{"title":"最近基于关键点的复制移动伪造检测技术","authors":"Gul Muzaffer, Eda Sena Karaağaçli, G. Ulutaş","doi":"10.1109/IDAP.2017.8090251","DOIUrl":null,"url":null,"abstract":"As the usage areas of the images increase, the functions of various image editing software are increasing. Easy-to-use software has caused the images to be tampered with easily. Many Copy-Move Forgery Detection (CMFD) algorithms have been developed against these attacks. In literature CMFD methods are divided into block based and keypoint based methods. In this paper, recent works in keypoint based CMFD methods are surveyed. The frameworks of the methods are compared. The methods are reviewed step by step. Then pros and cons of the methods and existing datasets are emphasized. The performances of these methods under some attacks such as rotation, scaling, JPEG compression and adding noise etc. are also mentioned.","PeriodicalId":111721,"journal":{"name":"2017 International Artificial Intelligence and Data Processing Symposium (IDAP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Recent keypoint based copy move forgery detection techniques\",\"authors\":\"Gul Muzaffer, Eda Sena Karaağaçli, G. Ulutaş\",\"doi\":\"10.1109/IDAP.2017.8090251\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the usage areas of the images increase, the functions of various image editing software are increasing. Easy-to-use software has caused the images to be tampered with easily. Many Copy-Move Forgery Detection (CMFD) algorithms have been developed against these attacks. In literature CMFD methods are divided into block based and keypoint based methods. In this paper, recent works in keypoint based CMFD methods are surveyed. The frameworks of the methods are compared. The methods are reviewed step by step. Then pros and cons of the methods and existing datasets are emphasized. The performances of these methods under some attacks such as rotation, scaling, JPEG compression and adding noise etc. are also mentioned.\",\"PeriodicalId\":111721,\"journal\":{\"name\":\"2017 International Artificial Intelligence and Data Processing Symposium (IDAP)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Artificial Intelligence and Data Processing Symposium (IDAP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IDAP.2017.8090251\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Artificial Intelligence and Data Processing Symposium (IDAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IDAP.2017.8090251","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recent keypoint based copy move forgery detection techniques
As the usage areas of the images increase, the functions of various image editing software are increasing. Easy-to-use software has caused the images to be tampered with easily. Many Copy-Move Forgery Detection (CMFD) algorithms have been developed against these attacks. In literature CMFD methods are divided into block based and keypoint based methods. In this paper, recent works in keypoint based CMFD methods are surveyed. The frameworks of the methods are compared. The methods are reviewed step by step. Then pros and cons of the methods and existing datasets are emphasized. The performances of these methods under some attacks such as rotation, scaling, JPEG compression and adding noise etc. are also mentioned.