Wang et al., 2017 - Google Patents
A passive authentication scheme for copy-move forgery based on package clustering algorithmWang et al., 2017
- Document ID
- 260279617996433500
- Author
- Wang H
- Wang H
- Sun X
- Qian Q
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Copy-move forgery as one of popular methods is widely used to tamper digital images. Passive authentication is extensively used to detect the copy-move forgery images. This paper proposes a passive authentication scheme for copy-move forgery based on the …
- 238000001514 detection method 0 abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
- G06K9/527—Scale-space domain transformation, e.g. with wavelet analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00711—Recognising video content, e.g. extracting audiovisual features from movies, extracting representative key-frames, discriminating news vs. sport content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Walia et al. | Digital image forgery detection: a systematic scrutiny | |
Qin et al. | Perceptual image hashing via dual-cross pattern encoding and salient structure detection | |
Soni et al. | CMFD: a detailed review of block based and key feature based techniques in image copy‐move forgery detection | |
Dixit et al. | Blur‐invariant copy‐move forgery detection technique with improved detection accuracy utilising SWT‐SVD | |
Yan et al. | Quaternion-based image hashing for adaptive tampering localization | |
Mahdian et al. | Detection of copy–move forgery using a method based on blur moment invariants | |
Ouyang et al. | Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform | |
Esmaeili et al. | A robust and fast video copy detection system using content-based fingerprinting | |
Kang et al. | Identifying tampered regions using singular value decomposition in digital image forensics | |
Wang et al. | Perceptual hashing‐based image copy‐move forgery detection | |
Wang et al. | A passive authentication scheme for copy-move forgery based on package clustering algorithm | |
Ouyang et al. | Robust hashing based on quaternion Zernike moments for image authentication | |
Ouyang et al. | Robust hashing for image authentication using SIFT feature and quaternion Zernike moments | |
Han et al. | Content-based image authentication: current status, issues, and challenges | |
Dixit et al. | Review, analysis and parameterisation of techniques for copy–move forgery detection in digital images | |
Ulutas et al. | A new copy move forgery detection method resistant to object removal with uniform background forgery | |
Lin et al. | Region duplication detection based on image segmentation and keypoint contexts | |
Ouyang et al. | Robust copy-move forgery detection method using pyramid model and Zernike moments | |
Pun et al. | Robust image hashing using progressive feature selection for tampering detection | |
Tahaoglu et al. | Improved copy move forgery detection method via L* a* b* color space and enhanced localization technique | |
Nirmal Jothi et al. | Tampering detection using hybrid local and global features in wavelet-transformed space with digital images | |
Muzaffer et al. | A fast and effective digital image copy move forgery detection with binarized SIFT | |
Warbhe et al. | A scaling robust copy-paste tampering detection for digital image forensics | |
Sun et al. | Deep perceptual hash based on hash center for image copyright protection | |
Monga | Perceptually based methods for robust image hashing |