Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks |
Deng, Jiehang
(School of Computers, Guangdong University of Technology)
Yang, Jixiang (School of Computers, Guangdong University of Technology) Weng, Shaowei (School of Information Engineering, Guangdong University of Technology) Gu, Guosheng (School of Computers, Guangdong University of Technology) Li, Zheng (School of Computers, Guangdong University of Technology) |
1 | Z. Zhang, D. Wang, C. Wang, and X. Zhou, "Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors," KSII Transactions on Internet & Information Systems, vol. 11, no. 9, pp. 4567-4587, September, 2017. DOI |
2 | A. Popescu, and H. Farid, "Exposing digital forgeries by detecting duplicated image region," Department of Computer Science, Dartmouth College, Technology Report TR2004-515, 2004. |
3 | B. Mahdian, and S. Saic, "Detection of copy-move forgery using a method based on blur moment invariants," Forensic science international, vol. 171, no. 2, pp. 180-189, September, 2007. DOI |
4 | J. Zhao, and J. Guo, "Passive forensics for copy-move image forgery using a method based on DCT and SVD," Forensic science international, vol. 233, no. 1, pp. 158-166, December, 2013. DOI |
5 | G. Muhammad, M. Hussain, and G. Bebis, "Passive copy move image forgery detection using undecimated dyadic wavelet transform," Digital Investigation, vol. 9, no. 1, pp. 49-57, June, 2012. DOI |
6 | S.-J. Ryu, M. Kirchner, M.-J. Lee, and H.-K. Lee, "Rotation invariant localization of duplicated image regions based on Zernike moments," IEEE Transactions on Information Forensics and Security, vol. 8, no. 8, pp. 1355-1370, July, 2013. DOI |
7 | P.-T. Yap, X. Jiang, and A. C. Kot, "Two-dimensional polar harmonic transforms for invariant image representation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 7, pp. 1259-1270, July, 2010. DOI |
8 | Y. Li, "Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching," Forensic science international, vol. 224, no. 1, pp. 59-67, January, 2013. DOI |
9 | M. Emam, Q. Han, and X. M. Niu, "PCET based copy-move forgery detection in images under geometric transforms," Multimedia Tools and Applications, vol. 75, no. 18, pp. 11513-11527, September, 2016. DOI |
10 | J. Li, X. Li, B. Yang, and X. Sun, "Segmentation-Based Image Copy-Move Forgery Detection Scheme," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, March, 2015. DOI |
11 | H. Huang, W. Guo, and Y. Zhang, "Detection of copy-move forgery in digital images using SIFT algorithm," in Proc. of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 2, pp. 272-276, December 19-20, 2008. |
12 | I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, "A sift-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1099-1110, September, 2011. DOI |
13 | F. Zhao, R. Zhang, H. Guo, and Y. Zhang, "Effective digital image copy-move location algorithm robust to geometric transformations," in Proc. of 2015 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1-5, September 19-22, 2015. |
14 | K. Sudhakar, V. Sandeep, and S. Kulkarni, "Speeding-up SIFT based copy move forgery detection using level set approach," in Proc. of International Conference on Advances in Electronics, Computers and Communications, pp. 1-6, October 10-11, 2014. |
15 | E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-move forgery detection by matching triangles of keypoints," IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2084-2094, October, 2015. DOI |
16 | L. K. Bhullar, S. Budhiraja, and A. Dhindsa, "DWT and SIFT based Passive Copy-Move Forgery Detection," International Journal of Computer Applications, vol. 95, no. 23, pp. 14-18, June, 2014. DOI |
17 | N. Yadav, and R. Kapdi, "Copy move forgery detection using SIFT and GMM," in Proc. of 5th Nirma University International Conference on Engineering, pp. 1-4, November 26-28, 2015. |
18 | J. Zhong, and Y. Gan, "Detection of copy-move forgery using discrete analytical Fourier-Mellin transform," Nonlinear Dynamics, vol. 84, no. 1, pp. 189-202, April, 2016. DOI |
19 | X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, "Image copy-move forgery detection based on SURF," in Proc. of International Conference on Multimedia information networking and security, pp. 889-892, Novenber 4-6, 2010. |
20 | C.-M. Pun, X.-C. Yuan, and X.-L. Bi, "Image forgery detection using adaptive oversegmentation and feature point matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, April, 2015. DOI |
21 | M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proc. of the 20th annual symposium on Computational geometry, pp. 253-262, June 08-11, 2004. |
22 | A. J. Fridrich, B. D. Soukal, and A. J. Lukas, "Detection of copy-move forgery in digital images," in Proc. of 3rd Digital Forensic Research Workshop, August 6-8, 2003. |
23 | M. Sellami, and F. Ghorbel, "An invariant similarity registration algorithm based on the analytical fourier-mellin transform," in Proc. of the 20th European conference on Signal Processing, pp. 390-394, August 27-31, 2012. |
24 | E. Silva, T. Carvalho, A. Ferreira, and A. Rocha, "Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes," Journal of Visual Communication and Image Representation, vol. 29, pp. 16-32, May, 2015. DOI |
25 | S. Debbarma, A. B. Singh, and K. M. Singh, "Keypoints based copy-move forgery detection of digital images," in Proc. of International Conference on Informatics, Electronics & Vision, pp. 1-5, May 23-24, 2014. |
26 | H. Farid, "Image forgery detection," IEEE Signal processing magazine, vol. 26, no. 2, pp. 16-25, March, 2009. DOI |
27 | V. Christlein, C. Riess, J. Jordan, C. Riess, and E. Angelopoulou, "An evaluation of popular copy-move forgery detection approaches," IEEE Transactions on information forensics and security, vol. 7, no. 6, pp. 1841-1854, September, 2012. DOI |