• Laser & Optoelectronics Progress
  • Vol. 59, Issue 2, 0211001 (2022)
Yihang Peng, Wujian Ye*, and Yijun Liu
Author Affiliations
  • School of Information Engineering, Guangdong University of Technology, Guangzhou , Guangdong 510006, China
  • show less
    DOI: 10.3788/LOP202259.0211001 Cite this Article Set citation alerts
    Yihang Peng, Wujian Ye, Yijun Liu. Tampered Image Recognition Algorithm Based on Progressive Hybrid Feature[J]. Laser & Optoelectronics Progress, 2022, 59(2): 0211001 Copy Citation Text show less
    References

    [1] Fridrich A J, Soukal B D, Lukáš A J. Detection of copy-move forgery in digital images[C], 342-358(2003).

    [2] Popescu A C, Farid H. Exposing digital forgeries by detecting duplicated image regions[R](2004).

    [3] Zhao J, Guo J C. Passive forensics for copy-move image forgery using a method based on DCT and SVD[J]. Forensic Science International, 233, 158-166(2013).

    [4] Luo W Q, Huang J W, Qiu G P. Robust detection of region-duplication forgery in digital image[C], 746-749(2006).

    [5] Muhammad G, Hussain M, Bebis G. Passive copy move image forgery detection using undecimated dyadic wavelet transform[J]. Digital Investigation, 9, 49-57(2012).

    [6] Ryu S J, Kirchner M, Lee M J et al. Rotation invariant localization of duplicated image regions based on Zernike moments[J]. IEEE Transactions on Information Forensics and Security, 8, 1355-1370(2013).

    [7] Gan Y F, Zhong J L. Application of AFMT method for composite forgery detection[J]. Nonlinear Dynamics, 84, 341-353(2016).

    [8] Yap P T, Jiang X D, Kot A C. Two-dimensional polar harmonic transforms for invariant image representation[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32, 1259-1270(2010).

    [9] Wang Y L, Kang X B, Chen Y J. Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures[J]. Journal of Information Security and Applications, 54, 102536(2020).

    [10] Warif N B A, Idris M Y I, Wahab A W A et al. CMF-iteMS: an automatic threshold selection for detection of copy-move forgery[J]. Forensic Science International, 295, 83-99(2019).

    [11] Wang J W, Liu G J, Zhang Z et al. Fast and robust forensics for image region-duplication forgery[J]. Acta Automatica Sinica, 35, 1488-1495(2009).

    [12] Cozzolino D, Poggi G, Verdoliva L. Efficient dense-field copy-move forgery detection[J]. IEEE Transactions on Information Forensics and Security, 10, 2284-2297(2015).

    [13] Emam M, Han Q, Niu X M. PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools and Applications, 75, 11513-11527(2016).

    [14] Amerini I, Ballan L, Caldelli R et al. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 6, 1099-1110(2011).

    [15] Xu B, Wang J W, Liu G J et al. Image copy-move forgery detection based on SURF[C], 889-892(2010).

    [16] Zhao J, Guo J C. Passive forensics for region duplication image forgery using Harris feature points and annular average representation[J]. Journal of Data Acquisition and Processing, 30, 164-174(2015).

    [17] Silva E, Carvalho T, Ferreira A et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes[J]. Journal of Visual Communication and Image Representation, 29, 16-32(2015).

    [18] Li J, Li X L, Yang B et al. Segmentation-based image copy-move forgery detection scheme[J]. IEEE Transactions on Information Forensics and Security, 10, 507-518(2015).

    [19] Pun C M, Chung J L. A two-stage localization for copy-move forgery detection[J]. Information Sciences, 463/464, 33-55(2018).

    [20] Vaishnavi D, Subashini T S. Application of local invariant symmetry features to detect and localize image copy move forgeries[J]. Journal of Information Security and Applications, 44, 23-31(2019).

    [21] Soni B, Das P K, Thounaojam D M. Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features[J]. Journal of Information Security and Applications, 45, 44-51(2019).

    [22] Fischler M A, Bolles R C. Random sample consensus[J]. Communications of the ACM, 24, 381-395(1981).

    [23] Yang B, Sun X M, Guo H L et al. A copy-move forgery detection method based on CMFD-SIFT[J]. Multimedia Tools and Applications, 77, 837-855(2018).

    [24] Zhong J L, Gan Y F, Young J et al. A new block-based method for copy move forgery detection under image geometric transforms[J]. Multimedia Tools and Applications, 76, 14887-14903(2017).

    [25] Yang F, Li J W, Lu W et al. Copy-move forgery detection based on hybrid features[J]. Engineering Applications of Artificial Intelligence, 59, 73-83(2017).

    [26] Amerini I, Ballan L, Caldelli R et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage[J]. Signal Processing: Image Communication, 28, 659-669(2013).

    [27] Pun C M, Yuan X C, Bi X L. Image forgery detection using adaptive oversegmentation and feature point matching[J]. IEEE Transactions on Information Forensics and Security, 10, 1705-1716(2015).

    [28] Wang J, Zhang Y C, Huo Z Q et al. Image tampering detection method based on approximate nearest neighbor search[J]. Laser & Optoelectronics Progress, 57, 101102(2020).

    [29] Wu Y, Abd-Almageed W, Natarajan P. BusterNet: detecting copy-move image forgery with source/target localization[M]. Ferrari V, Hebert M, Sminchisescu C, et al. Computer vision-ECCV 2018. Lecture notes in computer science, 11210, 170-186(2018).

    [30] Liu Y Q, Guan Q X, Zhao X F. Copy-move forgery detection based on convolutional kernel network[J]. Multimedia Tools and Applications, 77, 18269-18293(2018).

    Yihang Peng, Wujian Ye, Yijun Liu. Tampered Image Recognition Algorithm Based on Progressive Hybrid Feature[J]. Laser & Optoelectronics Progress, 2022, 59(2): 0211001
    Download Citation