Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

,QWHUQDWLRQDO&RQIHUHQFHRQ$GYDQFH&RPSXWLQJDQG,QQRYDWLYH7HFKQRORJLHVLQ(QJLQHHULQJ ,&$&,7( 

'HSDUWPHQWRI(OHFWULFDO (OHFWURQLFV(QJLQHHULQJ*DOJRWLDV&ROOHJHRI(QJLQHHULQJDQG7HFKQRORJ\*U1RLGD,QGLD

&RPSDUDWLYH6WXG\RI'LJLWDO,PDJH)RUJHU\
2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) | 978-1-7281-7741-0/20/$31.00 ©2021 IEEE | DOI: 10.1109/ICACITE51222.2021.9404748

'HWHFWLRQ7HFKQLTXHV
.ULVKQD++LQJUDML\D 'U5DYL.6KHWK
6FKRRORI,QIRUPDWLRQ7HFKQRORJ\DQG&\EHU6HFXULW\ 6FKRRORI,QIRUPDWLRQ7HFKQRORJ\DQG&\EHU6HFXULW\
5DVKWUL\D5DNVKD8QLYHUVLW\ 5DVKWUL\D 5DNVKD8QLYHUVLW\
*DQGKLQDJDU,QGLD *DQGKLQDJDU,QGLD
NULVKQDKLQJUDML\D#JLWRUJLQ UDYLVKHWK#UUXDFLQ

Abstract— ,QSUHVHQWWLPHGLJLWDOLPDJHVLVFRQVLGHUHGWREH
DQ LPSRUWDQW FKDQQHO RI LQIRUPDWLRQ 'LJLWDO LPDJHV DUH
DYDLODEOH RQ PDJD]LQH FRYHUV LQ SDSHUV LQ FRXUWV DV
FRQILUPDWLRQ H*RYHUQPHQW DGPLQLVWUDWLRQV DQG HYHU\ZKHUH
WKURXJKRXWWKHLQWHUQHWLPSO\LQJRQH RIWKHVLJQLILFDQWZD\VIRU
FRUUHVSRQGHQFH:LWKWKHDFFHVVRISRZHUIXOLPDJHSURFHVVLQJ
VRIWZDUHDQGKXPDQNQRZOHGJHZKLFKFDQHDVLO\PDQLSXODWHWKH
GLJLWDO LPDJH DXWKHQWLFDWLQJ GLJLWDO LPDJHV LV WURXEOHVRPH
+HQFH DQ DXWRPDWLF FRPSXWHUEDVHG V\VWHP LV UHTXLUHG WR EH
GHYHORSHG ZKLFK FDQ LGHQWLI\ WKH RULJLQDOLW\ RI LQSXW LPDJH 
7KHUHDUHWKUHHSKDVHVRILPDJHSURFHVVLQJOLNHSUHSURFHVVLQJ
IHDWXUHV H[WUDFWLRQ DQG IRUJHG DUHD GHWHFWLRQ RQ LPDJH XVLQJ
IHDWXUHVH[WUDFWHG,QWKLVZD\DQLQQRYDWLRQKDVEHHQPDGHWR
FRYHU LQFOXGHG DOJRULWKPV LQ WKH FRXUVH RI UHFHQW \HDUV )LJ 2ULJLQDOLPDJHVDQG)RUJHG,PDJHVE\3KRWRVKRS D  E  F 
FKDUDFWHUL]H WKHP LQ EXQFKHV KDYLQJ FRPSDUDEOH VWUDWHJLHV WR 2ULJLQDOLPDJHV G  &RS\0RYHLPDJH H 6SOLFHGLPDJH >@
WDNH FDUH RI LVVXHV ,Q FXUUHQW ZRUN DQ LQFOXVLYH VXUYH\ RI
YDULRXV LPDJH IRUJHULHV LWV W\SHV DQG FRPSDULVRQ RI YDULRXV +HQFH WKH SUHVHQW GD\ UHTXLUHPHQW LV WR LQFUHDVH WKH
GHWHFWLRQ WHFKQLTXHV DUH SUHVHQWHG 7KH DGYDQWDJHV DQG DFFXUDF\ DQG HIILFLHQF\ RI LPDJH IRUJHU\ GHWHFWLRQ V\VWHPV
GUDZEDFNV RI HDFK PHWKRG DUH DOVR KLJKOLJKWHG )LQDOO\ LW ZKLFK FDQ SURYLGH WKH DXWKHQWLFLW\ DQG LQWHJULW\ RI 'LJLWDO
VXPPDUL]HVWKHNH\FRQFOXVLRQVDQGIXWXUHVFRSHRIZRUN HYLGHQFHE\XVLQJWKHYDULRXV,PDJHSURFHVVLQJWRROV
 
Keywords— Image processing, Forgery detection methods, A. Types of Image forgery
Image authentication, Copy-move forgery L ,PDJH 5HWRXFKLQJ 7KLV SURFHGXUH GRHVQ W EDVLFDOO\
FKDQJH D SLFWXUH KRZHYHU UDWKHU XSJUDGHV RU GHFUHDVHV WKH
, ,1752'8&7,21 SDUWLFXODUFRPSRQHQWRIDQLPDJH6XFKUHWRXFKLQJFDQEHLQ
 
