期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Shearlet Based Video Fingerprint for Content-Based Copy Detection 被引量:1
1
作者 Fang Yuan Lam-Man Po +4 位作者 Mengyang Liu Xuyuan Xu Weihua Jian Kaman Wong Keith W. Cheung 《Journal of Signal and Information Processing》 2016年第2期84-97,共14页
Content-based copy detection (CBCD) is widely used in copyright control for protecting unauthorized use of digital video and its key issue is to extract robust fingerprint against different attacked versions of the sa... Content-based copy detection (CBCD) is widely used in copyright control for protecting unauthorized use of digital video and its key issue is to extract robust fingerprint against different attacked versions of the same video. In this paper, the “natural parts” (coarse scales) of the Shearlet coefficients are used to generate robust video fingerprints for content-based video copy detection applications. The proposed Shearlet-based video fingerprint (SBVF) is constructed by the Shearlet coefficients in Scale 1 (lowest coarse scale) for revealing the spatial features and Scale 2 (second lowest coarse scale) for revealing the directional features. To achieve spatiotemporal natural, the proposed SBVF is applied to Temporal Informative Representative Image (TIRI) of the video sequences for final fingerprints generation. A TIRI-SBVF based CBCD system is constructed with use of Invert Index File (IIF) hash searching approach for performance evaluation and comparison using TRECVID 2010 dataset. Common attacks are imposed in the queries such as luminance attacks (luminance change, salt and pepper noise, Gaussian noise, text insertion);geometry attacks (letter box and rotation);and temporal attacks (dropping frame, time shifting). The experimental results demonstrate that the proposed TIRI-SBVF fingerprinting algorithm is robust on CBCD applications on most of the attacks. It can achieve an average F1 score of about 0.99, less than 0.01% of false positive rate (FPR) and 97% accuracy of localization. 展开更多
关键词 Video Fingerprint Content-based copy detection Shearlet Transform
下载PDF
Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique
2
作者 C.D.Prem Kumar S.Saravana Sundaram 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期881-899,共19页
The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-mo... The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content.An effective technique for tampering the identification is the copy-move forgery.Conventional image processing techniques generally search for the patterns linked to the fake content and restrict the usage in massive data classification.Contrast-ingly,deep learning(DL)models have demonstrated significant performance over the other statistical techniques.With this motivation,this paper presents an Optimal Deep Transfer Learning based Copy Move Forgery Detection(ODTL-CMFD)technique.The presented ODTL-CMFD technique aims to derive a DL model for the classification of target images into the original and the forged/tampered,and then localize the copy moved regions.To perform the feature extraction process,the political optimizer(PO)with Mobile Networks(MobileNet)model has been derived for generating a set of useful vectors.Finally,an enhanced bird swarm algorithm(EBSA)with least square support vector machine(LS-SVM)model has been employed for classifying the digital images into the original or the forged ones.The utilization of the EBSA algorithm helps to properly modify the parameters contained in the Multiclass Support Vector Machine(MSVM)technique and thereby enhance the classification performance.For ensuring the enhanced performance of the ODTL-CMFD technique,a series of simulations have been performed against the benchmark MICC-F220,MICC-F2000,and MICC-F600 datasets.The experimental results have demonstrated the improvised performance of the ODTL-CMFD approach over the other techniques in terms of several evaluation measures. 展开更多
关键词 copy move detection image forgery deep learning machine learning parameter tuning FORENSICS
下载PDF
Video Copy Detection Based on Spatiotemporal Fusion Model 被引量:4
3
作者 Jianmin Li Yingyu Liang Bo Zhang 《Tsinghua Science and Technology》 EI CAS 2012年第1期51-59,共9页
Content-based video copy detection is an active research field due to the need for copyright pro- tection and business intellectual property protection. This paper gives a probabilistic spatiotemporal fusion approach ... Content-based video copy detection is an active research field due to the need for copyright pro- tection and business intellectual property protection. This paper gives a probabilistic spatiotemporal fusion approach for video copy detection. This approach directly estimates the location of the copy segment with a probabilistic graphical model. The spatial and temporal consistency of the video copy is embedded in the local probability function. An effective local descriptor and a two-level descriptor pairing method are used to build a video copy detection system to evaluate the approach. Tests show that it outperforms the popular voting algorithm and the probabilistic fusion framework based on the Hidden Markov Model, improving F-score (F1) by 8%. 展开更多
