A comprehensive evaluation procedure for copy-move forgery detection methods : Results from a systematic review
In the current age, the wide use of digital images has led to the manipulations of content that misrepresent information with malicious goals. This issue demands the requirement of digital image investigation to authenticate the source and certify the trustworthiness of images. One image manipulatio...
| Main Authors: | Nor Bakiah, Abd Warif, Mohd Yamani Idna, Idris, Ainuddin, Wahid Abdul Wahab, Nor Syahidatul Nadiah, Ismail, Rosli, Salleh |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Springer
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/42638/ http://umpir.ump.edu.my/id/eprint/42638/1/A%20comprehensive%20evaluation%20procedure%20for%20copy-move.pdf http://umpir.ump.edu.my/id/eprint/42638/2/A%20comprehensive%20evaluation%20procedure%20for%20copy-move%20forgery%20detection%20methods_Results%20from%20a%20systematic%20review_ABS.pdf |
Similar Items
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023)
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Muniappan, Thiiban, et al.
Published: (2023)
by: Muniappan, Thiiban, et al.
Published: (2023)
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015)
by: Somayeh, Sadeghi
Published: (2015)
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Thiiban Muniappan, Thiiban Muniappan, et al.
Published: (2023)
by: Thiiban Muniappan, Thiiban Muniappan, et al.
Published: (2023)
Accelerating FPGA-surf feature detection module by memory access reduction
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
by: Mohd. Yamani Idna, Idris, et al.
Published: (2019)
Internet of Things (IoT) Smart Rubber Scale (SRS) system using arduino platform
by: Nor Syahidatul, Nadiah Ismail, et al.
Published: (2020)
by: Nor Syahidatul, Nadiah Ismail, et al.
Published: (2020)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
A VHDL implementation of bist technique in UART design / Muhd. Yamani Idna Idris
by: Muhd. Yamani, Idna Idris
Published: (2002)
by: Muhd. Yamani, Idna Idris
Published: (2002)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
Parameter estimation in computational systems biology models: a comparative study of initialization methods in global optimization
by: Muhammad Akmal, Remli, et al.
Published: (2022)
by: Muhammad Akmal, Remli, et al.
Published: (2022)
Image splicing forgery approachs: A review and future direction
by: Ernawati, Muji, et al.
Published: (2022)
by: Ernawati, Muji, et al.
Published: (2022)
Copy-Move Forgery Detection using Integrated DWT and SURF
by: Alamro, Loai, et al.
Published: (2017)
by: Alamro, Loai, et al.
Published: (2017)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Comparison of edge detection algorithms for texture analysis on copy-move forgery detection images
by: Idris, Bashir, et al.
Published: (2022)
by: Idris, Bashir, et al.
Published: (2022)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
Passive video forgery detection using frame correlation statistical features / Aminu Mustapha Bagiwa
by: Aminu Mustapha, Bagiwa
Published: (2017)
by: Aminu Mustapha, Bagiwa
Published: (2017)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Enhanced Block-Based Copy-Move Image Forgery Detection Using K-Means Clustering Technique
by: Mohammed Abdo Al-Qershi, Osamah
Published: (2018)
by: Mohammed Abdo Al-Qershi, Osamah
Published: (2018)
Passive video forgery detection techniques: a survey
by: Abdul Wahab, Ainuddin Wahid, et al.
Published: (2014)
by: Abdul Wahab, Ainuddin Wahid, et al.
Published: (2014)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
On the move
by: Oxley, A.
Published: (2007)
by: Oxley, A.
Published: (2007)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Classification of moving objects using active vision
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2005)
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2005)
Moving object detection for visual surveillance application
by: Ong, Kelvin Chun Yauw
Published: (2018)
by: Ong, Kelvin Chun Yauw
Published: (2018)
Aircraft evacuation procedure using discrete event simulation
by: Noraini Azwani, Arifin
Published: (2019)
by: Noraini Azwani, Arifin
Published: (2019)
Comprehensive survey on Big Data Privacy
Protection
by: BinJubeir, Mohammed, et al.
Published: (2019)
by: BinJubeir, Mohammed, et al.
Published: (2019)
"Do it yourself moves and changes" PBXoIP system
by: Abd. Rahman, Farah Adibah
Published: (2006)
by: Abd. Rahman, Farah Adibah
Published: (2006)
Cross technology communication (CTC) between DSRC/WAVE and TVWS: From survey towards framework
by: Tanvir, Ahmad, et al.
Published: (2022)
by: Tanvir, Ahmad, et al.
Published: (2022)
SDN Enabled Big Data Analytics and Framework for Sensor Data of Vehicle Health, Safety and Monitoring System
by: Ahmad, Tanvir, et al.
Published: (2023)
by: Ahmad, Tanvir, et al.
Published: (2023)
Data replication model for remote procedure call transactions
by: Deris, Mustafa Mat, et al.
Published: (2005)
by: Deris, Mustafa Mat, et al.
Published: (2005)
A review of knowledge graph embedding methods of TransE, TransH and TransR for missing links
by: Salwana, Mohamad, et al.
Published: (2023)
by: Salwana, Mohamad, et al.
Published: (2023)
A VHDL implementation of BIST technique in UART design / by Mohd. Yamani Idna bin Idris.
by: Idris, Mohd. Yamani Idna
Published: (2002)
by: Idris, Mohd. Yamani Idna
Published: (2002)
Different learning styles in acquisition of declarative and procedural knowledge / Ammuthavali Ramasamy
by: Ammuthavali, Ramasamy
Published: (2005)
by: Ammuthavali, Ramasamy
Published: (2005)
Comparative Analysis of Freemium Policies and Procedure between Major Mobile Platforms
by: Muhamad Idaham, Umar Ong, et al.
Published: (2014)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2014)
Comprehensive analysis on hardware forensic for gambling machine
by: Magalingam, Pritheega
Published: (2008)
by: Magalingam, Pritheega
Published: (2008)
Parents-Teacher Assisting Monitoring Application (PTAMA) System
by: Nor Syahidatul Nadiah, Ismail, et al.
Published: (2019)
by: Nor Syahidatul Nadiah, Ismail, et al.
Published: (2019)
Convergence results and sharp estimates for the
voter model interfaces
by: brahim belhaouari, samir, et al.
Published: (2010)
by: brahim belhaouari, samir, et al.
Published: (2010)
NL scoring and Bloom competency test: an experimental result
by: Lajis, Adidah, et al.
Published: (2012)
by: Lajis, Adidah, et al.
Published: (2012)
Similar Items
-
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019) -
A comparative analysis on three duplication elements in copy-move forgery using patchmatch-based detection method
by: Nur Izzati, Nor Azaimi, et al.
Published: (2023) -
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Muniappan, Thiiban, et al.
Published: (2023) -
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
by: Somayeh, Sadeghi
Published: (2015) -
An Evaluation of Convolutional Neural Network (CNN) Model
for Copy-Move and Splicing Forgery Detection
by: Thiiban Muniappan, Thiiban Muniappan, et al.
Published: (2023)