7KH DXWKHQWLFLW\ RI DQ LPDJH LV FUXFLDO LQ YDULRXV VRFLDO WKHIRUPRIFRORURUUHVROXWLRQVHWWLQJRUVDWXUDWLRQHIIHFW>@
VHFWRUV$FDVHLQSRLQWLVWKHGHSHQGDELOLW\RISKRWRJUDSKVLQ
LL ,PDJH 6SOLFLQJ ,W FRPELQHV DW OHDVW WZR GLIIHUHQW
GDLO\QHZVSDSHUVPDJD]LQHVFRXUWPHGLFDODQGIRUHQVLFILHOG
LPDJHVZKLFKLVXQLWHGWRPDNHDIRUJHGLPDJH
HWF ,Q UHFHQW WLPH RXU URXWLQH OLIH LV DIIHFWHG DQG JUHDWO\
GHSHQGHGRQWKHXVHRILQWHUQHWDQGPXOWLPHGLDWHFKQRORJLHV LLL &RS\ PRYH RU FR\ SDVWH 7KH LPDJH PD\ FRQWDLQ D
$PDVVLYHQXPEHURIGDWDRQWKHLQWHUQHWLQWKHIRUPRIWH[W SRUWLRQZKLFKLVWDNHQIURPDQRWKHULPDJHRUPD\KDYHVRPH

LPDJHVDQGYLGHRVDUHEHLQJVKDUHGRQWKHLQWHUQHW$OVRWKH SRUWLRQFRSLHGIURPWKHVDPHLPDJH
HDV\DYDLODELOLW\RIGLJLWDOFDPHUDVZLWKKLJKUHVROXWLRQDQG
HDVLO\RSHUDWHGLPDJHPDQLSXODWLRQVRIWZDUHWRROVKDYHOHGWKH LY 0RUSKLQJ 7KLV VWUDWHJ\ LV XVHG WR PRYH WKH RQH
WUXWKIXOQHVVRILPDJHFRQWHQWVTXHVWLRQDEOH7KHDXWKHQWLFLW\ LQGLYLGXDO SLFWXUH IURP VRPHRQH HOVH SLFWXUH E\ XWLOL]LQJ D
DQGVHFXULW\RILQIRUPDWLRQFRQWDLQHGE\DQLPDJHEHFDPHD FRQWLQXRXVWUDQVLWLRQEHWZHHQWZRSLFWXUHV>@
 
FKDOOHQJH,QGLJLWDOLPDJHVEURDGO\WKHIRUJHU\LVFODVVLILHG 7KLVW\SHRIIRUJHU\LVDJDLQFODVVLILHGLQWRIROORZLQJ
LQWR WZR EDVLF PRGHOV DGGLWLYH DSSURDFK DQG VXEWUDFWLYH
DSSURDFKEDVHGRQWKHFRQWHQWVRIWKHRULJLQDOLPDJHV$SDUW D (OLPLQDWLRQIRUJHU\,WLVWKHFDVHZKHUHDSRUWLRQRIDQ
RUVHFWLRQRIUDQGRPDYDLODEOHLPDJHLVXVHGDQGPL[HGZLWK LPDJHLVKLGGHQE\WKHDUHDZKLFKLVSDVWHGIURPWKHH[WHUQDO
 
WKH RULJLQDO LPDJH WR PRGLI\ WKH LQIRUPDWLRQ LQ DQ DGGLWLYH VRXUFH
DSSURDFK :KHUHDV LQ D VXEWUDFWLYH DSSURDFK VRPHSDUWVRI E (QKDQFHIRUJHU\,WLVWKHFDVHZKHUHDSRUWLRQRILPDJH
WKHRULJLQDOLPDJHLVFOLSSHG>@ LVUHSHDWHGO\SDVWHGWRVKRZPRUHDUHDRURFFXUUHQFHRIWKH
,QWKHODVWIHZ\HDUVGHWHFWLRQDQGLGHQWLILFDWLRQRILPDJH GHVLUHG52, 5HJLRQRI,QWHUHVW  
IRUJHU\KDVJURZQDVDQLPSRUWDQWUHVHDUFKLQYDULRXVILHOGVRI B. Detection of Image Forgery
LQYHVWLJDWLRQLQFOXGLQJPHGLFDOMRXUQDOLVPHWF$VSUHVHQWHG
LQ)LJLWWLVGLIILFXOWWRGHWHFWWKHPDQLSXODWLRQGRQHLQDQ 7KH DXWKHQWLFLW\ RI DQ LPDJH FDQ EH YHULILHG E\ LPDJH
LPDJHZLWKWKHDYDLODELOLW\RIVRIWZDUHIRULPDJHSURFHVVLQJ IRUJHU\ GHWHFWLRQ DSSURDFK 7KH VROXWLRQ RI ,PDJH
PDNLQJLWDPRUHFKDOOHQJLQJWDVN>@ DXWKHQWLFDWLRQ LV FDWHJRUL]HGDV $FWLYHDQG %OLQGRUSDVVLYH
>@ 9DULRXV PHWKRGV RI LPDJH IRUJHU\ GHWHFWLRQ FDQ EH
FODVVLILHGDVVKRZQLQ)LJ

