Digital Image Forgery Detection by Contrast Enhancement
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightforward. This undermines our trust in photographs and, in particular, questions pictures as evidence for real-world events. Contrast enhancement is mainly to adjust the brightness globally. Users may also perform local contrast enhancement for creating a realistic composite image. Most latest technology in the literature uses two algorithms to find the contrast enhancement for the manipulation of digital imagees. First algorithm focus on the detection of global contrast enhancement applied to previously JPEG compressed images. Here images are converted to non-overlapping blocks ie histogram of images, then gap/peak detection of blocks are performed. Locate the gap and peak bins. Pixel value mappings are analyzed theoretically, and difference between the pictures are obtained by identifying the zero-height gap fingerprints. Second method is used to identify the composite image created by enforcing contrast adjustment on any of the source regions/over the entire region of the image. This is followed by finding out the positions of the peak/gap bins, and clustering them for identifying the contrast enhancement applied to different source regions. Finally check for the similarity between peak/gap bins reference vectors calculated for both forged region and unforged region.If it is found to be dissimilar then the image is treated as a forged one.
Authors and Affiliations
Remya S.
Driving Supportive System for Warning Traffic Sign Classification
Abstract: Traffic signs should be accurately identified in order to prevent vital road accidents and secure lives. The objective of this paper is to detect the warning traffic signs and recognize the message it is design...
Soft Phone Support Voice and Video Calling Using Sip And Rtp Protocol
Soft Phone is a VoIP soft phone that uses the Session Initiation Protocol. It is a powerful and unique SIP software telephone that lets users make phone and video calls using single software application using any Voice o...
Design and Analysis of 16 Bit Reversible ALU
Reversible or information-lossless circuits have applications in digital signal processing, communication, computer graphics and cryptography. Reversibility plays an important role when energy efficient computation...
Object Elimination and Reconstruction Using an Effective Inpainting Method
Three major problems have been found in the existing algorithms of image inpainting: Reconstruction of large regions, Preference of filling-in and Choice of best exemplars to synthesize the missing reg...
Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)
Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending a...