An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Copy-Move forgery is a specific type of image forgery, in which a part of digital image is copied and pasted to another part in the same image. This paper describes blind forensics approach for detecting Copy-Move forgery. Our technique works by first applying DWT (Discrete Wavelet Transform) to the input image to yield a reduced dimension representation [1]. Then the compressed image is divided into overlapping blocks. These blocks are then sorted and duplicated blocks are identified using Phase Correlation as similarity criterion. Due to DWT usage, detection is first carried out on lowest level image representation. This approach drastically reduces the time needed for the detection process.
Authors and Affiliations
Er. Saiqa Khan , Er. Arun Kulkarni
HYBRID FEATRUE SELECTION FOR NETWORK INTRUSION
In Computer Communications, collecting and storing characteristics about connections into a data set is needed to analyze its behaviour. Generally this data set is multidimensional and larger in size. When this data set...
Development of Behavioral Based System from Sports Video
A system for detecting and analyzing behavior of a sports person from their facial expression extracted from a sports video from the basis of this project. Shot Segmentation, Object Frame Selection, Image Segmentation, F...
A cross layer Design to Enhance Throughput for Multimedia Streaming over Mobile Ad hoc Networks
The main objective of this paper is to propose a novel method for enhancing the Quality of Service (QoS) of multimedia applications in wireless adhoc networks. The enhancement is achieved by mplementing the Connectionle...
Intrusion Detection using unsupervised learning
Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge dat...
Implementation of a Secured system with Roaming Server and Roaming Ports
The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only...