Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 4
Abstract
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. A copy-move image forgery is done either for hiding some image object, or adding more details resulting in at least some part being cloned. In both the case, image reliability is lost. In this paper an improved algorithm based on Discrete Wavelet Transform (DWT) is used to detect such cloning forgery. In this technique at first DWT (Discrete Wavelet Transform) is applied to the input image for a reduced dimensional representation. Then the compressed image is divided into overlapping blocks. After that Lexicographic sorting is performed, and duplicated blocks are identified. Due to DWT usage, detection is first carried out on lowest level image representation. This approach increases accuracy of detection process and reduces the time needed for the detection process.
Authors and Affiliations
Preeti Yadav , Yogesh Rathore
ZigBee: The Emerging Technology in Building Automation
With the development of industrial automation technology, the limitation of traditional cable control network has become increasingly prominent. Consequently, establishing a reliable data transmission network becomes a c...
ENERGY EFFICIENT DATA GATHERING SCHEME USING CROSS LAYER CLUSTER APPROACH FOR WIRELESS SENSOR NETWORKS
Recent advances in wireless communication technology and research in ad hoc wireless networks have made smart sensing a reality. A Wireless Sensor Networks (WSNs) is composed of a number of wireless sensor nodes which fo...
SOFTWARE ARCHITECTURE BASED REGRESSION TESTING
Software architecture plays a significant role in development of a dependable system. The purpose of regression testing is to make the system fault tolerant. The amalgamation of these two, results in the development of a...
Authenticated Routing Protocol Based on Reputation System For Adhoc Networks
Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of t...
Detection of Multiple Black hole nodes attack in MANET by modifying AODV protocol
Ad hoc Networks (MANET) is a self-configuring, infrastructure less network consists of independent mobile nodes that can communicate via wireless medium. Each mobile node can move freely in any direction, and changes the...