000 | a | ||
---|---|---|---|
999 |
_c31623 _d31623 |
||
008 | 220610b xxu||||| |||| 00| 0 eng d | ||
020 | _a9789811690402 | ||
082 |
_a621.367 _bSON |
||
100 | _aSoni, Badal | ||
245 | _aImage copy-move forgery detection : new tools and techniques | ||
260 |
_bSpringer, _c2022 _aSingapore : |
||
300 |
_axxi, 133 p. ; _b ill., (b & w, and col.), _c24 cm |
||
365 |
_b129.99 _cEUR _d86.00 |
||
490 |
_aStudies in computational intelligence ; _vv.1017 |
||
504 | _aIncludes bibliographical references. | ||
520 | _aThis book presents a detailed study of key points and block-based copy-move forgery detection techniques with a critical discussion about their pros and cons. It also highlights the directions for further development in image forgery detection. The book includes various publicly available standard image copy-move forgery datasets that are experimentally analyzed and presented with complete descriptions. Five different image copy-move forgery detection techniques are implemented to overcome the limitations of existing copy-move forgery detection techniques. The key focus of work is to reduce the computational time without adversely affecting the efficiency of these techniques. In addition, these techniques are also robust to geometric transformation attacks like rotation, scaling, or both. | ||
650 | _aImage processing | ||
650 | _aDigital techniques | ||
650 | _aDigital images | ||
650 | _aForgeries | ||
650 | _aDigital forensic science | ||
650 | _aAffine transform | ||
650 | _aCMFD | ||
650 | _aCopied region | ||
650 | _aDataset | ||
650 | _a Descriptors | ||
650 | _aDetection results | ||
650 | _aForensics | ||
650 | _a Forged images | ||
650 | _aGeometric transformation | ||
650 | _aMICC-F220 dataset | ||
650 | _aOverlapping blocks | ||
650 | _aPost-processing operations | ||
650 | _aRotation, scaling | ||
650 | _aSIFT | ||
650 | _aSURF | ||
650 | _a Tampered images | ||
650 | _a Wavelet | ||
700 | _aDas, Pradip K. | ||
942 |
_2ddc _cBK |