116
Views
0
CrossRef citations to date
0
Altmetric
Articles

Dominating direction based an efficient copy–move image tampering detection technique

ORCID Icon & ORCID Icon
Pages 254-262 | Received 10 Mar 2017, Accepted 10 Jun 2017, Published online: 10 Jan 2018

References

  • Singh D, Shivani S, Agarwal S. Quantization based fragile watermarking using block wise authentication and pixel wise recovery scheme for tampered image. Int. J. Image Graph. 2013;13(2):1340002-1–1340002-11.
  • Shivani S, Singh D, Agarwal S. DCT based approach for tampered image detection and recovery using block wise fragile watermarking scheme. Proceedings of International Conference on 6th Iberian Conference on Pattern Recognition and Image Analysis, Portugal, 2013, 640–647, Springer LNCS.
  • Shivani S, Patel A, Kamble S, et al. An efficient pixel wise fragile watermarking scheme based on ARA bits. Proceedings of International Conference on Communication, Computing and Security (ICCCS), Rourkela, 12–14 February 2011, 221–226.
  • Amerini I, Ballan L, Caldelli R, et al. Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process. Image Commun. 2013;28:659–669. doi: 10.1016/j.image.2013.03.006
  • Hashmia FM, Anand, V, Keskar, GA, Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. Proceedings of the 2014 AASRI Conference on Circuit and Signal Processing (CSP 2014), 2014, 84–91.
  • Ardizzone E, Bruno A, Mazzola G. Copy–move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 2016;10:2084–2094. doi: 10.1109/TIFS.2015.2445742
  • Jing L, Shao C. Image copy-move forgery detecting based on local invariant feature. J. Multimed. 2012;7:90–97. doi: 10.4304/jmm.7.1.90-97
  • Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images. Digital Forensics Research Workshop. 2003.
  • Huang Y, Lu W, Sun W, et al. Improved DCT-based detection of copy-move forgery in images. Forensic. Sci. Int. 2011;206:178–184. doi: 10.1016/j.forsciint.2010.08.001
  • Zhao J, Guo J. Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic. Sci. Int. 2013;233:158–166. doi: 10.1016/j.forsciint.2013.09.013
  • Kaushik R, Bajaj KR, Mathew J. On image forgery detection using two-dimensional discrete cosine transform and statistical moments. Proceedings of the 4th International Conference on Eco-friendly Computing and Communication Systems, Procedia Computer Science. 2015;70:130–136.
  • Popescu A, Farid H. Exposing digital forgeries by detecting duplicated image regions, Department of Computer Science, Dartmouth College. Technical Report. 2004; TR2004-515:1–11.
  • Kang X and Wei MS, Identifying tampered regions using singular value decomposition in digital image forensics. Proceedings of the 2008 International Conference on Computer Science and Software Engineering, 2008.
  • Bashar KM, Noda K, Ohnishi N, et al. Exploring duplicated regions in natural images. IEEE Trans. Image Process. 2010;1:1–40.
  • Mahdian B, Saic S. Detection of copy-move forgery using a method based on blur moment invariants. Forensic. Sci. Int. 2007;171:180–189. doi: 10.1016/j.forsciint.2006.11.002
  • Liu G, Wang J, Lian S, et al. A passive image authentication scheme for detecting region-duplication forgery with rotation. J. Netw. Comput. Appl. 2011;34:1557–1565. doi: 10.1016/j.jnca.2010.09.001
  • Lin JH, Wang WC, Kao TY. Fast copy-move forgery detection. WSEAS Trans. Signal Process. 2009;5:188–197.
  • Lynch G, Shih YF, Liao H. An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. (N.Y.). 2013;239:253–265. doi: 10.1016/j.ins.2013.03.028
  • Lee CJ, Chang PC, Chen KW. Detection of copy–move image forgery using histogram of orientated gradients. Inf. Sci. (N.Y.). 2015;321:250–262. doi: 10.1016/j.ins.2015.03.009
  • Warbhe DA, Dharaskar VR, Thakare MV. A scaling robust copy-paste tampering detection for digital image forensics. Proceedings of the 7th International Conference on Communication, Computing and Virtualization, 2016, Procedia Computer Science; 2016;79:458–465.
  • Do NM, Vetterli M. The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans. Image Process. 2005;14:2091–2106. doi: 10.1109/TIP.2005.859376
  • Klema CV. The singular value decomposition: its computation and some applications. IEEE Trans. Autom. Contr. 1980;25:164–176. doi: 10.1109/TAC.1980.1102314
  • Ng TT, Hsu J, Chang FS. Columbia image splicing detection evaluation dataset. Available from: http://www.ee.columbia.edu/ln/dvmm/downloads/AuthSplicedDataSet/AuthSplicedDataSet.htm/
  • Amerini I, Ballan L, Caldelli R, et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans. Inf. Forensic. Secur. 2011;6:1099–1110. doi: 10.1109/TIFS.2011.2129512

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.