Skip Nav Destination
ASME Press Select Proceedings
International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011)
By
ISBN:
9780791859933
No. of Pages:
840
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
168 Detection of Trivial Image Tampering Via Unmatched Feature Points Clustering
By
Xiao Wei Yang
State Key Laboratory of Virtual Reality Technology and Systems Beihang University , Beijing, 100191 , China ; yangxiaowei_163@163.com
,
Xiao Wei Yang
Search for other works by this author on:
Ming Jing Ai
State Key Laboratory of Virtual Reality Technology and Systems Beihang University , Beijing, 100191 , China ; amj@buaa.edu.cn
,
Ming Jing Ai
Search for other works by this author on:
Ming Yang Tan
State Key Laboratory of Virtual Reality Technology and Systems Beihang University , Beijing, 100191 , China ; tanmingyang01@163.com
Ming Yang Tan
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Yang, XW, Ai, MJ, & Tan, MY. "Detection of Trivial Image Tampering Via Unmatched Feature Points Clustering." International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011). Ed. Xie, Y. ASME Press, 2011.
Download citation file:
Perceptual image hashing is an emerging solution for multimedia content authentication. Due to most perceptual image hashing techniques focus on the robustness but ignore their sensitivity to trivial tampering area, such techniques might not work well when malicious attack is perceptually insignificant. Through experiments we found that some state-of-the-art image hash algorithms could not distinguish small malicious distortion and some authentic distortion. So we propose a novel method about detection of trivial image tampering via unmatched feature points clustering in this paper. First, we extract SURF (Speeded Up Robust Features) feature points but do not use its original descriptor, we...
Abstract
Keywords
1 Introduction
2 Problem of Current Techniques
3 Proposed Method
4 Experimental Results
5 Conclusion
6 References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
A Review of Age Estimation
International Conference on Advanced Computer Theory and Engineering, 5th (ICACTE 2012)
Energy-Efficient Routing Algorithm Cluster-Based for Wireless Multimedia Sensor Network
International Conference on Mechanical Engineering and Technology (ICMET-London 2011)
Optimization of on Demand Service Provisioning with Multicast Cost Sharing
International Conference on Mechanical and Electrical Technology, 3rd, (ICMET-China 2011), Volumes 1–3
Boosting Classification Accuracy with Samples Chosen from a Validation Set
Intelligent Engineering Systems Through Artificial Neural Networks, Volume 17
Related Articles
An Efficient First-Principles Saddle Point Searching Method Based on Distributed Kriging Metamodels
ASME J. Risk Uncertainty Part B (March,2018)
Knowledge Acquisition of Self-Organizing Systems With Deep Multiagent Reinforcement Learning
J. Comput. Inf. Sci. Eng (April,2022)
Filling Process in an Open Tank
J. Fluids Eng (November,2003)