{"title":"一种基于极坐标正弦变换的复制移动伪造检测方法","authors":"Yanfen Gan, Jixiang Yang","doi":"10.1109/IICSPI48186.2019.9096005","DOIUrl":null,"url":null,"abstract":"Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Effective Scheme for Copy-move Forgery Detection Using Polar Sine Transform\",\"authors\":\"Yanfen Gan, Jixiang Yang\",\"doi\":\"10.1109/IICSPI48186.2019.9096005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.\",\"PeriodicalId\":318693,\"journal\":{\"name\":\"2019 2nd International Conference on Safety Produce Informatization (IICSPI)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Safety Produce Informatization (IICSPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IICSPI48186.2019.9096005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICSPI48186.2019.9096005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Effective Scheme for Copy-move Forgery Detection Using Polar Sine Transform
Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.