Please use this identifier to cite or link to this item:
|Title:||Exposing postprocessed copy–paste forgeries through transform-invariant features||Authors:||Sudha, N.
|Keywords:||DRNTU::Engineering::Computer science and engineering::Computing methodologies::Image processing and computer vision||Issue Date:||2012||Source:||Kakar, P., & Sudha, N. (2012). Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Transactions on Information Forensics and Security, 7(3), 1018-1028.||Series/Report no.:||IEEE transactions on information forensics and security||Abstract:||Image manipulation has become commonplace with growing easy access to powerful computing abilities. One of the most common types of image forgeries is the copy-paste forgery, wherein a region from an image is replaced with another region from the same image. Most prior approaches to finding identical regions suffer from their inability to detect the cloned region when it has been subjected to a geometric transformation. In this paper, we propose a novel technique based on transform-invariant features. These are obtained by using the features from the MPEG-7 image signature tools. Results are provided which show the efficacy of this technique in detecting copy-paste forgeries, with translation, scaling, rotation, flipping, lossy compression, noise addition and blurring. We obtain a feature matching accuracy in excess of 90% across postprocessing operations and are able to detect the cloned regions with a high true positive rate and lower false positive rate than the state of the art.||URI:||https://hdl.handle.net/10356/95528
|ISSN:||1556-6013||DOI:||10.1109/TIFS.2012.2188390||Rights:||© 2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/TIFS.2012.2188390].||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||IMI Journal Articles|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.