‹,((( 

Authorized licensed use limited to: University of New South Wales. Downloaded on May 18,2021 at 20:05:50 UTC from IEEE Xplore. Restrictions apply.
,QWHUQDWLRQDO&RQIHUHQFHRQ$GYDQFH&RPSXWLQJDQG,QQRYDWLYH7HFKQRORJLHVLQ(QJLQHHULQJ ,&$&,7( 
'HSDUWPHQWRI(OHFWULFDO (OHFWURQLFV(QJLQHHULQJ*DOJRWLDV&ROOHJHRI(QJLQHHULQJDQG7HFKQRORJ\*U1RLGD,QGLD

FODVVLILHU )ROORZLQJ VWHSV FDQ EH FRQVLGHUHG DV WKH


JHQHUDOL]HG IUDPHZRUN IRU SDVVLYH IRUJHU\ GHWHFWLRQ
DSSURDFK
 3UHSURFHVVLQJ RI LPDJH ,Q RUGHU WR LPSURYH WKH
SHUIRUPDQFH RI FODVVLILHUV RSHUDWLRQV OLNH LPDJH
FURSSLQJ JUD\VFDOH IURP 5*% HWF DUH EHLQJ
SHUIRUPHGEHIRUHH[WUDFWLQJWKHIHDWXUHRIDQLPDJH
 )HDWXUH H[WUDFWLRQ 7KH LPSRUWDQW IHDWXUHV IURP DQ
LPDJHLV H[WUDFWHG7KHIHDWXUHVZKLFKDUHFKRVHQDQG
GHYHORSHG IHDWXUH YHFWRUV VKRXOG KDYH WKH
)LJ &ODVVLILFDWLRQRILPDJHIRUJHU\GHWHFWLRQWHFKQLTXHV
FKDUDFWHULVWLFVVXFKDVORZGLPHQVLRQZKLFKGHFUHDVH
WKHWLPHDQGFRPSOH[LW\RIFRPSXWDWLRQRIFODVVLILHU
/HVVSUHSURFHVVLQJWDVNRIGLJLWDOLPDJHVVXFKDVGLJLWDO  6HOHFWLRQRIFODVVLILHUDQGSUHSURFHVVLQJRIIHDWXUH
VLJQDWXUH LPDJH DQG ZDWHUPDUNLQJ LV UHTXLUHG LQ DFWLYH 6HOHFWLRQ DQG GHVLJQLQJ RI PRVW VXLWDEOH FODVVLILHU
WHFKQLTXHV:KHUHDVWKHZDWHUPDUNLQJDQGGLJLWDOVLJQDWXUHLQ EDVHGRQWKHH[WUDFWHGVHWRIIHDWXUHVDQGODUJHVHWVRI
SULRU LV QRW UHTXLUHG LQ SDVVLYH WHFKQLTXHV %DVLFDOO\ WKH LPDJHVWRWUDLQWKHFODVVLILHU
FRSLHG DUHD LQ IRUJHG LPDJHV LV UHFRJQL]HG ZLWKRXW
FRQILUPDWLRQ RI DQ RULJLQDO LPDJH > @ ,Q FRS\PRYH  )HDWXUH SUHSURFHVVLQJ UHGXFHV WKH WRWDO
IRUJHU\ WKH IRUJHU\ FDQ EH GRQH E\ FRS\LQJ DQG SDVWLQJ FRPSXWDWLRQDOWLPHDQGFRPSOH[LW\
SRUWLRQRIDQLPDJHLQ WKHLPDJH LWVHOIZKLFKLVDOVRFDOOHG  &ODVVLILFDWLRQ7KHFODVVLILHUGLVWLQJXLVKHV WKHLPDJHV
PHUJHGLPDJHV>@ DQG SXWV LQ FODVVLILFDWLRQ HLWKHU RULJLQDO RU IRUJHG
C. Passive Evidence Techniques: LPDJHV
7KH SL[HO EDVHG VWUDWHJ\ LV WR JRQH RYHU IDFWXDO IDOVH  3RVW SURFHVVLQJ 7R ORFDOL]H WKH IRUJHG DUHDV LQ DQ
PRYHPHQWEURXJKWDWWKHOHYHORISL[HO)RUPDWEDVHGPHWKRGV LPDJHWKHSRVWSURFHVVLQJRSHUDWLRQLVUHTXLUHG
DUH VXSSRUWHG VWDWLVWLFDO FRUUHODWLRQV WKDW SUHVHQWV ORVV\
FRPSUHVVLRQVFKHPHV&DPHUDEDVHGPHWKRGVDUHDSSOLHGWR ,, /,7(5$785(5(9,(:
GHDOZLWKSDUWLFXODUDUWLIDFWVLQWURGXFHGE\WKHYDULRXVIDFWRUV %DVHG RQ '&7 DQ LPSURYHG PHWKRG WR LGHQWLI\ FRS\
OLNH FDPHUD OHQV VHQVRU HWF 7KH REMHFWV LQ WKHLU JOREDO PRYH IRUJHU\ ZDV SURSRVHG E\ =KDR DQG *XR >@ 7KH
SRVLWLRQV FRQFHUQLQJ WKH FDPHUD LV PHDVXUHG LQ JHRPHWU\ FRQVLGHUHGLPDJHLVGLYLGHG LQWRVDPHVL]HRYHUODSSLQJ EORFNV
EDVHGPHWKRGV DQG WKHWHFKQLTXH ''&7ZDVXVHG,W ZDVFRQFOXGHG WKDW
D. Copy- Move Forgery Detection approaches: ZLWK WKH SURSRVHG PHWKRG WKH GLVWRUWHG LPDJH RU -3(*
FRPSUHVVLRQ FDQ EH GHWHFWHG ZLWK FRS\PRYH IRUJHU\ $
1) Block Based Method UHJLRQGXSOLFDWLRQDSSURDFKZDVXWLOL]HG E\DSSUR[LPDWLQJWKH
7KHLPDJHVDUHVHSDUDWHGLQWRVPDOORYHUODSSLQJEORFNVLQ FKDQJHEHWZHHQFRRUGLQDWHG6,)7NH\SRLQWV7KHUHVXOWVZHUH
