Have a personal or library account? Click to login
Image Copy Detection Based on Local Binary Pattern and SVM Classifier Cover

Image Copy Detection Based on Local Binary Pattern and SVM Classifier

Open Access
|Jun 2020

References

  1. 1. Qureshi, M. A., M. Deriche. A Bibliography of Pixel-Based Blind Image Forgery Detection. – Signal Processing: Image Communication, Vol. 39, 2015, pp. 46-74.10.1016/j.image.2015.08.008
  2. 2. Liu, G., J. Wang, S. Lian, Z. Wang. A Passive Image Authentication Scheme for Detecting Region-Duplication Forgery with Rotation. – Journal of Network and Computer Applications, Vol. 34, 2011, pp. 1557-1565.10.1016/j.jnca.2010.09.001
  3. 3. Qazi, T., K. Hayat, S. U. Khan, S. A. Madani, I. A. Khan, J. Kolodziej, H. Li, W. Lin, K. C. Yow, C. Z. Xu. Survey on Blind Image Forgery Detection. – IET Image Processing, Vol. 7, 2013, pp. 660-670.10.1049/iet-ipr.2012.0388
  4. 4. Battiato, S., G. M. Farinella, E. Messina, G. Puglisi. Robust Image Alignment for Tampering Detection. – IEEE Transactions on Information Technology Forensics and Security, Vol. 7, 2012, pp. 1105-1117.10.1109/TIFS.2012.2194285
  5. 5. Khelifi, F. Perceptual Image Hashing Based on Virtual Watermark Detection. – IEEE Transactions on Image Processing, Vol. 19, 2010, pp. 981-993.10.1109/TIP.2009.203863720007047
  6. 6. Tang, Z., L. Chin, H. Yao, X. Zhang, C. Yu. Video Hashing with DCT and NMF. – The Computer Journal, 2019.10.1093/comjnl/bxz060
  7. 7. Tang, Z., X. Zhang, X. Dai, J. Yang, T. Wu. Robust Image Hash Function Using Local Color Features. – International Journal of Electronics and Communications (AEU), Vol. 67, 2013, pp. 717-722.10.1016/j.aeue.2013.02.009
  8. 8. Karsh, R. K., R. H., Laskar, andAditi. Robust Image Hashing through DWT-SVD and Spectral Residual Method. – EURASIP Journal on Image and Video Processing, Vol. 31, 2017, pp. 1-17.10.1186/s13640-017-0179-0
  9. 9. Tang, Z., F. Yang, L. Huang, X. Zhang. Robust Image Hashing with Dominant DCT Coefficients. – Optik-International Journal for Light and Electron Optics, Vol. 125, 2014, pp. 5102-5107.10.1016/j.ijleo.2014.05.015
  10. 10. Chen, C. C., Shang-LinHsieh. Using Binarization and Hashing for Efficient SIFT Matching. – Journal of Visual Communication and Image Representation, Vol. 30, 2015, pp. 86-93.10.1016/j.jvcir.2015.02.014
  11. 11. Ouyang, J., G. Coatrieux, H. Shu. Robust Hashing for Image Authentication Using Quaternion Discrete Fourier Transform and Log-Polar Transform. – Digital Signal Processing, Vol. 41, 2015, pp. 98-109.10.1016/j.dsp.2015.03.006
  12. 12. Liu, F., L. Cheng, H. Leung, Q. Fu. Wave Atom Transform Generated Strong Image Hashing Scheme. – Opt. Communication, Vol. 7, 2012, pp. 5008-5018.10.1016/j.optcom.2012.08.007
  13. 13. Tang, Z., L. Huang, X. Zhang, H. Lao. Robust Image Hashing Based on Color Vector Angles and Canny Operator. – International Journal of Electronics and Communications (AEU), Vol. 70, 2016, pp. 833-841.10.1016/j.aeue.2016.03.010
  14. 14. Tang, Z., Y. Dai, X. Zhang, L. Huang, FanYang. Robust Image Hashing via Colour Vector Angles and Discrete Wavelet Transform. – IET Image Processing, Vol. 8, 2014, pp. 142-149.10.1049/iet-ipr.2013.0332
  15. 15. Karsh, R. K., R. H., Laskar, B. B. Richhariya. Robust Image Hashing Using Ring Partition-PGNMF and Local Features. – SpringerPlus, Vol. 5, 2016, pp. 1-20.10.1186/s40064-016-3639-6
  16. 16. Chen, Y., W. Yu, J. Feng. Robust Image Hashing Using Invariants of Tchebichef Moments. – Optik, Vol. 125, 2014, pp. 5582-5587.10.1016/j.ijleo.2014.07.006
  17. 17. Ojala, T., M. Pietikainen, D. Harwood. A Comparative Study of Texture Measures with Classification Based on Feature Distributions. – Pattern Recognition, Vol. 29, 1996.10.1016/0031-3203(95)00067-4
  18. 18. Ryu, S-J, H-YLee, I-WCho, H-KLee. Document Forgery Detection with SVM Classifier and Image Quality Measures. – Advances in Multimedia Information Processing PCM 2008, Vol. 5353, 2008, pp. 486-495.10.1007/978-3-540-89796-5_50
  19. 19. Tang, Z., M. Yu, H. Yao, H. Zang, C. Yu, X. Zhang. Robust Image Hashing with Singular Values of Quaternion SVD. – The Computer Journal, 2019.10.1093/comjnl/bxz127
  20. 20. Tang, Z., S. Wang, X. Zhang, W. Wei, S. Su. Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization. – Journal of Ubiquitous Convergence and Technology, Vol. 2, 2008, pp. 18-26.
  21. 21. Tang, Z., H. Zhang, C. M. Pun, M. Yu, C. Yu, Z. Xianquan. Robust Image Hashing with Visual Attention Model and Invariant Moments. – Mathematical Biosciences and Engineering, Vol. 16, 2019, Issue 5, pp. 6103-6120.10.3934/mbe.201930531499754
  22. 22. Ou, Y., K. H. Rhee. A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform. – In: Proc. of 2009 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS’09), 2009, pp. 595-598.10.1109/ISPACS.2009.5383770
  23. 23. USC-SIPI Image Database (2007). http://sipi.usc.edu/database.
  24. 24. 17 Category Flower Dataset. http://www.robots.ox.ac.uk/~vgg/data/flowers/17/
DOI: https://doi.org/10.2478/cait-2020-0016 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 59 - 69
Submitted on: Dec 12, 2019
Accepted on: Apr 3, 2020
Published on: Jun 12, 2020
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2020 Mayank Srivastava, Jamshed Siddiqui, Mohd. Athar Ali, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.