4 research outputs found

    Aging and tele rehabilitation

    No full text
    Aging and tele rehabilitatio

    Efficient digital image authentication and tamper localization technique using 3LSB watermarking

    Get PDF
    The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it’s impossible to be detected by naked eyes has become easier with development of image editing tools. Digital watermarking can preserve the authentication of digital images. In this paper we proposed an efficient image tamper detection method using 3 LSB (last significant bit) watermarking technique which is able to authenticate the digital image and detect the tamper locations accurately. In the proposed algorithm a 12-bit watermark key will be created from each block of host image which will be embed to last three significant bit of each block. Our proposed method improved tamper detection technique proposed by Prasad’s in sense of tamper detection rate by 40 percent. The experimental result clearly proved the efficiency of our proposed method

    State of the art in passive digital image forgery detection: copy-move image forgery

    No full text
    Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is copy-move digital image forgery, which involves copying one part of the image onto another area of the same image. Various methods have been proposed to detect copy-move forgery that uses different types of transformations. The goal of this paper is to determine which copy-move forgery detection methods are best for different image attributes such as JPEG compression, scaling, rotation. The advantages and drawbacks of each method are also highlighted. Thus, the current state-of-the-art image forgery detection techniques are discussed along with their advantages and drawbacks
    corecore