EORFNEDVHGWHFKQLTXH7KHVHSDUDWHGEORFNVIURPWKHLPDJH ZLWK DQ DYHUDJH DFFXUDF\ RI GHWHFWLRQ DV  EXW VWLOO
LVYHULILHGZLWKUHPDLQLQJEORFNVWRGHWHFW WKHPDWFKLQJUHJLRQ VXIIHU IURP WKH VWXPEOLQJ EORFN WKDW LI VPDOOHU UHJLRQ
DQG WKHVH UHJLRQV DUH FRYHUHG WKURXJK DQ LGHQWLFDO EORFN GXSOLFDWLRQLVWKHUHWKHQLWLVKDUGWRGHWHFW>@
+RZHYHU WKLVWHFKQLTXHLVLQYROYHGZLWKWRRPXFKWLPHIRU
FRPSXWDWLRQ,QDGGLWLRQWKHIXQGDPHQWDOVXEMHFWZLWKWKHVH $ GHWHFWLRQ PHWKRG RI GRXEOH -3(* VTXDVK LPDJH ZLWK
PHWKRGRORJLHVLVWKDWWKHUHLVDQH[FHVVRIWLPHIRUFDOFXODWLRQ '&7DQG690 ZDVGHYHORSHG7KHSURSRVHGWHFKQLTXHZRUNV
$GGLWLRQDOO\ZKHQWKH VFDOLQJURWDWLRQHWFLVDSSOLHGWRDQ RQ WKH SULQFLSOH WKDW WKH SURSHUWLHV OLNH SHULRGLF ]HUR DQG
LPDJHPRVWRIWKHEORFNEDVHGWHFKQLTXHVXQDEOHWRLGHQWLI\ GRXEOHSHDNV LVDYDLODEOHLID-3(*LPDJHLVFKDQJHG %XWWKH
WKH IRUJHG LPDJH 7KH YDULRXV EORFNEDVHG PHWKRGV DUH GUDZEDFN RI WKH WHFKQLTXHZDV WKHSURGXFWLRQRIKLJKIDOVH
FODVVLILHG DV 0RPHQWEDVHG %OXU +X =HUQLNH  SRVLWLYHWRQDWXUDOLPDJHVZLWK³QRSHUIHFWKLVWRJUDPV´ >@
'LPHQVLRQDOLW\ UHGXFWLRQEDVHG 3&$ 69' .3&$  $ EOLQG FRS\ PRYH LPDJH LGHQWLILFDWLRQ WHFKQLTXH ZDV
,QWHQVLW\EDVHG /XR /LQ %UDYR  DQG )UHTXHQF\ EDVHG SURSRVHGE\DSSO\LQJG\DGLFZDYHOHWWUDQVIRUP '\:7 E\
'&7':7DQG)07  0XKDPPDG HWDO >@7KHSURSRVHGPHWKRGZDVRIJUHDWHU
VLJQLILFDQW FRPSDUHG WR ':7 IRU WKH DQDO\VLV RI GDWD 7KH
2) Key-Point Based Method LQSXWLPDJHLVVHSDUDWHG LQWRDSSUR[LPDWLRQ // DQGGHWDLO
,QWKLVPHWKRGWKHWZRLPDJHVDUHFRPSDUHG DQGFKHFNWR ++  VXE EDQGV $IWHU VLPLODULW\ EHWZHHQ ZHGJHV LV
LGHQWLI\ DQ\ PDWFK DPRQJVW LW DQG WKHUH PD\ QRW EH DQ\ PHDVXUHGE\GLYLGLQJ//DQG++VXEEDQGVLQWRLPEULFDWH
VXEGLYLVLRQ LQWR GLIIHUHQW EORFNV 7KH VFDOH DQG URWDWLRQ EORFNV,WZDVIRXQGDVKLJKO\HIILFLHQWWRGHWHFWWKHIRUJHU\
LQYDULDQWIHDWXUHDQGGHVFULSWRUDOJRULWKPVDUHPDLQO\XVHGLQ 6WXGLHV WR GHWHFW FRS\PRYH IRUJHU\ E\ XWLOL]LQJ YO)HDW
WKHVH WHFKQLTXHV 7KH DOJRULWKPV VXFK DV 6FDOH ,QYDULDQW VRIWZDUHDVIHDWXUHH[WUDFWLRQWRRO ZDVUHSRUWHG5$16$&E\
)HDWXUH 7UDQVIRUP 6,)7  6SHHGHGXS 5REXVW )HDWXUHV PHDQVRIWKHVLPSOHVWTXDOLW\OHYHOFDOFXODWLRQKDGUHVXOWHGLQ
685)  DQG 2ULHQWHG )$67 5RWDWHG %5,() 25%  DUH LPSURYHG GHWHFWLRQ HIILFLHQF\ 7KH GHWHFWLRQ DFFXUDF\
LQFOXGHGZLWKWKHVHPHWKRGV REWDLQHGZDVKRZHYHUWKHGUDZEDFNRIWKHPHWKRGZDV
KLJKFRPSXWDWLRQFRPSOH[LW\DQGKHQFH UHVXOWHGLQUHGXFHG
E. The process of image forgery detection
GHWHFWLRQVSHHG >@/HHHWDO>@SUHVHQWHG DPHWKRGRORJ\
$VPHQWLRQHGLQWKHHDUOLHUVHFWLRQWKHRULJLQDODQGIRUJHG EDVHGRQ*DERUILOWHUWRLGHQWLI\GXSOLFDWHLPDJHIRUJHU\,Q
RUPDQLSXODWHGLPDJHVFDQEHFODVVLILHGE\EOLQGRUSDVVLYH ZKLFKOH[LFRJUDSKLFDOVRUWLQJLVXVHGWRPDWFKWKHIHDWXUHV
GHWHFWLRQ WHFKQLTXH 7KH FXUUHQW SDVVLYH LPDJH IRUJHU\
GHWHFWLRQ WHFKQLTXHV FODVVLILHV WKH IHDWXUH E\ H[WUDFWLQJ WKH
IHDWXUH IURP DQ LPDJHV DQG WKHQ VHOHFWLQJ DQG WUDLQLQJ WKH



