{"title":"Copy Move Forgery Detection Methods and Its Advantage of Two Stage Filtering","authors":"Devika A D, Bindhu K. Rajan","doi":"10.1109/ICICICT54557.2022.9918014","DOIUrl":null,"url":null,"abstract":"In the modern information system, digital media altering has become a major serious issue. Different ways of manipulating information methods are available like slicing, copy move forgery methods etc. Here mainly focusing on copy forgery methods based on key point based and their detection methods. This paper also shows the advantage of Two stage filtering detection method over detection method is also discussed. In two stage filtering four stages are involved. First key point extraction is done using a key point extraction algorithm, next step is finding matched key points are filtered by key point- matching algorithm and third is a Two stage algorithm based on Two stage filtering and the Clustering-Based Filter (CBF), is applied to eliminate most of the falsely detected key point pairs and finally removing falsely matched key point pairs and finding the forged region.This paper mainly covers the comparison and review of CMFD methods.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICICT54557.2022.9918014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In the modern information system, digital media altering has become a major serious issue. Different ways of manipulating information methods are available like slicing, copy move forgery methods etc. Here mainly focusing on copy forgery methods based on key point based and their detection methods. This paper also shows the advantage of Two stage filtering detection method over detection method is also discussed. In two stage filtering four stages are involved. First key point extraction is done using a key point extraction algorithm, next step is finding matched key points are filtered by key point- matching algorithm and third is a Two stage algorithm based on Two stage filtering and the Clustering-Based Filter (CBF), is applied to eliminate most of the falsely detected key point pairs and finally removing falsely matched key point pairs and finding the forged region.This paper mainly covers the comparison and review of CMFD methods.