An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Copy-Move forgery is a specific type of image forgery, in which a part of digital image is copied and pasted to another part in the same image. This paper describes blind forensics approach for detecting Copy-Move forgery. Our technique works by first applying DWT (Discrete Wavelet Transform) to the input image to yield a reduced dimension representation [1]. Then the compressed image is divided into overlapping blocks. These blocks are then sorted and duplicated blocks are identified using Phase Correlation as similarity criterion. Due to DWT usage, detection is first carried out on lowest level image representation. This approach drastically reduces the time needed for the detection process.
Authors and Affiliations
Er. Saiqa Khan , Er. Arun Kulkarni
Various Schemes to Speed up the PC during Virus Scan
The current threat landscape is changing and we have seen a large volume of new viruses captured by security vendors each day. Customers always complain that anti-virus software slow down their computers by consuming muc...
EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT
Cloud computing is a fast growing area in computing research and industry today. With the advancement of the Cloud, there are new possibilities opening up on how applications can be built and how different services can b...
ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION
We address the issue network security.All the bank provides 128 bit ssl encryption in two way communication between client and server.In this paper we can tell you idea behind 256 ssl encryption.By which two way communic...
MAX-MIN ANT OPTIMIZER FOR PROBLEM OF UNCERTAINITY
The real life problems deal with imperfectly specified nowledge and some degree of imprecision, uncertainty or nconsistency is embedded in the problem specification. The well-founded theory of fuzzy sets is a special w...
Secure Routing In Wireless Sensor Networks
A base station will have capabilities on the order of a laptop or laptop-equivalent and will be capable of both wired connectivity to the internet as well as wireless connectivity to the sensor network. Wireless sensor n...