A Survey Of Sign Based Image Copy Detection Methods
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The world wide web is filled with billions of images and redundant copies of images can frequently be found on many websites. These duplicates can be exact copies or differ slightly in their visual content. To assure privacy it is mandatory to preserve copyright verification, image-content identification, copy detection and authentication. This paper provides a comparative study on how content-based image copy detection methods are used to detect the copy of original image. The methods based on content based copy detection which includes signs of discrete cosine transform (DCT) and discrete wavelet transform (DWT), color histograms, by using concept of dual signature are presented.
Authors and Affiliations
Ms. Payal R. Shete, , Mrs. Girija G. Chiddarwar
A Review on Diverse Ensemble Methods for Classification
Ensemble methods for different classifiers like Bagging and Boosting which combine the decisions of multiple hypotheses are some of the strongest existing machine learning methods. The diversity ofthe members of...
DIP Using Image Encryption and XOR Operation AffineTransform
Abstract: Digital image processing is the use of computer algorithms to perform image processing on digitalimages. It is a subfield of digital signal processing. Digital image processing has many advantages over an...
Performance Evaluation of Zrp Star and Dsr under Vanet's
Abstract: Vehicular Ad-hoc Network (VANET) is an extraordinary manifestation of MANET which is a vehicle to vehicle & vehicle roadside remote correspondence system, where nodes in VANET include themselves as se...
Lightning Strike and Thunder and its Effect on Television Signal Transmission
Abstract: The lightning strike and thunder and its effect on television signal transmission in Nigerian Television, NTA Abakaliki Nigeria was analyzed. From the analyses, it was observed that lightning and thunder strike...
Touchless Palmprint Verification using Shock Filter,SIFT, I-RANSAC, and LPD
Abstract: Palmprint have some basic features. These basic features are unique and unchangeable in one’s life.It is constant and not easy to fake. A palmprint contains three major lines that are called principal line, se...