Nothing Special   »   [go: up one dir, main page]

Wang et al., 2017 - Google Patents

A passive authentication scheme for copy-move forgery based on package clustering algorithm

Wang et al., 2017

Document ID
260279617996433500
Author
Wang H
Wang H
Sun X
Qian Q
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

Copy-move forgery as one of popular methods is widely used to tamper digital images. Passive authentication is extensively used to detect the copy-move forgery images. This paper proposes a passive authentication scheme for copy-move forgery based on the …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • G06F17/30247Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/52Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
    • G06K9/527Scale-space domain transformation, e.g. with wavelet analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00711Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Similar Documents

Publication Publication Date Title
Walia et al. Digital image forgery detection: a systematic scrutiny
Qin et al. Perceptual image hashing via dual-cross pattern encoding and salient structure detection
Soni et al. CMFD: a detailed review of block based and key feature based techniques in image copy‐move forgery detection
Dixit et al. Blur‐invariant copy‐move forgery detection technique with improved detection accuracy utilising SWT‐SVD
Yan et al. Quaternion-based image hashing for adaptive tampering localization
Mahdian et al. Detection of copy–move forgery using a method based on blur moment invariants
Ouyang et al. Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform
Esmaeili et al. A robust and fast video copy detection system using content-based fingerprinting
Kang et al. Identifying tampered regions using singular value decomposition in digital image forensics
Wang et al. Perceptual hashing‐based image copy‐move forgery detection
Wang et al. A passive authentication scheme for copy-move forgery based on package clustering algorithm
Ouyang et al. Robust hashing based on quaternion Zernike moments for image authentication
Ouyang et al. Robust hashing for image authentication using SIFT feature and quaternion Zernike moments
Han et al. Content-based image authentication: current status, issues, and challenges
Dixit et al. Review, analysis and parameterisation of techniques for copy–move forgery detection in digital images
Ulutas et al. A new copy move forgery detection method resistant to object removal with uniform background forgery
Lin et al. Region duplication detection based on image segmentation and keypoint contexts
Ouyang et al. Robust copy-move forgery detection method using pyramid model and Zernike moments
Pun et al. Robust image hashing using progressive feature selection for tampering detection
Tahaoglu et al. Improved copy move forgery detection method via L* a* b* color space and enhanced localization technique
Nirmal Jothi et al. Tampering detection using hybrid local and global features in wavelet-transformed space with digital images
Muzaffer et al. A fast and effective digital image copy move forgery detection with binarized SIFT
Warbhe et al. A scaling robust copy-paste tampering detection for digital image forensics
Sun et al. Deep perceptual hash based on hash center for image copyright protection
Monga Perceptually based methods for robust image hashing