354 research outputs found

    Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images

    Get PDF
    Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed

    Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images

    Get PDF
    Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed

    Detection of incorrect and inappropriateImagefrom Tweets in Social Network

    Get PDF
    Digital imaging has grown to become the prevalent technology for creating, processing, and storing digital memory and proof. Though this technology brings many leverage, it can be used as a ambiguous tool for covering details and evidences. This is because today digital images can be tampered in such supremacy that forgery cannot be find visually. In fact, the immunity concern of digital content has arisen a long time ago and different methods to verify the efficiency of digital images have been developed. Digital images offer many features for forgery detection algorithm to take precedence of specifically the color and brightness of individual pixels as well as an image�s resolution and format. These properties grant for analysis and similarity between the significance of digital forgeries in an attempt to develop an algorithm for detecting image tampering. This paper presents a technique for image copy or move image forgery detection using Radix Sort, FasterK-means clustering algorithm & DCT

    An improved discrete cosine transformation block based scheme for copy-move image forgery detection

    Get PDF
    Copy-moved forgery is a common method to manipulate images. Several attempts of image forgery have been discovered and involves a region been duplicated and copied and pasted on another region of the same image in other to achieve selfish gain. Generally, there are two classification of copy-move forgery detection technique such as the block-based and key point-based. The block-based division is mostly used and divides image into blocks during the stage of image pre-processing before features are extracted, whereas key-point based technique skips the division of image into blocks and directly extracts different local feature from the image. In this paper, we review various block based and key point approach which has been proposed by various researchers. There is a problem of achieving a balance between improving the detection accuracy and having minimal computational complexity. The proposed technique is based on an improved DCT based copy-move image forgery detection (IDB-CFD), which involves using an octagonal block to reduce the number of features for matching, thereby improving detection accuracy while having minimal complexity. The analysis of this work as compared to previous proposed works which is based on a robust detection algorithm for copy-move image forgery (RDA-CF) and involves using circle block to reduce the number of features, results show that previous work represents about 79% of the quantized DCT coefficients on each image block and this proposed work represents about 85% of quantized DCT coefficients, therefore, recovery of about 6% more features using the IDB-CFD technique was observed as the improvement over the previously proposed RDA-CF

    Localization of Copy-Move Forgery in speech signals through watermarking using DCT-QIM

    Get PDF
    Digital speech copyright protection and forgery identification are the prevalent issues in our advancing digital world. In speech forgery, voiced part of the speech signal is copied and pasted to a specific location which alters the meaning of the speech signal. Watermarking can be used to safe guard the copyrights of the owner. To detect copy-move forgeries a transform domain watermarking method is proposed. In the proposed method, watermarking is achieved through Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM) rule. Hash bits are also inserted in watermarked voice segments to detect Copy-Move Forgery (CMF) in speech signals. Proposed method is evaluated on two databases and achieved good imperceptibility. It exhibits robustness in detecting the watermark and forgeries against signal processing attacks such as resample, low-pass filtering, jittering, compression and cropping. The proposed work contributes for forensics analysis in speech signals. This proposed work also compared with the some of the state-of-art methods
    corecore