Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    IMTNet: Improved Multi-Task Copy-Move Forgery Detection Network with Feature Decoupling and Multi-Feature Pyramid

    Huan Wang1, Hong Wang1, Zhongyuan Jiang2,*, Qing Qian1, Yong Long1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4603-4620, 2024, DOI:10.32604/cmc.2024.053740 - 12 September 2024

    Abstract Copy-Move Forgery Detection (CMFD) is a technique that is designed to identify image tampering and locate suspicious areas. However, the practicality of the CMFD is impeded by the scarcity of datasets, inadequate quality and quantity, and a narrow range of applicable tasks. These limitations significantly restrict the capacity and applicability of CMFD. To overcome the limitations of existing methods, a novel solution called IMTNet is proposed for CMFD by employing a feature decoupling approach. Firstly, this study formulates the objective task and network relationship as an optimization problem using transfer learning. Furthermore, it thoroughly discusses… More >

  • Open Access

    ARTICLE

    Detection of Copy-Move Forgery in Digital Images Using Singular Value Decomposition

    Zaid Nidhal Khudhair1,4, Farhan Mohamed2, Amjad Rehman3,*, Tanzila Saba3, Saeed Ali bahaj3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4135-4147, 2023, DOI:10.32604/cmc.2023.032315 - 31 October 2022

    Abstract This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition (SVD). It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size. At each step, the SVD is determined. First, the diagonal matrix’s maximum value (norm) is selected (representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating the matrix or scaled). Then, the similar norms are grouped, and each leading group is separated into many More >

  • Open Access

    ARTICLE

    Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique

    C. D. Prem Kumar1,*, S. Saravana Sundaram2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 881-899, 2023, DOI:10.32604/iasc.2023.025766 - 06 June 2022

    Abstract The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content. An effective technique for tampering the identification is the copy-move forgery. Conventional image processing techniques generally search for the patterns linked to the fake content and restrict the usage in massive data classification. Contrastingly, deep learning (DL) models have demonstrated significant performance over the other statistical techniques. With this motivation, this paper presents an Optimal Deep Transfer Learning based Copy Move Forgery Detection (ODTL-CMFD) technique. The presented ODTL-CMFD technique aims to derive a DL… More >

  • Open Access

    ARTICLE

    Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features

    Marriam Nawaz1, Zahid Mehmood2,*, Tahira Nazir1, Momina Masood1, Usman Tariq3, Asmaa Mahdi Munshi4, Awais Mehmood1, Muhammad Rashid5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1927-1944, 2021, DOI:10.32604/cmc.2021.018052 - 21 July 2021

    Abstract Copy-move forgery is the most common type of digital image manipulation, in which the content from the same image is used to forge it. Such manipulations are performed to hide the desired information. Therefore, forgery detection methods are required to identify forged areas. We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern (LTrP) features to detect the single and multiple copy-move attacks from the images. The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations. It also… More >

  • Open Access

    ARTICLE

    A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques

    Weijin Tan1,*, Yunqing Wu1, Peng Wu1, Beijing Chen1,2

    Journal of New Media, Vol.1, No.1, pp. 11-25, 2019, DOI:10.32604/jnm.2019.06219

    Abstract Digital images can be tampered easily with simple image editing software tools. Therefore, image forensic investigation on the authenticity of digital images’ content is increasingly important. Copy-move is one of the most common types of image forgeries. Thus, an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper. These methods are classified into three types: block-based methods, keypoint-based methods, and deep learning-based methods. In addition, the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost. Finally, further research directions More >

Displaying 1-10 on page 1 of 5. Per Page