Authorized licensed use limited to: University of New South Wales. Downloaded on May 18,2021 at 20:05:50 UTC from IEEE Xplore. Restrictions apply.
,QWHUQDWLRQDO&RQIHUHQFHRQ$GYDQFH&RPSXWLQJDQG,QQRYDWLYH7HFKQRORJLHVLQ(QJLQHHULQJ ,&$&,7( 
'HSDUWPHQWRI(OHFWULFDO (OHFWURQLFV(QJLQHHULQJ*DOJRWLDV&ROOHJHRI(QJLQHHULQJDQG7HFKQRORJ\*U1RLGD,QGLD

=KXHWDO>@FRQGXFWHGVWXGLHVWRLGHQWLI\ IRUJHGLPDJHG /HH HW +LVWRJUDP /H[LFRJUD  1RW HIIHFWLYH ZLWK
E\ FRS\PRYH VXSSRUWHG E\ VFDOHG 25% %DVHG RQ WKH DO>@ RI SKDO KLJK URWDWLRQ DQG
RULHQWDWHG 6RUWLQJ VFDOLQJ
H[SHULPHQWDO UHVXOWV LW ZDV IRXQG PRUH SRZHUIXO IRU
JHRPHWULF WUDQVIRUPDWLRQ %XW IRU WKH LPDJHV ZLWK KLJKHU
UHVROXWLRQ WKH PHWKRG LV OHQJWK\ DQG WLPH FRQVXPLQJ $
UREXVWFRS\PRYHIRUJHU\GHWHFWLRQDSSURDFKZDVSUHVHQWHG
=KXHW DO )$67 )$67 P 6ORZHU IRU KLJK
E\ +XDQJ HW DO >@ WKURXJK ))7 69' DQG 3&$ IRU WKH >@ NH\SRLQWV NH\SRLQWV VLPD UHVROXWLRQLPDJHV
LPDJHVZLWKKLJK-3(*FRPSUHVVLRQ3RSHVFXDQG)DULG>@ DQGWKH DQG JH
SURSRVHGWKHXVHRI3ULQFLSDO&RPSRQHQW$QDO\VLV 3&$ WR 25% WKH25%
FKDUDFWHUL]HWKHLPDJHLQYHFWRUVE\WUDQVIRUPLQJWRJUD\VFDOH IHDWXUHV IHDWXUHV
,WKDGWKHFDSDELOLW\WRGLVWLQJXLVKVPDOOYDULDWLRQVFDXVLQJGXH +XDQJ HWDO ))7 ([KDXVWLY  +LJK GHWHFWLRQ
>@ 69'DQG H DFFXUDF\
WR QRLVH$OVRWKHPHWKRGLVHIIHFWLYHIRUJUH\VFDOHLPDJHV 3&$ VHDUFK
,WZDVIRXQGPRVWVXLWDEOHWRLGHQWLI\WKHIRUJHU\7KHSURFHVV
FRPSOH[LW\ LV UHGXFHG ZLWK SURSRVHG PHWKRG $O6DZDGL HW )DULG HW 3ULQFLSDO 3UHFLVLRQ  &DQQRW GHWHFW
DO>@ ZRUNHGRQWRGHWHUPLQHIRUJHGLPDJHWKURXJK/RFDO DO>@ &RPSRQH 5HFDOO 6SOLFHG UHJLRQ
%LQDU\ 3DWWHUQ /%3  7KH LPDJH LV ILUVW FRQYHUWHG LQWR QW UDWH
JUD\VFDOH7KHEORFNSDLUVZLWKPLQLPXPGLVWDQFHDUHWDNHQ $QDO\VLV )DOVHGHWHF
EDVHGRQWKHFDOFXODWLRQRIKLVWRJUDPGLVWDQFHZLWKLQEORFNV 3&$ WLRQ
7KHSULPDU\FDQGLGDWHVLVVHOHFWHGEDVHG RQWKHUHWDLQHGEORFN $O6DZDGL /RFDO 1HLJKERXU  1RWSRVVLEOHWR
HWDO>@ %LQDU\ KRRG GHWHFWURWDWHG
SDLUV ZLWK WKUHH FRORU FRPSRQHQWV 7KH PHWKRG UHVXOWHG LQ 3DWWHUQ FOXVWHULQJ DQGVFDOHG LPDJHV
UHGXFWLRQ LQ WKH IDOVH SRVLWLYH UDWHV FRPSDUHG WR RWKHU /%3
PHWKRGV+RZHYHUWKHSURSRVHGPHWKRGLVQRWDSSURSULDWHIRU %D\UDP HW )RXULHU (LJHQ 1RW SRVVLEOH WR
WUDQVIRUPDWLRQRSHUDWLRQVOLNHURWDWLRQDQGVFDOLQJ DO>@ 0HOOLQ YHFWRUV GHWHFW IRUJHU\
7UDQVIRUP  ZKHQURWDWHG
%D\UDP HW DO >@ DSSOLHG )RXULHU0HOOLQ 7UDQVIRUP )07 WKURXJKVRPHDQJOHV
)07 WRLGHQWLI\WKHIRUJHGLPDJH 7KHLPDJHLVVHSDUDWHG
LQWRVPDOOVL]HEORFNVWRGHWHUPLQH)RXULHU7UDQVIRUP RIHDFK 'LVFUHWH &LUFXODU 1RW DEOH WR
6KDR HW )RXULHU ZLQGRZ GHWHFWVIDOVH PDWFKHV
EORFN ,W ZDV HIILFLHQW ZLWK UHVSHFW WR JHRPHWU\ DO>@ 7UDQVIRUP H[SDQVLRQ 
WUDQVIRUPDWLRQVOLNHVFDOLQJDQGPLQRU DQJOHVRIURWDWLRQ XSWR ')7 DQG SKDVH