关键词 video copy detection probabilistic graphical model spatiotemporal fusion model
原文传递
PM-DFT:A New Local Invariant Descriptor Towards Image Copy Detection
4
作者 凌贺飞 王丽云 +2 位作者 严灵毓 邹复好 卢正鼎 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第3期558-566,F0003,共10页
Currently, global-features-based image copy detection is vulnerable to geometric transformations like cropping, shift, and rotations. To resolve this problem, some algorithms based on local descriptors have been propo... Currently, global-features-based image copy detection is vulnerable to geometric transformations like cropping, shift, and rotations. To resolve this problem, some algorithms based on local descriptors have been proposed. However, the local descriptors, which were originally designed for object recognition, are not suitable for copy detection because they cause the problems of false positives and ambiguities. Instead of relying on the local gradient statistic as many existing descriptors do, we propose a new invariant local descriptor based on local polar-mapping and discrete Fourier transform. Then based on this descriptor, we propose a new framework of copy detection, in which virtual prior attacks and attack weight are employed for training and selecting only a few robust features. This consequently improves the storage and detection efficiency. In addition, it is worth noting that the feature matching takes the locations and orientations of interest points into consideration, which increases the number of matched regions and improves the recall. Experimental results show that the new descriptor is more robust and distinctive, and the proposed copy detection scheme using this descriptor can substantially enhance the accuracy and recall of copy detection and lower the false positives and ambiguities. 展开更多
关键词 copy detection local invariant descriptor discrete Fourier transform polar-mapping
原文传递
A sparse representation-based approach for video copy detection
5
作者 Jianmin LI Chen SUN Bo ZHANG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2012年第2期208-215,共8页
Content-based video copy detection becomes an active research field due to requirement of copyright protection, business intelligence, video retrieval, etc. Although it is assumed in the existing methods that referenc... Content-based video copy detection becomes an active research field due to requirement of copyright protection, business intelligence, video retrieval, etc. Although it is assumed in the existing methods that reference database consists of original videos, these videos are difficult to be obtained in many practical cases. In this paper, a copy detection method based on sparse repre- sentation is proposed to make use of some imperfect prototypes of original videos maintained in the reference database. A query video is represented as a linear combination of all the videos in the database. Then we can determine that whether the query has sibling videos in the database based on distribution of coefficients and find them out based on reconstruction error. The experiments show that even with very limited dimensional feature, this method can achieve high performance. 展开更多
关键词 video copy detection near duplicated video sparse representation
原文传递
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
6
作者 S.B.G.Tilak Babu Ch Srinivasa Rao 《Big Data Mining and Analytics》 EI CSCD 2023年第3期347-360,共14页
Passive image forgery detection methods that identify forgeries without prior knowledge have become a key research focus.In copy-move forgery,the assailant intends to hide a portion of an image by pasting other portio... Passive image forgery detection methods that identify forgeries without prior knowledge have become a key research focus.In copy-move forgery,the assailant intends to hide a portion of an image by pasting other portions of the same image.The detection of such manipulations in images has great demand in legal evidence,forensic investigation,and many other fields.The paper aims to present copy-move forgery detection algorithms with the help of advanced feature descriptors,such as local ternary pattern,local phase quantization,local Gabor binary pattern histogram sequence,Weber local descriptor,and local monotonic pattern,and classifiers such as optimized support vector machine and optimized NBC.The proposed algorithms can classify an image efficiently as either copy-move forged or authenticated,even if the test image is subjected to attacks such as JPEG compression,scaling,rotation,and brightness variation.CoMoFoD,CASIA,and MICC datasets and a combination of CoMoFoD and CASIA datasets images are used to quantify the performance of the proposed algorithms.The proposed algorithms are more efficient than state-of-the-art algorithms even though the suspected image is post-processed. 展开更多
关键词 copy move forgery detection image authentication passive image forgery detection blind forgery detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部