1,966
Views
4
CrossRef citations to date
0
Altmetric
Research article

Keypoint-based passive method for image manipulation detection

ORCID Icon, , & | (Reviewing editor)
Article: 1523346 | Received 29 Jan 2018, Accepted 09 Sep 2018, Published online: 08 Oct 2018

References

  • Amerini, I. , Ballan, L. , Caldelli, R. , Bimbo, A. D. , & Serra, G. (2011). A sift-based forensic method for copy-move attack detection and transformation recovery. Transactions Informatics Forensics Secur (T.IFS) , 6(3), 1099–1110. doi:10.1109/TIFS.2011.2129512
  • Bashar, M. , Noda, K. , Ohnishi, N. , & Mori, K. (2010). Exploring duplicated regions in natural images. Transactions Image Processing (T.IP) . doi:10.1109/TIP.2010.2046599
  • Baumberg, A. (2000). Reliable feature matching across widely separated views . Proceedings of the interational conference on computer vision and pattern recognition (CVPR00) (pp. 774–781).
  • Bayram, S. , Sencar, H. T. , & Memon, N. (2009). An efficient and robust method for detecting copy-move forgery . Intl. Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 1053–1056).
  • Bravo-Solorio, S. , & Nandi, A. K. , (2011). Exposing duplicated regions affected by reflection, rotation and scaling . Intl. Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp.1880–1883).
  • Brown, M. , & Lowe, D. (2002). Invariant features from interest point groups . Proceedings of the 13th British Machine Vision Conference (BMVC02) (pp. 253–262). Cardiff.
  • Brown, M. , & Lowe, D. G. (2007). Automatic panoramic image stitching using invariant features. International Journal of Computer Vision , 74(1), 59–73. doi:10.1007/s11263-006-0002-3
  • Chen, L. , Lu, W. , Ni, J. , Sun, W. , & Huang, J. (2013). Region duplication detection based on Harris corner points and step sector statistics. Journal of Visual Communication and Image Representation , 24(3), 244–254. doi:10.1016/j.jvcir.2013.01.008
  • Christlein, V. , Riess, C. , Jordan, J. , Riess, C. , & Angelopoulou, E. (2012). An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security , 7(6), 1841–1854. doi:10.1109/TIFS.2012.2218597
  • Farid, H. (2009, Mar). Image forgery detection,”. IEEE Signalling Processing Mag , 26(2), 16–25. doi:10.1109/MSP.2008.931079
  • Fischler, M. A. , & Bolles, R. C. (1981). Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography. Communications of the ACM 24.6 . 381–395. doi:10.1145/358669.358692
  • Forstner, W. (1986). A feature-based correspondence algorithm for image matching. Int.L Archives Photogrammetry & Remote Sensing , 26(3), 150–166.
  • Fridrich, J. , Soukal, D. , & Lukas, J. (2003). Detection of copy-move forgery in digital images . Digital Forensic Research Workshop (DFRWS) pp. (134–137). Cleveland, USA.
  • Harris, C. (1992). Geometry from visual motion. In A. Blake & A. Yuille (Eds.), Active Vision (pp. 263–284). MIT Press.
  • Harris, C. , & Stephens, M. (1988). A combined corner and edge detector Alvey Vision ConferenceThe Plessey Company Pic (pp. 147–151). United Kingdom.
  • Huang, H. , Guo, W. , & Zhang, Y. (2008). Detection of copy-move forgery in digital images using sift algorithm . Pacific-Asia Workshop on Computational Intelligence and Industrial Application (PACIIA), Computer Society (pp. 272–276). doi:10.1177/1753193408087025
  • Kang, X. B. , & Wei, S. M. (2008). Identifying tampered regions using singular value decomposition in digital image forensics . International Conference on Computer Science and Software Engineering (vol. 3, pp. 926–930).
  • Li, G. , Wu, Q. , Tu, D. , & Sun, S. (2007). A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD . Intl. Conference on Multimedia and Expo. (ICME) (pp. 1750–1753).
