PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Determination of the Optimal Threshold Value and Number of Keypoints in Scale Invariant Feature Transform-based Copy-Move Forgery Detection

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The copy-move forgery detection (CMFD) begins with the preprocessing until the image is ready to process. Then, the image features are extracted using a feature-transform-based extraction called the scale-invariant feature transform (SIFT). The last step is features matching using Generalized 2 Nearest-Neighbor (G2NN) method with threshold values variation. The problem is what is the optimal threshold value and number of keypoints so that copy-move detection has the highest accuracy. The optimal threshold value and number of keypoints had determined so that the detection n has the highest accuracy. The research was carried out on images without noise and with Gaussian noise.
Rocznik
Strony
561--569
Opis fizyczny
Bibliogr. 37 poz., fot., rys., tab.
Twórcy
  • Computer Engineering Department of Diponegoro University, Semarang, Indonesia
  • Electrical Engineering Department of Diponegoro University, Semarang, Indonesia
autor
  • Electrical Engineering Department of Diponegoro University, Semarang, Indonesia
  • Electrical Engineering Department of Diponegoro University, Semarang, Indonesia
Bibliografia
  • [1] G. Palmer, “A Road Map for Digital Forensic Research,” Technical Report (DTR-T001-01) for Digital Forensic Research Workshop, New York, 2001.
  • [2] M. Puri and V. Chopra, “A Survey: Copy-Move Forgery Detection Methods.” International Journal of Computer Systems (IJCS), vol. 3, no. 9, pp: 582-586, September 2016.
  • [3] S. Khan, and A. Kulkarni, “An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform. International Journal on Computer Science and Engineering,” Vol. 02, No. 05, 2010, pp. 1801-1806.
  • [4] J. Fridrich, D. Soukal, and J. Lukas, “Detection of Copy-Move Forgery in Digital Images,” Proceedings of Digital Forensic Research Workshop, IEEE Computer Society, August 2003, pp. 55–61.
  • [5] P. Popescu and H. Farid, “Exposing Digital Forgeries by Detecting Duplicated Image Regions,” Computer Science, Technical Report (TR2004-515), Dartmouth College, 2004.
  • [6] W. Luo and J. Huang, “Robust Detection of Region-Duplication Forgery in Digital Image,” IEEE - The 18th International Conference on Pattern Recognition (ICPR'06), 2006.
  • [7] D.G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints,” International Journal of Computer Vision, vol. 60, no. 2, January 2004, pp. 91-110.
  • [8] B. Mahdian and S. Saic, “Detection of Copy-Move Forgery using a Method based on Blur Moment Invariants,” Forensic Science International, an international journal dedicated to the applications of medicine and science in the administration of justice, vol. 171, no. 2-3, September 2007, pp. 181-189.
  • [9] I. Amerini, L. Ballan, R. Caldelli, A.D. Bimbo, and G. Serra, “A SIFT-based Forensic Method for Copy-Move Attack Detection and Transformation Recovery,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, September 2011, doi 10.1109/TIFS.2011.2129512, pp. 1099-1110
  • [10] L. Li, S. Li, and H. Zhu, “An Efficient Scheme for Detecting Copy-Move Forged Images by Local Binary Patterns,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, January 2013, pp. 46-56.
  • [11] V. Jabade, and S. Gengaje, “Modelling of Geometric Attacks for Digital Image Watermarking,” IJIERT - International Journal of Innovations in Engineering Research and Technology, vol. 3, no. 3, March 2016.
  • [12] M.B. Ranjani, and R. Poovendran, “Image Duplication Copy-Move Forgery Detection Using Discrete Cosine Transforms Method,” International Journal of Applied Engineering Research, vol. 11, no. 4, 2016, pp. 2671-2674.
  • [13] M. Osamah, A. Al-Qershi and K.B. Ee, "Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-Art," Forensic Science International, vol. 231, no. 1, September 2013, pp. 284-295.
  • [14] P. Mukherjee, S. Mitra, “A Review on Copy-Move Forgery Detection Techniques Based on DCT and DWT,” International Journal of Computer Science and Mobile Computing IJCSMC, vol. 4, no. 3, March 2015, pp.702 – 708.
  • [15] E. Ardizzone, A. Bruno, and G. Mazzola, “Copy-Move Forgery Detection by Matching Triangles of Keypoints,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, October 2015, pp. 2084 – 2094.
  • [16] K. Sharma, P. Abrol, and Devanand, “D. Feature Based Analysis of Copy-Paste Image Tampering Detection,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), vol. 2, no. 6, 2017, pp. 555-562.
  • [17] S. Wenchang, Z. Fei, Q. Bo, and L. Bin, “Improving Image Copy-Move Forgery Detection with Particle Swarm Optimization Techniques,” China Communications, vol. 13, no. 1, January 2016, pp. 139 – 149.
