An Efficient Copy-Move Forgery Detection scheme using Segmentation
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 5
Abstract
The development of new hardware and improved human-computer interfaces can effortlessly generate the fake images. Multiple image processing softwares are used to detect the image forgeries that could not be seen through the human eye. In the Copy-Move Forgery (CMF), a part of the image is copied and pasted in the other part of the same image. In this paper, an efficient segmentation based copy-move forgery detection scheme is proposed. When compared to the existing key point extraction based state-of-the-art forgery detection schemes, the proposed scheme splits the images into independent patches. The copy-move forgery regions are detected by matching the image patches. The matching process consist of two stages. During the initial stage, the pairs that contain the copy-move forgery regions are detected. With the computed patches, an affine transform matrix is constructed. In the second stage, the estimated matrix is optimized using the Expectation-Maximization (EM) based algorithm. Further, the presence of the copy-move forgery regions are confirmed. The performance of the proposed scheme is compared with the existing Scale-Invariant Feature Transform (SIFT), Zemike and the Speeded-Up Robust Features (SURF) algorithms for the performance metrics such as precision and recall. The experimental results show that the proposed scheme is optimal than the existing algorithms.
Authors and Affiliations
Femina B, Chelladurai T
Implementation of Weight Monitoring Using RFID and Load Cell
An embedded system is the combination of both software and hardware components. Real Time Operating System (RTOS), hardware, application software are the components of embedded system. The embedded system is widely used...
Cost Effective Disaster Finding Using Supervised Learning Methods On Hadoop
Streams of data is collected and the required information is separated from these data is known as data mining. Various data sources are combined for processing to provide further consistent, precise and important inform...
NFC SIGNALS BASED ON AN EFFECTIVE MOBILE ROBOT LOCALIZATION
A Complete Localization system for an indoor self - ruled vehicle equipped with Near Field Communication (NFC) reader to Interrogate tags located on the environment. Phase Measurement for real t...
A Modified Blowfish Algorithm for Improving the Cloud Security
The accessing of sensitive information from the cloud database is done through the internet. To avoid the hacking number of privacy preservation mechanisms such as cryptography, attribute-based models are employed. The e...
QR Code Authentication Based Goods Delivery System
This application is for, order checking between delivery boy and the customer. If the customer order some goods in a particular company/ industry means, the order information such as customer name, address, amount, numbe...