Journal of Terahertz Science and Electronic Information Technology , Volume. 18, Issue 3, 483(2020)

Image copy-paste tampering detection algorithm based on color constrained coupling distance penalty model

WANG Yazi1... SUN Huaibo2,* and MA Yuankun3 |Show fewer author(s)
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    References(20)

    [2] [2] WARIF N B A,WAHAB A W A,IDRIS M Y l. Copy-move forgery detection:survey,challenges and future directions[J]. Journal of Network and Computer Applications, 2016,75 (1):259-278.

              WARIF N B A,WAHAB A W A,IDRIS M Y l. Copy-move forgery detection:survey,challenges and future directions[J]. Journal of Network and Computer Applications, 2016,75 (1):259-278.

    [3] [3] EMAM Mahmoud,HAN Qi,NIU Xiamu. PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools and Applications, 2016,75(18):11513 -11527.

              EMAM Mahmoud,HAN Qi,NIU Xiamu. PCET based copy-move forgery detection in images under geometric transforms[J]. Multimedia Tools and Applications, 2016,75(18):11513 -11527.

    [5] [5] TAO Rui,SUN Yanjing,LIU Weidong. Forgery detection using chaotic watermarking in image key areas[J]. Tehnicki Vjesnik-Technical Gazette, 2017,24(4):1263-1268.

              TAO Rui,SUN Yanjing,LIU Weidong. Forgery detection using chaotic watermarking in image key areas[J]. Tehnicki Vjesnik-Technical Gazette, 2017,24(4):1263-1268.

    [7] [7] ZHILA Bahrami,FARDIN Akhlaghiantab. A new robust video watermarking algorithm based on SURF features and block classification[J]. Multimedia Tools and Applications, 2018,77(1):327-345.

              ZHILA Bahrami,FARDIN Akhlaghiantab. A new robust video watermarking algorithm based on SURF features and block classification[J]. Multimedia Tools and Applications, 2018,77(1):327-345.

    [10] [10] MANU V T,MEHTRE B M. Copy-move tampering detection using affine transformation property preservation on clustered keypoints[J]. Signal Image and Video Processing, 2018,12(3):549-556.

              MANU V T,MEHTRE B M. Copy-move tampering detection using affine transformation property preservation on clustered keypoints[J]. Signal Image and Video Processing, 2018,12(3):549-556.

    [11] [11] WANG Huan,WANG Hongxia,SUN, Xingming. A passive authentication scheme for copy-move forgery based on package clustering algorithm[J]. Multimedia Tools and Applications, 2017,76(10):12627-12644.

              WANG Huan,WANG Hongxia,SUN, Xingming. A passive authentication scheme for copy-move forgery based on package clustering algorithm[J]. Multimedia Tools and Applications, 2017,76(10):12627-12644.

    [12] [12] MAHMOOD Toqeer,IRTAZA Aun,MEHMOOD Zahid. Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images[J]. Forensic Science International, 2017,279(1):8-21.

              MAHMOOD Toqeer,IRTAZA Aun,MEHMOOD Zahid. Copy-move forgery detection through stationary wavelets and local binary pattern variance for forensic analysis in digital images[J]. Forensic Science International, 2017,279(1):8-21.

    [13] [13] WANG Xiangyang,LI Shuo,LIU Yunan. A new keypoint-based copy-move forgery detection for small smooth regions[J]. Multimedia Tools and Applications, 2017,76 (22):23353-23382.

              WANG Xiangyang,LI Shuo,LIU Yunan. A new keypoint-based copy-move forgery detection for small smooth regions[J]. Multimedia Tools and Applications, 2017,76 (22):23353-23382.

    [14] [14] MOHAMED A E,HEBA A,MOHAMED M D. Two stages object recognition based copy-move forgery detection algorithm[J]. Multimedia Tools and Applications, 2019,78(11):15353- 15373.

              MOHAMED A E,HEBA A,MOHAMED M D. Two stages object recognition based copy-move forgery detection algorithm[J]. Multimedia Tools and Applications, 2019,78(11):15353- 15373.

    [15] [15] AMERINI I,BALLAN L,CALDELLI R. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3):1099-1110.

              AMERINI I,BALLAN L,CALDELLI R. A SIFT-based forensic method for copy-move attack detection and transformation recovery[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3):1099-1110.

    Tools

    Get Citation

    Copy Citation Text

    WANG Yazi, SUN Huaibo, MA Yuankun. Image copy-paste tampering detection algorithm based on color constrained coupling distance penalty model[J]. Journal of Terahertz Science and Electronic Information Technology , 2020, 18(3): 483

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Jul. 23, 2019

    Accepted: --

    Published Online: Jul. 16, 2020

    The Author Email: SUN Huaibo (sunhuaibo7788@163.com)

    DOI:10.11805/tkyda2019262

    Topics