Digital Image Forgery Detection by Contrast Enhancement
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightforward. This undermines our trust in photographs and, in particular, questions pictures as evidence for real-world events. Contrast enhancement is mainly to adjust the brightness globally. Users may also perform local contrast enhancement for creating a realistic composite image. Most latest technology in the literature uses two algorithms to find the contrast enhancement for the manipulation of digital imagees. First algorithm focus on the detection of global contrast enhancement applied to previously JPEG compressed images. Here images are converted to non-overlapping blocks ie histogram of images, then gap/peak detection of blocks are performed. Locate the gap and peak bins. Pixel value mappings are analyzed theoretically, and difference between the pictures are obtained by identifying the zero-height gap fingerprints. Second method is used to identify the composite image created by enforcing contrast adjustment on any of the source regions/over the entire region of the image. This is followed by finding out the positions of the peak/gap bins, and clustering them for identifying the contrast enhancement applied to different source regions. Finally check for the similarity between peak/gap bins reference vectors calculated for both forged region and unforged region.If it is found to be dissimilar then the image is treated as a forged one.
Authors and Affiliations
Remya S.
The Incidence And Associated Factors of Obstetric Near Miss in A Referral Institution in Manipur
Background: The World Health Organization (WHO) estimated that, in the year 2000, 20 million women suffered acute complications in pregnancy with the occurrence of 529,000maternal deaths. Nevertheless, in a systema...
Collaborative data sharing in online social network resolving privacy risk and sharing loss
Abstract : Nowadays, Online Social Networks (OSNs) is popular all over the world. Millions of people join such networks to share their personal and public information and also to make new friends and relations. But...
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using...
Privacy-Preserving Public Auditing For Secure Cloud Storage
Abstract: By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put their data remotely to cloud storage and get benefit of on-demand services...