Volume 7, Issue 1 (5-2018)                   SCJ 2018, 7(1): 62-79 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Shahbahrami A, Hoveyda F. Performance evaluation of block-based copy- move image forgery detection algorithms. SCJ. 2018; 7 (1) :62-79
URL: http://scj.kashanu.ac.ir/article-1-453-en.html
1- -- , hoveyda.f@gmail.com
Abstract:   (296 Views)
Copy-move forgery is a particular type of distortion where a part or portions of one image is/are copied to other parts of the same image. This type of manipulation is done to hide a particular part of the image or to copy one or more objects into the same image. There are several methods for detecting copy-move forgery, including block-based and key point-based methods. In this paper, a method for detecting copy-move forgery is presented based on hybrid features such as SIFT, KAZE, HOG, and Zernike descriptors. The experimental results of the combinational of these descriptors on the forged images show that this type of combination increases the accuracy of detection than using single and double descriptors; but this high accuracy has the cost of computational time. To reduce the computational time, a Genetic Algorithm (GA) was used to optimize the descriptors and analysis algorithm of the principal component was applied to reduce the dimensions of the features. The results show that the HOG descriptor with a precision of 93.59 has better performance than the other descriptors to detect parts. Combined the four descriptors, the performance of the system is improved by about three percentage in compared with HOG, and reaches a precision of 96.29. The GA as the selector of the best features (six features) achieved the detection rate of 96.94. Using the principal component analysis, the dimensions of the features were reduced to 35, with a detection rate of 94.63.
Full-Text [PDF 1301 kb]   (89 Downloads)    
Type of Study: Research | Subject: Special
Received: 2018/07/22 | Accepted: 2020/03/9 | Published: 2020/04/2

Add your comments about this article : Your username or Email:

Send email to the article author

© 2020 All Rights Reserved | Soft Computing Journal

Designed & Developed by : Yektaweb