Passive Image Forensic Method to detect Copy Move Forgery in Digital Images
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Tampering in digital images has become very easy due to the availability of advanced image editing softwares to the users. Images are being tampered in a very efficient manner without leaving any visual clue. As a consequence, the content of digital images cannot be taken as for granted. There are various types of image tampering techniques. One of the most common tampering techniques is copy-move forgery. In copy-move forgery one part of an image is copied and pasted in another part of the same image. In this paper, the passive image forensic method is presented to detect copy move forgery in digital images. The proposed method is based on SURF (Speed Up Robust Features) algorithm. In this method the features are extracted and their descriptors are obtained by SURF algorithm and the Nearest Neighbor approach is used for feature matching to identify the copy move forgery in digital images. This detection method is found to be rotation and scale invariant and is robust enough to noise, jpeg compression and blurring. Multiple copy move forgery is also detected by this method.
Authors and Affiliations
Salma Amtullah, , Dr. Ajay Koul
RED TACTON (An avant-garde Human Area Networking technology)
So many technologies for networking are known and are in use. These technologies connect people, objects and other networks together so as to share data and thus make information ready for access. Our body could...
Analytical Review on the Correlation between Ai and Neuroscience
Neuroscience is the pragmatic study of brain anatomy and physiology. AI and neuroscience are typical related to the human brain’s behavior. The alliance between artificial intelligence and neuroscience can produc...
Efficient Detection of Internet Worms Using Data Mining Techniques
Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...
Efficient Weather Prediction By Back-Propagation Algorithm
Abstract: Artificial Neural Networks (ANNs) have been applied extensively to both regress and classify weather phenomena. While one of the core strengths of neural networks is rendering accurate predictions with...
A Survey on Word Sense Disambiguation
Ambiguity has been always interwoven with human language and its evolution. Some argue that ambiguity of the human languages is a byproduct of its complexity, with words that are frequently used in language of...