Passive Image Forensic Method to detect Copy Move Forgery in Digital Images
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Tampering in digital images has become very easy due to the availability of advanced image editing softwares to the users. Images are being tampered in a very efficient manner without leaving any visual clue. As a consequence, the content of digital images cannot be taken as for granted. There are various types of image tampering techniques. One of the most common tampering techniques is copy-move forgery. In copy-move forgery one part of an image is copied and pasted in another part of the same image. In this paper, the passive image forensic method is presented to detect copy move forgery in digital images. The proposed method is based on SURF (Speed Up Robust Features) algorithm. In this method the features are extracted and their descriptors are obtained by SURF algorithm and the Nearest Neighbor approach is used for feature matching to identify the copy move forgery in digital images. This detection method is found to be rotation and scale invariant and is robust enough to noise, jpeg compression and blurring. Multiple copy move forgery is also detected by this method.
Authors and Affiliations
Salma Amtullah, , Dr. Ajay Koul
Data Quality in Data warehouse: problems and solution
In recent years, corporate scandals, regulatory changes, and the collapse of major financial institutions have brought much warranted attention to the quality of enterprise data if we can better understand the p...
Privacy Preservation for Knowledge Discovery: A Survey
Today’s globally networked society places great demand on the dissemination and sharing of information. Privacy Preservation is an important issue in the release of data for mining purposes. How to efficiently...
A Review on Systematic Quality Software Designing and DevelopmentPractices
Abstract: Software Engineering process, technology and the results cover the definition of suitable models for the environment to ensure its quality.Any software development project is very important to create quality so...
Data attribute security and privacy in distributed database system
Now a days there are a need of data attribute security in distributed database while preserving privacy. In the proposed work, we consider problem related in publishing collaborative data for anonymizing,vertically and h...
Lossless Image Compression Using Data Folding Followed ByArithmetic Coding
Abstract : The paper presents a lossless image compression technique using the hybridization of two differententropy coding techniques. Initially data folding technique has been applied to the image. A row folding...