Gaussian Pyramid Decomposition in Copy-Move Image Forgery Detection with SIFT and Zernike Moment Algorithms
Abstract
Keywords
Full Text:
PDF (Indonesian)References
Al-Qershi, O. M., & Khoo, B. E. (2018). Evaluation of Copy-move Forgery Detection: Datasets and Evaluation Metrics. Multimedia Tools and Applications, 77(24), 31807–31833. doi: 10.1007/s11042-018-6201-4
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., & Serra, G. (2011). A SIFT-based Forensic Method for Copy-move Attack Detection and Transformation Recovery. IEEE Transactions on Information Forensics and Security, 6(3 PART 2), 1099–1110. doi: 10.1109/TIFS.2011.2129512
Christlein, V., Riess, C., Jordan, J., Riess, C., & Angelopoulou, E. (2012). An Evaluation of Popular Copy-move Forgery Detection Approaches. IEEE Transactions on Information Forensics and Security, 7(6), 1841–1854. doi: 10.1109/TIFS.2012.2218597
Hailing, H., Weiqiang, G., & Yu, Z. (2008). Detection of Copy-move Forgery in Digital Images Using SIFT Algorithm. Proceedings - 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA 2008, 2, 272–276. doi: 10.1109/PACIIA.2008.240
Liang, Z., Yang, G., Ding, X., & Li, L. (2015). An Efficient Forgery Detection Algorithm for Object Removal by Exemplar-based Image Inpainting. Journal of Visual Communication and Image Representation, 30, 75–85. Elsevier Inc. doi: 10.1007/s11042-017-4829-0
Lowe, D. G. (1999). Object Recognition from Local Scale-invariant Features. Proceedings of the Seventh IEEE International Conference on Computer Vision (Vol. 482, pp. 1150–1157 vol.2). IEEE. doi: 10.1109/ICCV.1999.790410
Lowe, D. G. (2004). Distinctive Image Features from Scale-invariant Keypoints. International Journal of Computer Vision, 60(2), 91–110. doi: 10.1023/B:VISI.0000029664.99615.94
Mohamadian, Z., & Pouyan, A. A. (2013). Detection of Duplication Forgery in Digital Images in Uniform and Non-uniform Regions. Proceedings - UKSim 15th International Conference on Computer Modelling and Simulation, UKSim 2013, 1, 455–460. doi: 10.1109/UKSim.2013.94
Pun, C. M., Yuan, X. C., & Bi, X. L. (2015). Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching. IEEE Transactions on Information Forensics and Security, 10(8), 1705–1716. doi: 10.1109/TIFS.2015.2423261
Rahma, F. I., Utami, E., & Fatta, H. Al. (2020). The Using of Gaussian Pyramid Decomposition, Compact Watershed Segmentation Masking and DBSCAN in Copy-Move Forgery Detection with SIFT. 2020 3rd International Conference on Information and Communications Technology (ICOIACT) (pp. 325–330). IEEE. doi: 10.1109/ICOIACT50329.2020.9332081
Riadi, I., Fadlil, A., & Sari, T. (2017). Image Forensic for Detecting Splicing Image with Distance Function. International Journal of Computer Applications, 169(5), 6–10. doi: 10.5120/ijca2017914729
Ryu, S.-J., Lee, M.-J., & Lee, H.-K. (2010). Detection of Copy-Rotate-Move Forgery Using Zernike Moments. International Workshop on Information Hiding (pp. 51–65). doi: 10.1007/978-3-642-16435-4_5
Sadeghi, S., Dadkhah, S., Jalab, H. A., Mazzola, G., & Uliyan, D. (2018). State of The Art in Passive Digital Image Forgery Detection: Copy-move Image Forgery. Pattern Analysis and Applications, 21(2), 291–306. Springer London. doi: 10.1007/s10044-017-0678-8
Shabanian, H., & Mashhadi, F. (2018). A New Approach for Detecting Copy-move Forgery in Digital Images. 2017 IEEE Western New York Image and Signal Processing Workshop, WNYISPW 2017, (November), 1–6. doi: 10.1109/ICCS.2008.4737205
Soni, B., Das, P. K., & Thounaojam, D. M. (2018). MultiCMFD: Fast and Efficient System for Multiple Copy-move Forgeries Detection in Image. ACM International Conference Proceeding Series (pp. 53–58). doi: 10.1145/3191442.3191465
Sun, Y., Ni, R., & Zhao, Y. (2018). Nonoverlapping Blocks Based Copy-Move Forgery Detection. Security and Communication Networks, 2018. doi: 10.1155/2018/1301290
Tan, W., Wu, Y., Wu, P., & Chen, B. (2019). A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques. Journal of New Media, 1(1), 11–25. doi: 10.32604/jnm.2019.06219
Teague, M. R. (1980). Image Analysis Via The General Theory of Moments. Journal of the Optical Society of America, 70(8), 920. Retrieved from https://www.osapublishing.org/abstract.cfm?URI=josa-70-8-920
Tyagi, V. (2018). Understanding Digital Image Processing. Boca Raton: CRC Press. doi: 10.1201/9781315123905
Walia, S., & Kumar, K. (2019). Digital Image Forgery Detection: a Systematic Scrutiny. Australian Journal of Forensic Sciences, 51(5), 488–526. doi: 10.1080/00450618.2018.1424241
Warif, N. B. A., Wahab, A. W. A., Idris, M. Y. I., Salleh, R., & Othman, F. (2017). SIFT-Symmetry: A Robust Detection Method for Copy-move Forgery with Reflection Attack. Journal of Visual Communication and Image Representation, 46, 219–232. doi: 10.1016/j.jvcir.2017.04.004
Zheng, J., Liu, Y., Ren, J., Zhu, T., Yan, Y., & Yang, H. (2016). Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimensional Systems and Signal Processing, 27(4), 989–1005. doi: 10.1007/s11045-016-0416-1
DOI: http://dx.doi.org/10.35671/telematika.v15i1.1322
Refbacks
- There are currently no refbacks.
Indexed by:
Telematika
ISSN: 2442-4528 (online) | ISSN: 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto, Indonesia
This work is licensed under a
Creative Commons Attribution 4.0 International License
.