exposing digital forgeries through specular highlights on the eye. Proceedings of the international workshop on information hiding; Jun 11–13; Saint Malo, France. 2007. p. 311–325.
  • Barnard K, Cardei V, Funt B. A comparison of computational color constancy algorithms. I: methodology and experiments with synthesized data. IEEE Trans. Image Process. 2002;11:972–984.10.1109/TIP.2002.802531
  • Ebner M. Color constancy using local color shifts. Proceedings of the European Conference on Computer Vision. Part III. 2004 May; Prague, Czech Republic. 2004. p. 276–287.
  • Gijsenij A, Lu R, Gevers T. Color constancy for multiple light sources. IEEE Trans. Image Process. 2012;21:697–707.10.1109/TIP.2011.2165219
  • www.internationaljournalssrg.org
  • Wu X, Fang Z. Image splicing detection using illuminant color inconsistency. Proceedings of the IEEE International Conference on Multimedia Information, Networking and Security; Shanghai, China. 2011 Nov. p. 600–603.
  • Kavitha VP, Priyatha M. A novel digital image forgery detection method using SVM classifier. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 2014;3:160–165.
  • Gepshtein S, Keller Y. Image completion by diffusion maps and spectral relaxation. IEEE Trans. Image Process. 2013;22:2983–2994.10.1109/TIP.2013.2237916
  • www.colorconstancy.com
  • http://robotics.eecs.berkeley.edu/~ronf/Biomimetics/people.html
  • www.ise.stanford.edu
  • www.specialchem4coatings.com
  • Farid H. A 3-D lighting and shadow analysis of the JFK Zapruder film (Frame 317). Tech. Rep. TR2010–677. Dartmouth College; 2010.
  • Theo E. Real-time Viola Jones face detection in a web browser, Proceedings of the Canadian Conference on Computer and Robot Vision; Canada. 2009.
  • Beulah David D, Dr Dorairangaswamy MA. Prediction of cyclone using multi-temporal change detected satellite. NC3N 2014; 2014 Apr 5; Tamilnadu, India.
  • http://www.pleated-jeans.com/2012/11/05/guy-photoshops-celebrities-into-his-christmas-parties/
  • Beulah David D, Dr Dorairangaswamy MA. Precipitation forecasting with cloud images. Int. J. Res. Comput. 1, ISSN: , 2014.
  • www.sacramentofamilydentist.com/
  • http://www.buzzfeed.com/virginmobilelive/celebrities-posing-with-the-old-versions-of-themselves
  • Beulah David D, Dr Dorairangaswamy MA. Accurate Object detection using static camera and security alert to mobile. ENACT 2012; Sathyabama University; 2012 Oct 4–5.
  • Fridrich J, Soukal D, Lukas J. Detection of copy–move forgery in digital images. Proceedings of Digital Forensic Research Workshop; Cleveland, OH; Aug 2003. p. 55–61.
  • Popescu A, Farid H. Exposing digital forgeries by detecting duplicated image regions. Technical Report TR2004-515. Department of Computer Science, Dartmouth College; 2004 (Unpublished).
  • Li GH, Wu Q, Tu D. et al. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. Proceedings of 2007 IEEE International Conference on Multimedia and Expo; Beijing, China: IEEE; 2007, p. 1750–1753.10.1109/ICME.2007.4285009
  • Jing L, Shao C. Image copy-move forgery detecting based on local invariant feature. J. Multimedia. 2012;7:90–97.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.