{"title":"拷贝移动图像伪造检测技术综述","authors":"M. A. Qureshi, Mohamed Deriche","doi":"10.1109/SSD.2014.6808907","DOIUrl":null,"url":null,"abstract":"With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. It is now possible to add, modify, or remove important features from an image without leaving any perceptual traces of tampering. With more than several million pictures uploaded daily to the net, and the introduction of e-Government services, it is becoming important to develop robust detection methods to identify image tampering operations. To this end, image forensics techniques aim at restoring trust and acceptance in digital media by uncovering tampering methods. Such detection techniques are the focus of this paper. In particular, we provide a survey of different forging detection techniques with a focus on copy and move approaches.","PeriodicalId":168063,"journal":{"name":"2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"54","resultStr":"{\"title\":\"A review on copy move image forgery detection techniques\",\"authors\":\"M. A. Qureshi, Mohamed Deriche\",\"doi\":\"10.1109/SSD.2014.6808907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. It is now possible to add, modify, or remove important features from an image without leaving any perceptual traces of tampering. With more than several million pictures uploaded daily to the net, and the introduction of e-Government services, it is becoming important to develop robust detection methods to identify image tampering operations. To this end, image forensics techniques aim at restoring trust and acceptance in digital media by uncovering tampering methods. Such detection techniques are the focus of this paper. In particular, we provide a survey of different forging detection techniques with a focus on copy and move approaches.\",\"PeriodicalId\":168063,\"journal\":{\"name\":\"2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"54\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSD.2014.6808907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSD.2014.6808907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A review on copy move image forgery detection techniques
With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. It is now possible to add, modify, or remove important features from an image without leaving any perceptual traces of tampering. With more than several million pictures uploaded daily to the net, and the introduction of e-Government services, it is becoming important to develop robust detection methods to identify image tampering operations. To this end, image forensics techniques aim at restoring trust and acceptance in digital media by uncovering tampering methods. Such detection techniques are the focus of this paper. In particular, we provide a survey of different forging detection techniques with a focus on copy and move approaches.