Copy-move forgery detection: survey, challenges and future directions

NB Abd Warif, AWA Wahab, MYI Idris, R Ramli… - Journal of Network and …, 2016 - Elsevier
The authenticity and reliability of digital images are increasingly important due to the ease in
modifying such images. Thus, the capability to identify image manipulation is a current …

Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

Hybrid lstm and encoder–decoder architecture for detection of image forgeries

JH Bappy, C Simons, L Nataraj… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
With advanced image journaling tools, one can easily alter the semantic meaning of an
image by exploiting certain manipulation techniques such as copy clone, object splicing …

Efficient detection of copy-move forgery using polar complex exponential transform and gradient direction pattern

SBGT Babu, CS Rao - Multimedia Tools and Applications, 2023 - Springer
Evidence plays a vital role in image forensics. If evidence is an image, then its authenticity
verification is the key to image forensics. One of the common forgeries in digital images is …

Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks

K Zhang, Y Mao, S Leng, Q Zhao, L Li, X Peng… - IEEE …, 2016 - ieeexplore.ieee.org
Mobile edge computing (MEC) is a promising paradigm to provide cloud-computing
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …

Busternet: Detecting copy-move image forgery with source/target localization

Y Wu, W Abd-Almageed… - Proceedings of the …, 2018 - openaccess.thecvf.com
We introduce a novel deep neural architecture for image copy-move forgery detection
(CMFD), code-named BusterNet. Unlike previous eorts, BusterNet is a pure, end-to-end …

Novel visual and statistical image features for microblogs news verification

Z Jin, J Cao, Y Zhang, J Zhou… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Microblog has been a popular media platform for reporting and propagating news. However,
fake news spreading on microblogs would severely jeopardize its public credibility. To …

A color and texture based approach for the detection and classification of plant leaf disease using KNN classifier

E Hossain, MF Hossain… - … conference on electrical …, 2019 - ieeexplore.ieee.org
Modern organic farming is gaining popularity in the agriculture of many developing
countries. There are many problems arise in farming due to various environmental factors …

Firefly algorithm with neighborhood attraction

H Wang, W Wang, X Zhou, H Sun, J Zhao, X Yu… - Information Sciences, 2017 - Elsevier
Firefly algorithm (FA) is a new optimization technique based on swarm intelligence. It
simulates the social behavior of fireflies. The search pattern of FA is determined by the …

Robust detection of image operator chain with two-stream convolutional neural network

X Liao, K Li, X Zhu, KJR Liu - IEEE Journal of Selected Topics …, 2020 - ieeexplore.ieee.org
Many forensic techniques have recently been developed to determine whether an image
has undergone a specific manipulation operation. When multiple consecutive operations are …