0% Complete
English
صفحه اصلی
/
دوازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Adaptive Stopping Criteria-based A-RANSAC algorithm in Copy Move Image Forgery detection
نویسندگان :
ZAHRA HOSEINNEJAD
1
MEHDI NASRI
2
1- دانشگاه شیراز
2- دانشگاه آزاد خمینی شهر
کلمات کلیدی :
Copy-move forgery, SIFT, Stopping Criteria, Adaptive-RANSAC (A-RANSAC), g2NN Matching
چکیده :
Copy move forgery is one of the most common types of image forgery, and it is very important to detect this type of forgery. Feature-based forgery detection methods perform better than block-based methods. In this article, a new feature-based approach is suggested in copy-move forgery detection process. In the suggested approach, first, the features extraction process is done based on SIFT. Second, matching process is based on the g2NN criteria. Finally, removal mismatches is done based on the improved A-RANSAC that stopping criteria is presented based on the number of final matches. The stop time in the basic A-RANSAC method is based on the number of repetitions, which increases the execution time and decreases its speed. This suggested approach, in addition to proper accuracy, increases speed. The simulation results on MICC-F220 datasets affirm the suggested approach advantage in comparison with some other basic methods in terms of precision matching and execution time.
لیست مقالات
لیست مقالات بایگانی شده
Paths-oriented Test Data Generation using Genetic Algorithm
Mohammad Reza Hassanpour Charmchi - Dr Bagher Rahimpour cami
Knowledge Extraction from Technical Reports Based on Large Language Models: An Exploratory Study
Parsa Bakhtiari - Hassan Bashiri - Alireza Khalilipour - Masoud Nasiripour - Moharram Challenger
یک رویکرد سریع تحلیل و شناسایی آسیب پذیری Next-Intent در برنامه های کاربردی اندروید
زهرا کلوندی - دکتر مهدی سخائی نیا زهرا کلوندی - مهدی سخائی نیا -
رویکردی در تشخیص خودکار بوهای بد در مدل های معماری سازمانی با استفاده از تحلیل گرافی
زهرا رحیمی تمندگانی - شهره آجودانیان
Improving Long-Term Engagement of Insurance Brokerages by Providing Gamified Configurations Based on The Delphi Method
Hosein Bayati - Fattaneh Taghiyareh - Sahand Hashemi
Leveraging Retrieval-Augmented Generation for Persian University Knowledge Retrieval
Arshia Hemmat - Mohammad Hassan Heydari - Kianoosh Vadaei - Afsaneh Fatemi
پیشبینی بستری مجدد بیماران با استفاده از استخراج مفاهیم زیستپزشکی از متون بالینی
فهیمه شاهرخ شهرکی - رسول سامانی - دکتر ناصر قدیری فهیمه شاهرخ شهرکی - رسول سامانی - ناصر قدیری -
A Biased Random Key Genetic Algorithm for the Dial-a-Ride Problem
ُSomayeh Sohrabi - Koorush Ziarati - Morteza Keshtkaran
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Neda Toghraee - Hamid Mala
Distributed Learning Automata-based Algorithm for Finding K-Clique in Complex Social Networks
Mohammad Mehdi Daliri Khomami - Alireza Rezvanian - Ali Mohammad Saghiri - Mohammad Reza Meybodi
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2