Journal of Terahertz Science and Electronic Information Technology , Volume. 19, Issue 3, 478(2021)

Image tampering detection algorithm based on energy constrained coupled structure similar clustering

WANG Xiaoyu*
Author Affiliations
  • [in Chinese]
  • show less
    References(11)

    [3] [3] WO Yan,KANG Kemin,HAN Guoqiang. Copy-move forgery detection based on multiradius PCET[J]. IET Image Processing, 2017,11(2):99-108.

    [4] [4] DAGHER I,HANNA P. An improved watermarking algorithm using variable block image features[J]. Pattern Recognition and Image Analysis, 2017,27(2):289-300.

    [5] [5] CHOUDHARY Shyamsrakash,PRJWAL Pralhadpanzade. Detection of copy-move forgery using AKAZE and SIFT keypoint extraction[J]. Multimedia Tools and Applications, 2019,78(16):23535-23558.

    [6] [6] LIU Yaqi,GUAN Qingxiao,ZHAO Xianfeng. Copy-move forgery detection based on convolutional kernel network[J]. Multi- media Tools & Applications, 2018,77(14):18269-18293.

    [8] [8] LYU Yingda,SHEN Xuanjing,CHEN Haipeng. Copy-paste detection based on an SIFT marked graph feature vector[J]. Chinese Journal of Electronics, 2017,26(2):345-350.

    [12] [12] ZHILA Bahrami,FARDIN Akhlaghian Tab. A new robust video watermarking algorithm based on SURF features and block classification[J]. Multimedia Tools and Applications, 2018,77(1):327-345.

    [13] [13] LI Gun,LI Cuihua,ZHU Yingpan. An improved speckle-reduction algorithm for SAR images based on anisotropic diffusion[J]. Multimedia Tools and Applications, 2017,76(17):17615-17632.

    [14] [14] OLIVEIRA Saulo,ROCHA Neto,AJALMAR Bezerrafrancisco. A novel genetic algorithms and SURF-based approach for image retargeting[J]. Expert Systems with Applications, 2016,44(8):332-343.

    [15] [15] ZHANG Lei,YANG Fengbao,JI Linna. Infrared polarization and intensity image fusion algorithm based on the feature transfer[J]. Automatic Control and Computer Sciences, 2018,52(2):135-145.

    [17] [17] DANIEL Cavalcanti Jeronymo,YURI Cassio Campbell Borges,LEANDRO Dos Santos Coelho. Image forgery detection by semi-automatic wavelet soft-thresholding with error level analysis[J]. Expert Systems with Applications, 2017,85(1):348-356.

    [18] [18] AMANI Alahmadi,MUHAMMAD Hussain,HATIM Aboalsamh. Passive detection of image forgery using DCT and local binary pattern[J]. Signal,Image and Video Processing, 2017,11(1):81-88.

    Tools

    Get Citation

    Copy Citation Text

    WANG Xiaoyu. Image tampering detection algorithm based on energy constrained coupled structure similar clustering[J]. Journal of Terahertz Science and Electronic Information Technology , 2021, 19(3): 478

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Oct. 14, 2019

    Accepted: --

    Published Online: Aug. 19, 2021

    The Author Email: Xiaoyu WANG (Wangxyu1979jch@2980.com)

    DOI:10.11805/tkyda2019397

    Topics