DQGGHJUHHVUHVSHFWLYHO\6KDRHWDO>@ XWLOL]HGD FRUUHODWLRQ
PHWKRGRORJ\ ZLWK FLUFXODU ZLQGRZ H[SDQVLRQ DQG SKDVH
FRUUHODWLRQ7KHSKDVHPDWUL[RIH[SDQGHGEORFNVLVREWDLQHG ,,, &21&/86,216
E\ 'LVFUHWH )RXULHU 7UDQVIRUP ')7  7KLV PHWKRG FDQ 7KH DXWKHQWLFLW\ RI D SLFWXUH LV WKDW WKH NH\ LQ YDULRXV
LGHQWLI\FRSLHGURWDWHGPRYHGUHJLRQVLQVLGHWKHLPDJH7KH ILHOGV :LWKLQ WKH SUHYLRXV FRXSOH RI \HDUV GHWHFWLRQ DQG
HIIHFWLYHQHVV RI WKH DSSURDFK ZDV UHSRUWHG ZLWK URWDWLRQ LGHQWLILFDWLRQRILPDJHIRUJHU\KDYHHPHUJHGDVDFKDOOHQJLQJ
EOXUULQJ-3(*FRPSUHVVLRQDQGYDULDWLRQVLQOXPLQDQFH%XW UHVHDUFK DUHD ,Q SUHVHQW ZRUN D FRPSUHKHQVLYH VWXG\ RI
WKHPHWKRGZDVWLPHFRQVXPLQJDQGQRWSHUIRUPLQJZHOOZLWK 3DVVLYH ,PDJH 7HFKQLTXHVWRGHWHFWGLJLWDOLPDJH IRUJHU\ LV
VFDOLQJ SUHVHQWHG (VSHFLDOO\ WKH UHYLHZ RI FRS\PRYH IRUJHU\
UHFRJQLWLRQ WHFKQLTXHV LV SUHVHQWHG $OVR IURPWKH VWXG\RI
7$%/(, &203$5,6212)9$5,286 &23<029( )25*(5< YDULRXV OLWHUDWXUHLW VXQGHUVWRRGWKDW WKHUHLVQRDQ\VSHFLILF
'(7(&7,21 7(&+1,48(6
UHTXLUHPHQW RI KDUGZDUH LQ SDVVLYH WHFKQLTXHV ZKHQ
$XWKRUV )HDWXUHV &ODVVLILHU 'HWHF /LPLWDWLRQ FRPSDUHGWRDFWLYHPHWKRGV
([WUDFWHG XVHG WLRQ
DFFXU +RZHYHULWKDVEHHQREVHUYHGIURPWKHFRPSDULVRQWKDW
DF\ WKHVH PHWKRGV DUH KDYLQJ GUDZEDFNV OLNH DFFXUDF\ RI
=KDR DQG '&7 RI /H[LFRJUD  &RPSXWDWLRQDOO\ GHWHFWLRQFRPSOH[LW\DQGLQHIIHFWLYHDJDLQVWYDULRXVDWWDFNV
*XR>@ RYHUODSSLQ SKLFDO  VORZ OLNH URWDWLRQ VFDOLQJ -3(* FRPSUHVVLRQ EOXUULQJ DQG
J%ORFNV 6RUWLQJ
EULJKWQHVVDGMXVWPHQWHWF$OVRRQHRIWKHRWKHUGUDZEDFNRI
WKHVHPHWKRGVLVWKHUHTXLUHPHQWRIKXPDQLQWHUSUHWDWLRQDQG
;XQ\X DQG 6,)7 .PHDQV  1RW VXLWDEOH IRU
VLZHL>@ .H\SRLQWV FOXVWHULQJ  VPDOOEORFNVL]H KHQFH LW FDQQRW ZRUN DXWRQRPRXVO\ 7KHUHIRUH WKHUH LV D
VFRSH WR GHYHORS DQ HIILFLHQW DQG IDVWHU IRUJHU\ GHWHFWLRQ
WHFKQLTXH ZKLFK FDQ UHVROYH WKH OLPLWDWLRQV RI FXUUHQWO\
0DKGLDQ %OXU .'WUHH  PHWKRG SURGXFHV DYDLODEOHPHWKRGV
DQG PRPHQW KLJKIDOVHSRVLWLYH
6DLF>@ LQYDULDQWV 5()(5(1&(6
>@ &KULVWLDQ5LHVVDQG7LDJR-RVHGH&DUYDOKR³([SRVLQJ'LJLWDO,PDJH
0XKDPPD '\DGLF 7KUHVKROGL  QRW DOZD\V )RUJHULHVE\,OOXPLQDWLRQ&RORU&ODVVLILFDWLRQ´,(((7UDQVDFWLRQV2Q
G>@ :DYHOHW QJ  DSSOLFDEOH IRU FRORU ,QIRUPDWLRQ)RUHQVLFV$QG6HFXULW\YRO
7UDQVIRUP FODVVLILFDWL LQIRUPDWLRQ
>@ 7X.+X\QK7KXRQJ/H7LHQ.KRD9+X\QK6\&1JX\HQ$6XUYH\
RQ
RQ ,PDJH )RUJHU\ 'HWHFWLRQ 7HFKQLTXHV 7KH  ,((( 5,9)
,QWHUQDWLRQDO &RQIHUHQFH RQ &RPSXWLQJ  &RPPXQLFDWLRQ
/LHWDO>@ 9O)HDW .QHDUHVW  6ORZSHUIRUPDQFH 7HFKQRORJLHV5HVHDUFK,QQRYDWLRQDQG9LVLRQIRU)XWXUH 5,9) '2,
VRIWZDUH QHLJKERUV 
5$16$&
>@ 87HPEH67KRPEUH³6XUYH\RI&RS\3DVWH)RUJHU\'HWHFWLRQLQ
'LJLWDO ,PDJH )RUHQVLF´ ,QWHUQDWLRQDO &RQIHUHQFH RQ ,QQRYDWLYH
0HFKDQLVPVIRU,QGXVWU\$SSOLFDWLRQV 



