Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Manipulation of digital images is not considered a new thing nowadays. For as long as cameras have existed, photographers have been staged and images have been forged and passed off for more nefarious purposes. Region duplication is regarded as an efficient and simple operation for image forgeries,...
| Main Author: | Diaa , Mohammed Hassan Uliyan |
|---|---|
| Format: | Thesis |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11897/ http://studentsrepo.um.edu.my/11897/1/Diaa_Mohammed.pdf |
Similar Items
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015)
by: Somayeh, Sadeghi
Published: (2015)
Effectiveness of RSS feed item duplication detection using word matching
by: Tan, Ian K. T., et al.
Published: (2011)
by: Tan, Ian K. T., et al.
Published: (2011)
A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
Utilizing word matching for duplicate article removal : a study using Malaysian online news feed
by: Su, Tze-Wei, et al.
Published: (2011)
by: Su, Tze-Wei, et al.
Published: (2011)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
Passive video forgery detection using frame correlation statistical features / Aminu Mustapha Bagiwa
by: Aminu Mustapha, Bagiwa
Published: (2017)
by: Aminu Mustapha, Bagiwa
Published: (2017)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
by: Arif, Hanafi, et al.
Published: (2016)
by: Arif, Hanafi, et al.
Published: (2016)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Intuitive content management system via manipulation and duplication with if-else rules classification
by: Chan, Chung Hoong
Published: (2018)
by: Chan, Chung Hoong
Published: (2018)
Enhanced Automated Heterogeneous Data Duplication Model Using Parallel Data Compression And Sorting Technique
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Image splicing forgery approachs: A review and future direction
by: Ernawati, Muji, et al.
Published: (2022)
by: Ernawati, Muji, et al.
Published: (2022)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
Investigating the effectiveness of point features matching for detecting gun items
by: Nur Najwa, Ibrahim
Published: (2018)
by: Nur Najwa, Ibrahim
Published: (2018)
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review
by: Nor Bakiah, Abd Warif, et al.
Published: (2022)
by: Nor Bakiah, Abd Warif, et al.
Published: (2022)
Ontology matching: in search of challenges ahead
by: Farooqui, N.K., et al.
Published: (2015)
by: Farooqui, N.K., et al.
Published: (2015)
An empirical comparative study of instance-based schema matching
by: Alzeber, Mogahed, et al.
Published: (2018)
by: Alzeber, Mogahed, et al.
Published: (2018)
Personal library system / Mohamed Irfan Jan Mohamed
by: Mohamed Irfan, Jan Mohamed
Published: (2004)
by: Mohamed Irfan, Jan Mohamed
Published: (2004)
Sistem pengkategorian teks / Hazyzyizuan Abu Hassan
by: Hazyzyizuan, Abu Hassan
Published: (2003)
by: Hazyzyizuan, Abu Hassan
Published: (2003)
Development of job matching algorithm with collective learning
by: Cheng, Kam Ching
Published: (2013)
by: Cheng, Kam Ching
Published: (2013)
Image matching using relational graph representation
by: Lai, Chui Yen
Published: (2005)
by: Lai, Chui Yen
Published: (2005)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
Optical Character Recognition By Using Template Matching (Alphabet)
by: Nadira, Muda, et al.
Published: (2007)
by: Nadira, Muda, et al.
Published: (2007)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Matching Technique for Resource Discovery using PageRank
by: Zarandah, Qasem M.
Published: (2006)
by: Zarandah, Qasem M.
Published: (2006)
Mechanize feature-to-feature matching system utilizing repeated inspection data
by: Mat Din, Mazura, et al.
Published: (2008)
by: Mat Din, Mazura, et al.
Published: (2008)
Doa-doa / Mariana Mohamed Sam
by: Mariana, Mohamed Sam
Published: (2002)
by: Mariana, Mohamed Sam
Published: (2002)
Intelligent Mobile Maid Matching Using Similarity Search
by: Ong, Shu Xian
Published: (2020)
by: Ong, Shu Xian
Published: (2020)
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)
by: Edris, Khalid Edris, et al.
Published: (2014)
HSV-template matching with MEESPSO algorithm for human tracking in a crowded environment
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2024)
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2024)
Model free tuning of laguerre network for impedance matching in bilateral teleoperation system
by: Mohd Syakirin, Ramli, et al.
Published: (2021)
by: Mohd Syakirin, Ramli, et al.
Published: (2021)
Copy-Move Forgery Detection using Integrated DWT and SURF
by: Alamro, Loai, et al.
Published: (2017)
by: Alamro, Loai, et al.
Published: (2017)
Chest region estimation using chin landmark keypoints for heart attack detection
by: Noraizan, Ibrahim, et al.
Published: (2025)
by: Noraizan, Ibrahim, et al.
Published: (2025)
Diari keluarga / Kintan Azura Mohamed Yusuff
by: Kintan Azura , Mohamed Yusuff
Published: (2003)
by: Kintan Azura , Mohamed Yusuff
Published: (2003)
Similar Items
-
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015) -
Effectiveness of RSS feed item duplication detection using word matching
by: Tan, Ian K. T., et al.
Published: (2011) -
A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023) -
Utilizing word matching for duplicate article removal : a study using Malaysian online news feed
by: Su, Tze-Wei, et al.
Published: (2011) -
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)