• Laser & Optoelectronics Progress
  • Vol. 57, Issue 10, 101102 (2020)
Jing Wang, Yuchen Zhang, Zhanqiang Huo*, and Liqin Jia
Author Affiliations
  • College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, Henan 454003, China
  • show less
    DOI: 10.3788/LOP57.101102 Cite this Article Set citation alerts
    Jing Wang, Yuchen Zhang, Zhanqiang Huo, Liqin Jia. Image Tampering Detection Method Based on Approximate Nearest Neighbor Search[J]. Laser & Optoelectronics Progress, 2020, 57(10): 101102 Copy Citation Text show less
    References

    [1] Fridrich A J, Soukal B D, Lukáš A J. Detection of copy-move forgery in digital images. [C]∥Proceedings of Digital Forensic Research Workshop, August 6-8, 2003, Cleveland, USA. [S.l.: s.n.](2003).

    [2] Cao Y J, Gao T G, Fan L et al. A robust detection algorithm for copy-move forgery in digital images[J]. Forensic Science International, 214, 33-43(2012).

    [3] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[R]. USA: Department of Computer Science Darumouth College, 1-11(2004).

    [4] Ryu S J, Lee M J, Lee H K. Detection of copy-rotate-move forgery using Zernike moments[M]. ∥Böhme R, Fong P W L, Safavi-Naini R. Information hiding. Lecture notes in computer science. Heidelberg: Springer, 6387, 51-65(2010).

    [5] Davarzani R, Yaghmaie K, Mozaffari S et al. Copy-move forgery detection using multiresolution local binary patterns[J]. Forensic Science International, 231, 61-72(2013).

    [6] Pun C M, Yuan X C, Bi X L. Image forgery detection using adaptive over segmentation and feature point matching[J]. IEEE Transactions on Information Forensics and Security, 10, 1705-1716(2015).

    [7] Lai Y C, Huang T Q, Lin J et al. An improved block-based matching algorithm of copy-move forgery detection[J]. Multimedia Tools and Applications, 77, 15093-15110(2018).

    [8] Huang H L, Guo W Q, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm. [C]∥2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, December 19-20, 2008, Wuhan, China. New York: IEEE, 272-276(2008).

    [9] Amerini I, Ballan L, Caldelli R et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 6, 1099-1110(2011).

    [10] Bay H, Ess A, Tuytelaars T et al. Speeded-up robust features (SURF)[J]. Computer Vision and Image Understanding, 110, 346-359(2008).

    [11] Guo X J, Cao X C. MIFT: a framework for feature descriptors to be mirror reflection invariant[J]. Image and Vision Computing, 30, 546-556(2012).

    [12] Jaberi M, Bebis G, Hussain M et al. Improving the detection and localization of duplicated regions in copy-move image forgery. [C]∥2013 18th International Conference on Digital Signal Processing (DSP), July 1-3, 2013, Fira, Santorini, Greece. New York: IEEE, 13828436(2013).

    [13] Warif N B A, Wahab A W A, Idris M Y I et al. SIFT-Symmetry: a robust detection method for copy-move forgery with reflection attack[J]. Journal of Visual Communication and Image Representation, 46, 219-232(2017).

    [14] Cozzolino D, Poggi G, Verdoliva L. Efficient dense-field copy-move forgery detection[J]. IEEE Transactions on Information Forensics and Security, 10, 2284-2297(2015).

    [15] Yang B, Sun X M, Guo H L et al. A copy-move forgery detection method based on CMFD-SIFT[J]. Multimedia Tools and Applications, 77, 837-855(2018).

    [16] Lü Y D, Shen X J, Chen H P. Blind forensic for image copy-paste tampering with geometric invariance[J]. Acta Electronica Sinica, 44, 2592-2599(2016).

    [17] Zhu Y, Shen X J, Chen H P. Covert copy-move forgery detection based on color LBP[J]. Acta Automatica Sinica, 43, 390-397(2017).

    [18] Leutenegger S, Chli M, Siegwart R Y. BRISK: binary robust invariant scalable keypoints. [C]∥2011 International Conference on Computer Vision, November 6-13, 2011, Barcelona, Spain. New York: IEEE, 2548-2555(2011).

    [19] Mair E, Hager G D, Burschka D et al. Adaptive and generic corner detection based on the accelerated segment test[M]. ∥Daniilidis K, Maragos P, Paragios N. Computer vision-ECCV 2010. Lecture notes in computer science. Heidelberg: Springer, 6312, 183-196(2010).

    [20] Barnes C, Shechtman E, Finkelstein A et al. PatchMatch: a randomized correspondence algorithm for structural image editing[J]. ACM Transactions on Graphics, 28, 24(2009).

    [21] Barnes C, Shechtman E, Goldman D B et al. The generalized PatchMatch correspondence algorithm[M]. ∥Daniilidis K, Maragos P, Paragios N. Computer vision-ECCV 2010. Lecture notes in computer science. Heidelberg: Springer, 6313, 29-43(2010).

    [22] Lu S P, Ceulemans B, Munteanu A et al. Performance optimizations for PatchMatch-based pixel-level multiview inpainting. [C]∥2013 International Conference on 3D Imaging, December 3-5, 2013, Liège, Belgium. New York: IEEE, 14079952(2013).

    [23] Gao Y K, Liu T, Li H B et al. Stereo matching algorithm based on pixel category optimized patch match[J]. Acta Optica Sinica, 39, 0715006(2019).

    Jing Wang, Yuchen Zhang, Zhanqiang Huo, Liqin Jia. Image Tampering Detection Method Based on Approximate Nearest Neighbor Search[J]. Laser & Optoelectronics Progress, 2020, 57(10): 101102
    Download Citation