Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 4
Abstract
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. A copy-move image forgery is done either for hiding some image object, or adding more details resulting in at least some part being cloned. In both the case, image reliability is lost. In this paper an improved algorithm based on Discrete Wavelet Transform (DWT) is used to detect such cloning forgery. In this technique at first DWT (Discrete Wavelet Transform) is applied to the input image for a reduced dimensional representation. Then the compressed image is divided into overlapping blocks. After that Lexicographic sorting is performed, and duplicated blocks are identified. Due to DWT usage, detection is first carried out on lowest level image representation. This approach increases accuracy of detection process and reduces the time needed for the detection process.
Authors and Affiliations
Preeti Yadav , Yogesh Rathore
Suggestion of True Popular Items
Making of suggestion of items using user’s feedback creates some problems in the actual ranking of the items. It populates some items while it suppresses some thers. In short, it affects the original popularity of the i...
Design and Development of Wireless Sensor Network System to Monitor Parameters Influencing Freshwater Fishes
In this paper we have designed, developed and proposed a prototype Wireless Sensor Network (WSN) System to monitor the Fish Farm. Salinity of the fresh water is a prominent parameter and is responsible for the difference...
ENHANCED DISTRIBUTED SERVICE MODEL FOR POWER SYSTEM STATE ESTIMATION
Web services are emerging technologies of choice for implementing distributed service models for performing power system operations such as state estimation of power systems in a complete secure, distributed and platform...
Email Spam Filtering using Supervised Machine Learning Techniques
E-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, requently with commercial content, in large quantities to an ind...
Fast Pedestrian Detection using Smart ROI separation and Integral image based Feature Extraction
This paper discusses a fast pedestrian detection system for near infrared imaging system. The Advanced Driver Assistance Systems include pedestrian detection system to avoid accidents. Most pedestrian detection systems p...