Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013, Article ID 267691, 8 pages
http://dx.doi.org/10.1155/2013/267691
Research Article

Region Duplication Forgery Detection Technique Based on SURF and HAC

1School of Information Technology, RGPV, Bhopal, Madhya Pradesh 462036, India
2University Institute of Technology, RGPV, Bhopal, Madhya Pradesh 462036, India

Received 16 August 2013; Accepted 17 September 2013

Academic Editors: H. Cheng, H.-E. Tseng, and Y. Zhang

Copyright © 2013 Parul Mishra et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [24 citations]

The following is the list of published articles that have cited the current article.

  • Mohammad Farukh Hashmi, Vijay Anand, and Avinash G. Keskar, “A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms,” 2014 International Conference on Computer and Communication Technology (ICCCT), pp. 147–152, . View at Publisher · View at Google Scholar
  • Wing Commander Nimit Kaura, and Sunita Dhavale, “Analysis of SIFT and SURF features for copy-move image forgery detection,” 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–4, . View at Publisher · View at Google Scholar
  • Diaa M. Uliyan, Hamid A. Jalab, and Ainuddin W. Abdul Wahab, “Copy move image forgery detection using Hessian and center symmetric local binary pattern,” 2015 IEEE Conference on Open Systems (ICOS), pp. 7–11, . View at Publisher · View at Google Scholar
  • Unknown, Diaa M. Uliyan, Hamid A. Jalab, Abdelrahman Abuarqoub, and Muhannad Abuhashim, “Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor,” Proceedings of the International Conference on Future Networks and Distributed Systems - ICFNDS '17, pp. 1–6, . View at Publisher · View at Google Scholar
  • Yan Li, Nian Liu, Bin Zhang, Kai-Guo Yuan, and Yi-Xian Yang, “Image multiple copy-move forgery detection algorithm based on reversed-generalized 2 Nearest-Neighbor,” Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, vol. 37, no. 7, pp. 1667–1673, 2015. View at Publisher · View at Google Scholar
  • Vaishnavi, and Subashini, “A passive technique for image forgery detection using contrast context histogram features,” International Journal of Electronic Security and Digital Forensics, vol. 7, no. 3, pp. 278–289, 2015. View at Publisher · View at Google Scholar
  • Diaa Uliyan, Hamid Jalab, Ainuddin Abdul Wahab, and Somayeh Sadeghi, “Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points,” Symmetry, vol. 8, no. 7, pp. 62, 2016. View at Publisher · View at Google Scholar
  • Diaa M. Uliyan, Hamid A. Jalab, Ainuddin W. Abdul Wahab, Palaiahnakote Shivakumara, and Somayeh Sadeghi, “A Novel Forged Blurred Region Detection System for Image Forensic Applications,” Expert Systems with Applications, 2016. View at Publisher · View at Google Scholar
  • Nor Bakiah Abd Warif, Mohd Yamani Idna Idris, Rosli Salleh, Ainuddin Wahid Abdul Wahab, Roziana Ramli, Shahaboddin Shamshirband, and Kim-Kwang Raymond Choo, “Copy-move forgery detection: Survey, challenges and future directions,” Journal of Network and Computer Applications, vol. 75, pp. 259–278, 2016. View at Publisher · View at Google Scholar
  • Anil Dada Warbhe, R. V. Dharaskar, V. M. Thakare, Anil Dada Warbhe, R. V. Dharaskar, and V. M. Thakare, “A Survey on Keypoint Based Copy-Paste Forgery Detection Techniques,” 1St International Conference On Information Security & Privacy 2015, vol. 78, pp. 61–67, 2016. View at Publisher · View at Google Scholar
  • Pahulpreet Kaur, and Bikrampal Kaur, “Digital image forgery detection using the wavelet decomposition and low level feature points,” Communication and Computing Systems - Proceedings of the International Conference on Communication and Computing Systems, ICCCS 2016, pp. 83–88, 2017. View at Publisher · View at Google Scholar
  • Hamid A. Jalab, KokSheik Wong, Diaa Uliyan, Sajjad Dadkhah, and Somayeh Sadeghi, “Keypoint based authentication and localization of copy-move forgery in digital image,” Malaysian Journal of Computer Science, vol. 30, no. 2, pp. 117–133, 2017. View at Publisher · View at Google Scholar
  • Sajjad Dadkhah, Kaori Yoshida, Azizah Abdul Manaf, Mario Koppen, Somayeh Sadeghi, and Jalab, “An efficient ward-based copy-move forgery detection method for digital image forensic,” International Conference Image and Vision Computing New Zealand, vol. 2017-, pp. 1–6, 2018. View at Publisher · View at Google Scholar
  • H M Shahriar Parvez, Diaa M. Uliyan, Somayeh Sadeghi, Hamid A. Jalab, and Alara R. Al-Shamasneh, “Copy-move Image Forgery Detection Based on Gabor Descriptors and K-Means Clustering,” 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018, 2018. View at Publisher · View at Google Scholar
  • Mohamed A. Elaskily, Heba A. Elnemr, Mohamed M. Dessouky, and Osama S. Faragallah, “Two stages object recognition based copy-move forgery detection algorithm,” Multimedia Tools and Applications, 2018. View at Publisher · View at Google Scholar
  • Devi Mahalakshmi, Vijayalakshmi, and Vinola, “Image forgery detection,” International Journal of Pure and Applied Mathematics, vol. 118, no. 11, pp. 775–780, 2018. View at Publisher · View at Google Scholar
  • Tarun Kumar, and Gourav Khurana, “Towards recent developments in the field of digital image forgery detection,” International Journal of Computer Applications in Technology, vol. 58, no. 1, pp. 1–16, 2018. View at Publisher · View at Google Scholar
  • Mohammad A.M. Abushariah, Ahmad M. Altamimi, and Diaa Mohammed Uliyan, “Blur invariant features for exposing region duplication forgery using ANMS and local phase quantization,” Informatica (Slovenia), vol. 42, no. 4, pp. 595–605, 2018. View at Publisher · View at Google Scholar
  • Zhi Zhang, Xiao Zhou, and Chengyou Wang, “A survey on passive image copy-move forgery detection,” Journal of Information Processing Systems, vol. 14, no. 1, pp. 6–31, 2018. View at Publisher · View at Google Scholar
  • Neeru Jindal, and Kulbir Singh, “Digital Image Forensics-Gateway to Authenticity: Crafted with Observations, Trends and Forecasts,” Handbook of Multimedia Information Security: Techniques and Applications, pp. 681–701, 2019. View at Publisher · View at Google Scholar
  • Vaishnavi, and Subashini, “Application of local invariant symmetry features to detect and localize image copy move forgeries,” Journal of Information Security and Applications, vol. 44, pp. 23–31, 2019. View at Publisher · View at Google Scholar
  • Vaishnavi, Balaji, and Mahalakshmi, “KAZE feature based passive image forgery detection,” Advances in Intelligent Systems and Computing, vol. 815, pp. 333–340, 2019. View at Publisher · View at Google Scholar
  • Zhenghong Yang, Shaozhang Niu, Weiwei Zhang, and Xinhua Tang, “Multi-scale segmentation strategies in PRNU-based image tampering localization,” Multimedia Tools and Applications, 2019. View at Publisher · View at Google Scholar
  • Suresh Gulivindala, and Srinivasa Rao Chanamallu, “Performance Analysis Of Copy-Move Forgery Detection Techniques,” i-manager’s Journal on Image Processing, vol. 6, no. 1, pp. 38, 2019. View at Publisher · View at Google Scholar