Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 4
Abstract
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. A copy-move image forgery is done either for hiding some image object, or adding more details resulting in at least some part being cloned. In both the case, image reliability is lost. In this paper an improved algorithm based on Discrete Wavelet Transform (DWT) is used to detect such cloning forgery. In this technique at first DWT (Discrete Wavelet Transform) is applied to the input image for a reduced dimensional representation. Then the compressed image is divided into overlapping blocks. After that Lexicographic sorting is performed, and duplicated blocks are identified. Due to DWT usage, detection is first carried out on lowest level image representation. This approach increases accuracy of detection process and reduces the time needed for the detection process.
Authors and Affiliations
Preeti Yadav , Yogesh Rathore
Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs
Several approaches have been proposed to perform routing in Delay/Disruption Tolerant Networks (DTNs) which has a random connectivity pattern. As the routing path from the source to destination will not be available alwa...
A Different Cameras Image Impulse Noise Removal Technique
Digital Cameras which capture images in directly in digital form. Digital Images are mostly often corrupted by impulse noises. It is affected by sharp & characteristics of the image signal. So the image processing sc...
Canonical Correlated Kernel PCA Method for Face Recognition
Practical face recognition systems are sometimes confronted with low-resolution face images. To address this problem, a super-resolution method that uses nonlinear mappings to infer coherent features that favor higher re...
Building Personalized and Non Personalized Recommendation Systems
The contents of e-Commerce such as music, movies, books and electronics goods are necessary for a modern life style. But, it becomes difficult to find content according to users likes and users preference. An approach wh...
Detection of threats in Honeynet using Honeywall
Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subjec...