[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xiu-Jian et al., 2022 - Google Patents

Deep Learning Based Image Forgery Detection Methods

Xiu-Jian et al., 2022

View PDF
Document ID
6859214375763067836
Author
Xiu-Jian L
Sun H
Publication year
Publication venue
Journal of Cybersecurity

External Links

Snippet

Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one's fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye …
Continue reading at cdn.techscience.cn (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • G06F17/30247Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Similar Documents

Publication Publication Date Title
Guo et al. Fake colorized image detection
Walia et al. Digital image forgery detection: a systematic scrutiny
Asghar et al. Copy-move and splicing image forgery detection and localization techniques: a review
Al-Qershi et al. Evaluation of copy-move forgery detection: datasets and evaluation metrics
Bourouis et al. Recent advances in digital multimedia tampering detection for forensics analysis
Asghar et al. Edge–texture feature-based image forgery detection with cross-dataset evaluation
Zou et al. Compact image fingerprint via multiple kernel hashing
Ren et al. ESRNet: Efficient search and recognition network for image manipulation detection
Verma et al. Survey on image copy-move forgery detection
Suresh et al. Deep learning-based image forgery detection system
Sarma et al. A study on digital image forgery detection
Mushtaq et al. Novel method for image splicing detection
Xiu-Jian et al. Deep Learning Based Image Forgery Detection Methods
Tan et al. Multi-scale Target-Aware Framework for Constrained Splicing Detection and Localization
Chaitra et al. Digital image forgery: taxonomy, techniques, and tools–a comprehensive study
Rahman et al. SMIFD: novel social media image forgery detection database
Luo et al. Toward real text manipulation detection: New dataset and new solution
Tyagi et al. ForensicNet: Modern convolutional neural network‐based image forgery detection network
Koshy et al. Detection of tampered real time videos using deep neural networks
Peng et al. Mobilevit-focr: Mobilevit with fixed-one-centre loss and gradient reversal for generalised fake face detection
Khallaf et al. Detection of Image Tempering: Conventional and Deep Learning-based Techniques
Tan et al. The impact of data correlation on identification of computer-generated face images
Jain et al. VGG16Unet: effective passive model for image splicing forgery localization
Jindal et al. Digital image forensics-gateway to authenticity: Crafted with observations, trends and forecasts
Jyothi et al. RECOGNITION OF PROFILE FRADULENCE FRETTING OUT USING CNN