Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 4
Abstract
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. A copy-move image forgery is done either for hiding some image object, or adding more details resulting in at least some part being cloned. In both the case, image reliability is lost. In this paper an improved algorithm based on Discrete Wavelet Transform (DWT) is used to detect such cloning forgery. In this technique at first DWT (Discrete Wavelet Transform) is applied to the input image for a reduced dimensional representation. Then the compressed image is divided into overlapping blocks. After that Lexicographic sorting is performed, and duplicated blocks are identified. Due to DWT usage, detection is first carried out on lowest level image representation. This approach increases accuracy of detection process and reduces the time needed for the detection process.
Authors and Affiliations
Preeti Yadav , Yogesh Rathore
Anonymous Ad Hoc Network Performance Degradation Analysis in the Presence of Selfish
Wireless Ad Hoc networks are characterized by dynamic change in topology, infrastructureless architecture and creation of a network on the fly. Being wireless and co-operative in nature Ad Hoc networks are more prone to...
I n d o or Environment Mobile Robot Localization
Robot Localization is an emerging area in recent research and applications. The determination of location or localization is he basic requirement for robots to move in their office nvironment. This proposed work aims t...
Implementation of an Energy Efficient Reconfigurable uthentication Unit for Software Radio
To promote the commercial implementation of software ownload for Software Defined Radio (SDR) terminals, a secure method of download is vital. Downloading of all the relevant software is performed via a public channel,...
Traffic Engineering without Congestion Hot Spots in MPLS
Traffic Engineering [1] broadly relates to optimization of the performance of the operational IP network. In networking, network congestion occurs when a link or node is carrying so much data that its quality of service...
Review on Recent Image Segmentation Techniques
Image Segmentation refers to the process of partitioning an image into non-overlapping different regions with similar attributes, for gray level images, the most basic attribute used is the luminance amplitude, and for c...