Authorized licensed use limited to: University of New South Wales. Downloaded on May 18,2021 at 20:05:50 UTC from IEEE Xplore. Restrictions apply.
,QWHUQDWLRQDO&RQIHUHQFHRQ$GYDQFH&RPSXWLQJDQG,QQRYDWLYH7HFKQRORJLHVLQ(QJLQHHULQJ ,&$&,7( 
'HSDUWPHQWRI(OHFWULFDO (OHFWURQLFV(QJLQHHULQJ*DOJRWLDV&ROOHJHRI(QJLQHHULQJDQG7HFKQRORJ\*U1RLGD,QGLD
>@ $VJKDU.+DELE=+XVVDLQ0  &RS\PRYHDQGVSOLFLQJLPDJH
IRUJHU\GHWHFWLRQDQGORFDOL]DWLRQWHFKQLTXHVDUHYLHZ$XVW-)RUHQVLF
6FL  ±
>@ .$VJKDU=+DELEDQG0+XVVDLQ³&RS\PRYHDQGVSOLFLQJLPDJH
IRUJHU\ GHWHFWLRQ DQG ORFDOL]DWLRQ WHFKQLTXHV D UHYLHZ´ $XVWUDOLDQ
-RXUQDORI)RUHQVLF6FLHQFHVYROQRSS±'2,

