A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same characteristics as the original image. Most of the existing datasets only highligh...
| Main Authors: | Nur Izzati, Nor Azaimi, Nor Bakiah, Abd Warif, Nor Syahidatul Nadiah, Ismail |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/40337/ http://umpir.ump.edu.my/id/eprint/40337/1/A%20comparative%20analysis%20on%20three%20duplication%20elements.pdf http://umpir.ump.edu.my/id/eprint/40337/2/A%20comparative%20analysis%20on%20three%20duplication%20elements%20in%20copy-move%20forgery%20using%20patchmatch-based%20detection%20method_ABS.pdf |
Similar Items
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review
by: Nor Bakiah, Abd Warif, et al.
Published: (2022)
by: Nor Bakiah, Abd Warif, et al.
Published: (2022)
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Muniappan, Thiiban, et al.
Published: (2023)
by: Muniappan, Thiiban, et al.
Published: (2023)
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015)
by: Somayeh, Sadeghi
Published: (2015)
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Thiiban Muniappan, Thiiban Muniappan, et al.
Published: (2023)
by: Thiiban Muniappan, Thiiban Muniappan, et al.
Published: (2023)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
Internet of Things (IoT) Smart Rubber Scale (SRS) system using arduino platform
by: Nor Syahidatul, Nadiah Ismail, et al.
Published: (2020)
by: Nor Syahidatul, Nadiah Ismail, et al.
Published: (2020)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
Image splicing forgery approachs: A review and future direction
by: Ernawati, Muji, et al.
Published: (2022)
by: Ernawati, Muji, et al.
Published: (2022)
Parameter estimation in computational systems biology models: a comparative study of initialization methods in global optimization
by: Muhammad Akmal, Remli, et al.
Published: (2022)
by: Muhammad Akmal, Remli, et al.
Published: (2022)
Enhanced Block-Based Copy-Move Image Forgery Detection Using K-Means Clustering Technique
by: Mohammed Abdo Al-Qershi, Osamah
Published: (2018)
by: Mohammed Abdo Al-Qershi, Osamah
Published: (2018)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
Copy-Move Forgery Detection using Integrated DWT and SURF
by: Alamro, Loai, et al.
Published: (2017)
by: Alamro, Loai, et al.
Published: (2017)
Comparison of edge detection algorithms for texture analysis on copy-move forgery detection images
by: Idris, Bashir, et al.
Published: (2022)
by: Idris, Bashir, et al.
Published: (2022)
Intuitive content management system via manipulation and duplication with if-else rules classification
by: Chan, Chung Hoong
Published: (2018)
by: Chan, Chung Hoong
Published: (2018)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Passive video forgery detection using frame correlation statistical features / Aminu Mustapha Bagiwa
by: Aminu Mustapha, Bagiwa
Published: (2017)
by: Aminu Mustapha, Bagiwa
Published: (2017)
Effectiveness of RSS feed item duplication detection using word matching
by: Tan, Ian K. T., et al.
Published: (2011)
by: Tan, Ian K. T., et al.
Published: (2011)
Portable anti forgery recognition for attendance system using fingerprint based biometric
by: Zainal, Nur Izzati, et al.
Published: (2016)
by: Zainal, Nur Izzati, et al.
Published: (2016)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
by: Arif, Hanafi, et al.
Published: (2016)
by: Arif, Hanafi, et al.
Published: (2016)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Cross technology communication (CTC) between DSRC/WAVE and TVWS: From survey towards framework
by: Tanvir, Ahmad, et al.
Published: (2022)
by: Tanvir, Ahmad, et al.
Published: (2022)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Utilizing word matching for duplicate article removal : a study using Malaysian online news feed
by: Su, Tze-Wei, et al.
Published: (2011)
by: Su, Tze-Wei, et al.
Published: (2011)
On the move
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
ELA REMIND : A medicine box reminder system for elderly living alone (ELA) implementing the infrared sensor, internet of things and mobile application
by: Nor Saradatul Akmar, Zulkifli, et al.
Published: (2022)
by: Nor Saradatul Akmar, Zulkifli, et al.
Published: (2022)
Enhanced Automated Heterogeneous Data Duplication Model Using Parallel Data Compression And Sorting Technique
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
Accelerating FPGA-surf feature detection module by memory access reduction
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
An enhanced feature selection and cancer classification for microarray data using relaxed Lasso and support vector machine
by: Aina Umairah, Mazlan, et al.
Published: (2021)
by: Aina Umairah, Mazlan, et al.
Published: (2021)
Real-time threshold-based fall detection system using wearable IoT
by: Nur Izdihar, Muhd Amir, et al.
Published: (2022)
by: Nur Izdihar, Muhd Amir, et al.
Published: (2022)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Classification of moving objects using active vision
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2005)
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2005)
Moving object detection for visual surveillance application
by: Ong, Kelvin Chun Yauw
Published: (2018)
by: Ong, Kelvin Chun Yauw
Published: (2018)
SDN Enabled Big Data Analytics and Framework for Sensor Data of Vehicle Health, Safety and Monitoring System
by: Ahmad, Tanvir, et al.
Published: (2023)
by: Ahmad, Tanvir, et al.
Published: (2023)
A review of knowledge graph embedding methods of TransE, TransH and TransR for missing links
by: Salwana, Mohamad, et al.
Published: (2023)
by: Salwana, Mohamad, et al.
Published: (2023)
Parents-Teacher Assisting Monitoring Application (PTAMA) System
by: Nor Syahidatul Nadiah, Ismail, et al.
Published: (2019)
by: Nor Syahidatul Nadiah, Ismail, et al.
Published: (2019)
"Do it yourself moves and changes" PBXoIP system
by: Abd. Rahman, Farah Adibah
Published: (2006)
by: Abd. Rahman, Farah Adibah
Published: (2006)
Performance comparison between AODV and DSR In Mobile Ad-Hoc Network (MANET)
by: Nor Ika Shahirah, Ramli, et al.
Published: (2021)
by: Nor Ika Shahirah, Ramli, et al.
Published: (2021)
Similar Items
-
A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review
by: Nor Bakiah, Abd Warif, et al.
Published: (2022) -
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019) -
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Muniappan, Thiiban, et al.
Published: (2023) -
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015) -
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Thiiban Muniappan, Thiiban Muniappan, et al.
Published: (2023)