Have a personal or library account? Click to login
Image Copy Detection Based on Local Binary Pattern and SVM Classifier Cover

Image Copy Detection Based on Local Binary Pattern and SVM Classifier

Open Access
|Jun 2020

References

  1. 1. Qureshi, M. A., M. Deriche. A Bibliography of Pixel-Based Blind Image Forgery Detection. – Signal Processing: Image Communication, Vol. <bold>39</bold>, 2015, pp. 46-74.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.image.2015.08.008" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.image.2015.08.008</a></dgdoi:pub-id>
  2. 2. Liu, G., J. Wang, S. Lian, Z. Wang. A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation. – Journal of Network and Computer Applications, Vol. <bold>34</bold>, 2011, pp. 1557-1565.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jnca.2010.09.001" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jnca.2010.09.001</a></dgdoi:pub-id>
  3. 3. Qazi, T., K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Kolodziej, H. Li, W. Lin, K. C. Yow, C. Z. Xu. Survey on Blind Image Forgery Detection. – IET Image Processing, Vol. <bold>7</bold>, 2013, pp. 660-670.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1049/iet-ipr.2012.0388" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1049/iet-ipr.2012.0388</a></dgdoi:pub-id>
  4. 4. Battiato, S., G. M. Farinella, E. Messina, G. Puglisi. Robust Image Alignment for Tampering Detection. – IEEE Transactions on Information Technology Forensics and Security, Vol. <bold>7</bold>, 2012, pp. 1105-1117.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TIFS.2012.2194285" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TIFS.2012.2194285</a></dgdoi:pub-id>
  5. 5. Khelifi, F. Perceptual Image Hashing Based on Virtual Watermark Detection. – IEEE Transactions on Image Processing, Vol. <bold>19</bold>, 2010, pp. 981-993.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TIP.2009.2038637" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TIP.2009.2038637</a></dgdoi:pub-id><dgpm:pub-id xmlns:dgpm="http://degruyter.com/resources/fetched-pubmed-id" pub-id-type="pmid">20007047</dgpm:pub-id>
  6. 6. Tang, Z., L. Chin, H. Yao, X. Zhang, C. Yu. Video Hashing with DCT and NMF. – The Computer Journal, 2019.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1093/comjnl/bxz060" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1093/comjnl/bxz060</a></dgdoi:pub-id>
  7. 7. Tang, Z., X. Zhang, X. Dai, J. Yang, T. Wu. Robust Image Hash Function Using Local Color Features. – International Journal of Electronics and Communications (AEU), Vol. <bold>67</bold>, 2013, pp. 717-722.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.aeue.2013.02.009" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.aeue.2013.02.009</a></dgdoi:pub-id>
  8. 8. Karsh, R. K., R. H., Laskar, andAditi. Robust Image Hashing through DWT-SVD and Spectral Residual Method. – EURASIP Journal on Image and Video Processing, Vol. <bold>31</bold>, 2017, pp. 1-17.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1186/s13640-017-0179-0" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1186/s13640-017-0179-0</a></dgdoi:pub-id>
  9. 9. Tang, Z., F. Yang, L. Huang, X. Zhang. Robust Image Hashing with Dominant DCT Coefficients. – Optik-International Journal for Light and Electron Optics, Vol. <bold>125</bold>, 2014, pp. 5102-5107.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.ijleo.2014.05.015" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.ijleo.2014.05.015</a></dgdoi:pub-id>
  10. 10. Chen, C. C., Shang-LinHsieh. Using Binarization and Hashing for Efficient SIFT Matching. – Journal of Visual Communication and Image Representation, Vol. <bold>30</bold>, 2015, pp. 86-93.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jvcir.2015.02.014" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jvcir.2015.02.014</a></dgdoi:pub-id>
  11. 11. Ouyang, J., G. Coatrieux, H. Shu. Robust Hashing for Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. – Digital Signal Processing, Vol. <bold>41</bold>, 2015, pp. 98-109.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.dsp.2015.03.006" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.dsp.2015.03.006</a></dgdoi:pub-id>
  12. 12. Liu, F., L. Cheng, H. Leung, Q. Fu. Wave Atom Transform Generated Strong Image Hashing Scheme. – Opt. Communication, Vol. <bold>7</bold>, 2012, pp. 5008-5018.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.optcom.2012.08.007" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.optcom.2012.08.007</a></dgdoi:pub-id>
