bibtype J - Journal Article
ARLID 0483329
utime 20240103215204.3
mtime 20171218235959.9
SCOPUS 85038026758
WOS 000424296400012
DOI 10.1016/j.forsciint.2017.11.031
title (primary) (eng) Detection of Copy-move Image Modification Using JPEG Compression Model
specification
page_count 11 s.
media_type P
serial
ARLID cav_un_epca*0256627
ISSN 0379-0738
title Forensic Science International
volume_id 283
volume 1 (2018)
page_num 47-57
publisher
name Elsevier
keyword Copy-move modification
keyword Forgery
keyword Image tampering
keyword Quantization constraint set
author (primary)
ARLID cav_un_auth*0283562
name1 Novozámský
name2 Adam
full_dept (cz) Zpracování obrazové informace
full_dept (eng) Department of Image Processing
department (cz) ZOI
department (eng) ZOI
institution UTIA-B
full_dept Department of Image Processing
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
author
ARLID cav_un_auth*0108377
name1 Šorel
name2 Michal
full_dept (cz) Zpracování obrazové informace
full_dept Department of Image Processing
department (cz) ZOI
department ZOI
institution UTIA-B
full_dept Department of Image Processing
fullinstit Ústav teorie informace a automatizace AV ČR, v. v. i.
source
url http://library.utia.cas.cz/separaty/2017/ZOI/novozamsky-0483329.pdf
cas_special
project
ARLID cav_un_auth*0338628
project_id GA16-13830S
agency GA ČR
country CZ
project
ARLID cav_un_auth*0314467
project_id GA15-16928S
agency GA ČR
abstract (eng) The so-called copy-move forgery, based on copying an object and pasting in another location of the same image, is a common way to manipulate image content. In this paper, we address the problem of copy-move forgery detection in JPEG images. The main problem with JPEG compression is that the same pixels, after moving to a different position and storing in the JPEG format, have different values. The majority of existing algorithms is based on matching pairs of similar patches, which generates many false matches. In many cases they cannot be eliminated by postprocessing, causing the failure of detection. To overcome this problem, we derive a JPEG-based constraint that any pair of patches must satisfy to be considered a valid candidate and propose an efficient algorithm to verify the constraint. The constraint can be integrated into most existing methods. Experiments show significant improvement of detection, especially for difficult cases, such as small objects, objects covered by textureless areas and repeated patterns.
RIV JD
FORD0 10000
FORD1 10200
FORD2 10201
reportyear 2019
num_of_auth 2
mrcbC52 4 A hod 4ah 20231122142908.7
inst_support RVO:67985556
permalink http://hdl.handle.net/11104/0278697
mrcbC64 1 Department of Image Processing UTIA-B 10200 COMPUTER SCIENCE, THEORY & METHODS
confidential S
mrcbC86 1 Article Medicine Legal
mrcbT16-e MEDICINELEGAL
mrcbT16-j 0.513
mrcbT16-s 0.879
mrcbT16-B 55.496
mrcbT16-D Q2
mrcbT16-E Q2
arlyear 2018
mrcbTft \nSoubory v repozitáři: novozamsky-0483329.pdf
mrcbU14 85038026758 SCOPUS
mrcbU24 PUBMED
mrcbU34 000424296400012 WOS
mrcbU63 cav_un_epca*0256627 Forensic Science International 0379-0738 1872-6283 Roč. 283 č. 1 2018 47 57 Elsevier