Xiu-Jian et al., 2022 - Google Patents
Deep Learning Based Image Forgery Detection MethodsXiu-Jian et al., 2022
View PDF- Document ID
- 6859214375763067836
- Author
- Xiu-Jian L
- Sun H
- Publication year
- Publication venue
- Journal of Cybersecurity
External Links
Snippet
Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one's fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye …
- 238000001514 detection method 0 title abstract description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guo et al. | Fake colorized image detection | |
Walia et al. | Digital image forgery detection: a systematic scrutiny | |
Asghar et al. | Copy-move and splicing image forgery detection and localization techniques: a review | |
Al-Qershi et al. | Evaluation of copy-move forgery detection: datasets and evaluation metrics | |
Bourouis et al. | Recent advances in digital multimedia tampering detection for forensics analysis | |
Asghar et al. | Edge–texture feature-based image forgery detection with cross-dataset evaluation | |
Zou et al. | Compact image fingerprint via multiple kernel hashing | |
Ren et al. | ESRNet: Efficient search and recognition network for image manipulation detection | |
Verma et al. | Survey on image copy-move forgery detection | |
Suresh et al. | Deep learning-based image forgery detection system | |
Sarma et al. | A study on digital image forgery detection | |
Mushtaq et al. | Novel method for image splicing detection | |
Xiu-Jian et al. | Deep Learning Based Image Forgery Detection Methods | |
Tan et al. | Multi-scale Target-Aware Framework for Constrained Splicing Detection and Localization | |
Chaitra et al. | Digital image forgery: taxonomy, techniques, and tools–a comprehensive study | |
Rahman et al. | SMIFD: novel social media image forgery detection database | |
Luo et al. | Toward real text manipulation detection: New dataset and new solution | |
Tyagi et al. | ForensicNet: Modern convolutional neural network‐based image forgery detection network | |
Koshy et al. | Detection of tampered real time videos using deep neural networks | |
Peng et al. | Mobilevit-focr: Mobilevit with fixed-one-centre loss and gradient reversal for generalised fake face detection | |
Khallaf et al. | Detection of Image Tempering: Conventional and Deep Learning-based Techniques | |
Tan et al. | The impact of data correlation on identification of computer-generated face images | |
Jain et al. | VGG16Unet: effective passive model for image splicing forgery localization | |
Jindal et al. | Digital image forensics-gateway to authenticity: Crafted with observations, trends and forecasts | |
Jyothi et al. | RECOGNITION OF PROFILE FRADULENCE FRETTING OUT USING CNN |