Study and Analysis of Copy-Move Forgery Detection in Digital Image using MATLAB
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 8
Abstract
with the rapid development of ubiquitous availability of imaging tools and software, it is not difficult to tamper or forge the digital image. In today's digital age, it is feasible to add or remove important features from an image without any clear traces of alteration. So there is an imperative issue to identify the authenticity of digital images in various fields such as forensics, criminal investigation, surveillance system, intelligent system, medical imaging and Journalism. Digital Image Forensic is rising and swiftly growing field of image processing area to find the authenticity of digital image. Copy-Move attack is very common type of tampering technique, where a part of an image is copied and pasted elsewhere in the same image to conceal a special object in the original image. Many block based methods have been suggested to detect duplicated region (Copy-Move forgery).One of the major challenge of these block based is the time complexity. As the image size increases the execution time of such algorithm is also increases. In the proposed method, PCA is applied to the suspected image to reduce its dimensionality. Thus, Principal Component Analysis is for digital image compression. I have devised and implemented a side matching approach to reduce the time complexity. This proposed algorithm improves the time complexity in detection of Copy-Move Forgery.
Authors and Affiliations
Rachana . , Ashok Kumar, H. L. Mandoria, B. K. Pandey
Automatic Transmission Controller Using State Flow
Hydraulic technology can be used to capture and transfer high levels of energy extremely quickly and have a longer operating life compared with similarly sized electric systems. The hydraulic hybrid vehicle (HHV) includ...
Power Quality Improvement in Distribution System by Cascaded Multilevel Inverter Based Statcom
In this paper, a simple static var compensating scheme using a cascaded two-level inverter-based multilevel inverter is proposed. The topology consists of two standard two-level inverters connected in cascade through op...
Physicochemical Analysis of Ground Water near Municipal Solid Waste Dumping Sites in Rewa (M.P.) India
The usual and the most neglected cause of water pollution are uncontrolled dumping of Municipal Solid Waste. Infiltration of water by rainfall, water already present in the waste, or water generated by biodegradation, c...
Reconfigurable Fir Filter for Software Defined Ratio Based On VHBCSE Algorithm
To reduces the number of multiplications per input sample(MPIS) and additions per input sample(APIS) an optimization technique consist of two-step is used in the design of reconfigurable interpolation filter for multi s...
A survey of cooperative blackhole attack in mobile ad hoc networks
A MANET is an infrastructure less network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate with each other in order to...