  • Lin, H. J. , Wang, C. W. , & Kao, Y. T. (2009). Fast copy-move forgery detection. WSEAS Transactions Signalling Processing (WSEAS-TSP) , 188–197.
  • Luo, W. , Huang, J. , & Qiu, G. (2006). Robust detection of region-duplication forgery in digital image . Intl. Conference on Pattern Recognition (ICPR) (pp. 746–749).
  • Mahdian, B. , & Saic, S. (2006). Detection of copy-move forgery using a method based on blur moment invariants. Forensic Sciences International , 180–189.
  • Mikolajczyk, K. , & Schmid, C. (2003). A performance evaluation of local descriptors . Proceedings of the Interational Conference on Computer Vision and Pattern Recognition (CVPR03) .
  • Moravec, H. P. (1980). Obstacle avoidance and navigation in the real world by a seeing robot rover. No. STAN-CS-80-813 . Stanford Univ CA Dept of Computer Science.
  • Pan, X. , & Lyu, S. (2010a), Detecting image region duplication using sift features . Intl. Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 1706–1709).
  • Pan, X. , & Lyu, S. (2010b). Region duplication detection using image feature matching. Transactions Informatics Forensics Secur (T.IFS) , 5(4), 857–867. doi:10.1109/TIFS.2010.2078506
  • Popescu, A. C. , & Farid, H. (2004). Exposing digital forgeries by detecting duplicated image regions . Hanover, USA: Tech. Rep. TR 2004-515, Dept. of Computer Science- Dartmouth College.
  • Ryu, S.-J. , Lee, M.-J. , & Lee, H.-K. (2010). Detection of copy-rotate-move forgery using zernike moments . Intl. Workshop in Information Hiding (IHW) (pp. 51–65). doi:10.1177/1753193409101663
  • Schmid, C. , & Mohr, R. (1997, May). Local grayvalue invariants for image retrieval. IEEE Transactions on Pattern Analysis and Machine Intelligence , 19(5), 530–535. doi:10.1109/34.589215
  • Shivakumar, B. L. , & Baboo, S. (2011). Detection of region duplication forgery in digital images using SURF. International Journal Computation Sciences Issues , 8, 199–205.
  • Shivakumar, B. L. , & Santhosh Baboo, S. (2011). Detection of region duplication forgery in digital images using SURF. IJCSI International Journal of Computer Science , 8(4).
  • Silva, E. , Carvalho, T. , Ferreira, A. , & Rocha, A. (2015). Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. Journal of Visual Communication and Image Representation , 29, 16–32. doi:10.1016/j.jvcir.2015.01.016
  • Tralic, D. , Zupancic, I. , Grgic, S. , & Grgic, M. (2013). CoMoFoD - New database for copy-move forgery detection . Proc. 55th International Symposium ELMAR (pp. 49–54).
  • Tuytelaars, T. , & Van Gool, L. (2000). Wide baseline stereo matching based on local, affinely invariant regions . Proceedings of the 11th British Machine Vision Conference (BMVC00) pp. (412–422). Bristol, UK.
  • Wang, J. , Liu, G. , Li, H. , Dai, Y. , & Wang, Z. (2009). Detection of image region duplication forgery using model with circle block . Intl. Conference on Multimedia Information Networking and Security (MINES) (pp.25–29).
  • Wang, J. W. , Liu, G. J. , Zhang, Z. , Dai, Y. W. , & Wang, Z. Q. (2010). Fast and robust forensics for image region-duplication forgery. Acta Automatica Sinica , 35, 1488–1495. doi:10.3724/SP.J.1004.2009.01488
  • Xu, B. , Wang, J. , Liu, G. , Li, H. , & Dai, Y. (2010). Image copy-move forgery detection based on surf . Intl. Conference on Multimedia Information Networking and Security (MINES) (pp.889–892). doi:10.1089/ast.2010.0480
  • Zhang, J. , Feng, Z. , & Su, Y. (2010). A new approach for detecting copy-move forgeries in digital images . Intl. Conference on Communication Systems (ICCS) (pp. 362–366). doi:10.1177/1753193410362645