  13. 13. Tang, Z., L. Huang, X. Zhang, H. Lao. Robust Image Hashing Based on Color Vector Angles and Canny Operator. – International Journal of Electronics and Communications (AEU), Vol. <bold>70</bold>, 2016, pp. 833-841.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.aeue.2016.03.010" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.aeue.2016.03.010</a></dgdoi:pub-id>
  14. 14. Tang, Z., Y. Dai, X. Zhang, L. Huang, FanYang. Robust Image Hashing via Colour Vector Angles and Discrete Wavelet Transform. – IET Image Processing, Vol. <bold>8</bold>, 2014, pp. 142-149.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1049/iet-ipr.2013.0332" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1049/iet-ipr.2013.0332</a></dgdoi:pub-id>
  15. 15. Karsh, R. K., R. H., Laskar, B. B. Richhariya. Robust Image Hashing Using Ring Partition-PGNMF and Local Features. – SpringerPlus, Vol. <bold>5</bold>, 2016, pp. 1-20.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1186/s40064-016-3639-6" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1186/s40064-016-3639-6</a></dgdoi:pub-id>
  16. 16. Chen, Y., W. Yu, J. Feng. Robust Image Hashing Using Invariants of Tchebichef Moments. – Optik, Vol. <bold>125</bold>, 2014, pp. 5582-5587.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.ijleo.2014.07.006" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.ijleo.2014.07.006</a></dgdoi:pub-id>
  17. 17. Ojala, T., M. Pietikainen, D. Harwood. A Comparative Study of Texture Measures with Classification Based on Feature Distributions. – Pattern Recognition, Vol. <bold>29</bold>, 1996.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/0031-3203(95)00067-4" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/0031-3203(95)00067-4</a></dgdoi:pub-id>
  18. 18. Ryu, S-J, H-YLee, I-WCho, H-KLee. Document Forgery Detection with SVM Classifier and Image Quality Measures. – Advances in Multimedia Information Processing PCM 2008, Vol. <bold>5353</bold>, 2008, pp. 486-495.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1007/978-3-540-89796-5_50" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/978-3-540-89796-5_50</a></dgdoi:pub-id>
  19. 19. Tang, Z., M. Yu, H. Yao, H. Zang, C. Yu, X. Zhang. Robust Image Hashing with Singular Values of Quaternion SVD. – The Computer Journal, 2019.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1093/comjnl/bxz127" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1093/comjnl/bxz127</a></dgdoi:pub-id>
  20. 20. Tang, Z., S. Wang, X. Zhang, W. Wei, S. Su. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization. – Journal of Ubiquitous Convergence and Technology, Vol. <bold>2</bold>, 2008, pp. 18-26.
  21. 21. Tang, Z., H. Zhang, C. M. Pun, M. Yu, C. Yu, Z. Xianquan. Robust Image Hashing with Visual Attention Model and Invariant Moments. – Mathematical Biosciences and Engineering, Vol. <bold>16</bold>, 2019, Issue 5, pp. 6103-6120.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.3934/mbe.2019305" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.3934/mbe.2019305</a></dgdoi:pub-id><dgpm:pub-id xmlns:dgpm="http://degruyter.com/resources/fetched-pubmed-id" pub-id-type="pmid">31499754</dgpm:pub-id>
  22. 22. Ou, Y., K. H. Rhee. A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform. – In: Proc. of 2009 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS’09), 2009, pp. 595-598.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ISPACS.2009.5383770" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ISPACS.2009.5383770</a></dgdoi:pub-id>
  23. 23. USC-SIPI Image Database (2007). <bold><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://sipi.usc.edu/database">http://sipi.usc.edu/database</ext-link></bold>.
  24. 24. 17 Category Flower Dataset. <bold><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.robots.ox.ac.uk/~vgg/data/flowers/17/">http://www.robots.ox.ac.uk/~vgg/data/flowers/17/</ext-link></bold>
DOI: https://doi.org/10.2478/cait-2020-0016 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 59 - 69
Submitted on: Dec 12, 2019
Accepted on: Apr 3, 2020
Published on: Jun 12, 2020
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2020 Mayank Srivastava, Jamshed Siddiqui, Mohd. Athar Ali, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.