  • [18] Y.D. Shin, “Fast Exploration of Copy-Move Forgery Image,” Advanced Science and Technology Letters, vol. 123, 2016, pp.1-5.
  • [19] V. Christlein and J. Jordan, “An Evaluation of Popular Copy-Move Forgery Detection Approaches,” IEEE Transactions on Information Forensics and Security, 2012, pp. 1-26.
  • [20] G. Ulutas, and M. Ulutas, “Image Forgery Detection using Color Coherence Vector,” Electronics, Computer and Computation (ICECCO), November 2013, pp. 107-110.
  • [21] M.A. Farooque and J.S. Rohankar, “Survey on Various Noises and Techniques for Denoising the Color Image,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, no. 11, November 2013.
  • [22] D. Chauhana, D. Kasatb, S. Jainc, and V. Thakared, ”Survey on Keypoint Based Copy-Move Forgery Detection Methods on Image,” Elsevier-International Conference on Computational Modeling and Security (CMS 2016), pp. 206 – 212.
  • [23] C.M. Pun, X.C. Yuanand, and X.L. Bi, “Image Forgery Detection Using Adaptive Over-Segmentation and Feature Point Matching,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, August 2015, pp. 1705 – 1716.
  • [24] G. Kaur and M. Dutta, “Digital Image Forgery: A Survey,” International Journal of Computer Science Research and Technology (IJCSRT), vol. 1, no. 6, November 2013, pp.1-7.
  • [25] B. Ustubioglu, G. Ulutas, M. Ulutas, and V.V. Nabiyev, “A New Copy-Move Forgery Detection Technique with Automatic Threshold Determination,” Elsevier - International Journal of Electronics and Communications, vol. 70, no. 8, August 2016, pp. 1076–1087.
  • [26] F.C. Huang, S.Y. Huang, J.W. Ker, and Y.C. Chen, “High-performance SIFT Hardware Accelerator for Real-time Image Feature Extraction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 3, March 2012, pp. 340-351.
  • [27] C. Wang, Z. Zhang, and X. Zhou, “An Image Copy-Move Forgery Detection Scheme Based on A-KAZE and SURF Features,” Symmetry 2018, 10, 706, doi:10.3390/sym10120706, Switzerland, 2018, pp. 1-20.
  • [28] C.S. Prakash, P.P. Panzade, H. Om, and S. Maheshkar, “Detection of Copy-Move Forgery using AKAZE and SIFT Keypoint Extraction,” Multimedia Tools and Applications, August 2019, vol. 78, no. 16, pp 23535–23558.
  • [29] M.A. Elaskily, H.K. Aslan, M.M. Dessouky, F.E. Abd El-Samie, O.S. Faragallah, and O.A. Elshakankiry, “Enhanced Filter-based SIFT Approach for Copy-Move Forgery Detection,” Menoufia Journal of Electronic Engineering Research (MJEER), vol. 28, no. 1, January 2019, pp. 159-181.
  • [30] Y. Wu, W. Abd-Almageed, and P. Natarajan, “BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization,” Proceedings of the European Conference on Computer Vision (ECCV), 2018, pp. 168-184.
  • [31] L. D’Amiano, D. Cozzolino, G. Poggi, and L. Verdoliva, “A Patchmatch-based Dense-field algorithm for video copy–move detection and localization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 3, 2018, pp. 669-682.
  • [32] D. Cozzolino, G. Poggi, and L. Verdoliva, “Copy-move Forgery Detection based on Patchmatch,” 2014 IEEE International Conference on Image Processing (ICIP), October 2014, pp. 5312-5316.
  • [33] Y. Li, “Image Copy-move Forgery Detection based on Polar Cosine Transform and Approximate Nearest Neighbor Searching,” Forensic Science International, vol. 1, no. 1-3, 2013, pp. 59-67.
  • [34] D. Cozzolino, G. Poggi, and L. Verdoliva, “Efficient Dense-field Copy–move Forgery Detection,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, 2015, 2284-2297.
  • [35] S. Bayram, H.T. Sencar, and N. Memon, “An Efficient and Robust Method for Detecting Copy-move Forgery,” 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, April 2009, pp. 1053-1056.
  • [36] F. Marra, D. Gragnaniello, L. Verdoliva, and G. Poggi, “A Full-Image Full-Resolution End-to-End-Trainable CNN Framework for Image Forgery Detection,” September 2019, arXiv preprint arXiv:1909.06751.
  • [37] J. Li, X. Li, B. Yang, and X. Sun, “Segmentation-based Image Copy-move Forgery Detection Scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, 2014, pp. 507-518.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-653f26d8-1396-4043-82a2-26215b89765d
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.