Digital Image Forgery Detection by Contrast Enhancement

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightforward. This undermines our trust in photographs and, in particular, questions pictures as evidence for real-world events. Contrast enhancement is mainly to adjust the brightness globally. Users may also perform local contrast enhancement for creating a realistic composite image. Most latest technology in the literature uses two algorithms to find the contrast enhancement for the manipulation of digital imagees. First algorithm focus on the detection of global contrast enhancement applied to previously JPEG compressed images. Here images are converted to non-overlapping blocks ie histogram of images, then gap/peak detection of blocks are performed. Locate the gap and peak bins. Pixel value mappings are analyzed theoretically, and difference between the pictures are obtained by identifying the zero-height gap fingerprints. Second method is used to identify the composite image created by enforcing contrast adjustment on any of the source regions/over the entire region of the image. This is followed by finding out the positions of the peak/gap bins, and clustering them for identifying the contrast enhancement applied to different source regions. Finally check for the similarity between peak/gap bins reference vectors calculated for both forged region and unforged region.If it is found to be dissimilar then the image is treated as a forged one.

Authors and Affiliations

Remya S.

Keywords

Related Articles

A Survey on Brute Force Attack on Open Functionality Secured

The project entitled as Brute Force Attack On Open Functionality Secured is to design and develop the application package for well secured dynamic application. A common threat web developer’s face is a password-guessing...

 Efficiency of scrum the most widely adopted method for agile software development

 Abstract: In the recent past there has been a revolution in software industries. This is because of the software industries have increasingly been adopting agile practices. Scrum is the most widely adopted agile me...

 Optical Character Recognition (OCR) System

 Abstract: In the running world, there is growing demand for the software systems to recognize characters incomputer system when information is scanned through paper documents as we know that we have number ofnewspa...

Monitoring Performance over ISP Links in Route Control System

Multihoming has been employed by end networks to ensure reliability of internet access. This paper,makes two important contributions First, we present a study of the potential improvements in Internet round tri...

Direction-Length Code (DLC) To Represent Binary Objects

 Abstract: More and more images have been generated in digital form around the world. Efficient way of description and classification of objects is a well needed application to identify the objects present in images...

Download PDF file
  • EP ID EP152805
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

Remya S. (2014).  Digital Image Forgery Detection by Contrast Enhancement. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-7. https://europub.co.uk/articles/-A-152805