>@ *DMDQDQ.%LUDMGDU9LMD\+0DQNDU'LJLWDOLPDJHIRUJHU\GHWHFWLRQ
XVLQJSDVVLYHWHFKQLTXHV$VXUYH\'LJLWDO,QYHVWLJDWLRQ  
  
>@ %R ;X *XDQJMLH /LX DQG <XHZHL 'DL  ³'HWHFWLQJ ,PDJH 6SOLFLQJ
8VLQJ 0HUJHG )HDWXUHV LQ &KURPD 6SDFH´ WKH 6FLHQWLILF :RUOG
-RXUQDO´
>@ =KDRDQG-*XR´3DVVLYHIRUHQVLFVIRUFRS\PRYHLPDJHIRUJHU\XVLQJ
D PHWKRG EDVHG RQ '&7 DQG 69'´,QWHUQDWLRQDO &RQIHUHQFH RQ
IRUHQVLFVFLHQFHSS
>@ 3;XQ\X DQG /6LZHL´5HJLRQ GXSOLFDWLRQ GHWHFWLRQ XVLQJ LPDJH
IHDWXUH PDWFKLQJ´,((( 7UDQVDFWLRQV RQ ,QIRUPDWLRQ )RUHQVLFV
VHFXULW\SS
>@ %0DKGLDQ66DLF´%OLQG PHWKRGV IRU GHWHFWLQJ LPDJH IDNHU\´,(((
,QW&DUQDKDQFRQIHUHQFHRQVHFXULW\WHFKQRORJ\SS
>@ *0XKDPPDG0+XVVDLQ DQG *%HELV´3DVVLYH FRS\PRYH IRUJHU\
GHWHFWLRQ XVLQJ XQGHFLPDWHG G\DGLF ZDYHOHW WUDQVIRUP´'LJLWDO
LQYHVWLJDWLRQSS
>@ /L-/L;<DQJ%6XQ;6HJPHQWDWLRQEDVHGLPDJHFRS\PRYH
IRUJHU\GHWHFWLRQVFKHPH,(((7UDQV,QI 
>@ /HH -& &KDQJ &3 &KHQ :. 'HWHFWLRQ RI FRS\PRYH LPDJH
IRUJHU\XVLQJKLVWRJUDPRIRULHQWDWHGJUDGLHQWV,QI6FL 1\ ±
 
>@ =KX < 6KHQ ; &KHQ +&RS\PRYH IRUJHU\GHWHFWLRQEDVHGRQ
VFDOHG25%0XOWLPHG7RROV$SSO± 
>@ +XDQJ ' +XDQJ  & +X: 5REXVWQHVV RI FRS\PRYH IRUJHU\
GHWHFWLRQ XQGHU KLJK -3(* FRPSUHVVLRQ DUWLIDFWV 0XOWLPHG 7RROV
$SSO  ± 
>@ 3RSHVFX $ DQG )DULG +   ³([SRVLQJ 'LJLWDO )RUJHULHVE\
'HWHFWLQJ 'XSOLFDWHG ,PDJH 5HJLRQV´ 7HFK 5HS 75
'DUWPRXWK&ROOHJH&RPSXWHU6FLHQFH+DQRYHU
>@ $O6DZDGL00RKDPPDG*+XVVDLQ0%HELV*  ³&RS\
0RYH ,PDJH )RUJHU\ 'HWHFWLRQ 8VLQJ /RFDO %LQDU\ 3DWWHUQDQG
1HLJKERUKRRG &OXVWHULQJ´ 0RGHOOLQJ 6\PSRVLXP (06 
(XURSHDQ 1RY 0DQFKHVWHUSS±
>@ %D\UDP 6 6HQFDU 7 0HPRQ 1   ³$Q (IILFLHQW DQG5REXVW
0HWKRGIRU'HWHFWLQJ&RS\0RYH)RUJHU\´LQ3URFHHGLQJRIWKH,(((
,QWHUQDWLRQDO&RQIHUHQFHRQ$FRXVWLFV6SHHFKDQG6LJQDO3URFHVVLQJ
,&$663¶ SS±7DLSHL7DLZDQ
>@ 6KDR + <X 7 ;X 0 &XL :   ³,PDJH UHJLRQGXSOLFDWLRQ
GHWHFWLRQEDVHGRQFLUFXODUZLQGRZH[SDQVLRQDQGSKDVHFRUUHODWLRQ´
)RUHQVLF6FLHQFH,QWHUQDWLRQDOYROQR±SS±



Authorized licensed use limited to: University of New South Wales. Downloaded on May 18,2021 at 20:05:50 UTC from IEEE Xplore. Restrictions apply.

You might also like