A Robust Algorithm of Forgery Detection in Copy-Move and Spliced Images
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 3
Abstract
The paper presents a new method to detect forgery by copy-move, splicing or both in the same image. Multiscale, which limits the computational complexity, is used to check if there is any counterfeit in the image. By applying one-level Discrete Wavelet Transform, the sharped edges, which are traces of cut-paste manipulation, are high frequencies and detected from LH, HL and HH sub-bands. A threshold is proposed to filter the suspicious edges and the morphological operation is applied to reconstruct the boundaries of forged regions. If there is no shape produced by dilation or no highlight sharped edges, the image is not faked. In case of forgery image, if a region at the other position is similar to the defined region in the image, a copy-move is confirmed. If not, a splicing is detected. The suspicious region is extracted the feature using Run Difference Method (RDM) and a feature vector is created. Searching regions having the same feature vector is called detection phase. The algorithm applying multiscale and morphological operation to detect the sharped edges and RDM to extract the image features is simulated in Matlab with high efficiency not only in the copy-move or spliced images but also the image with both copy-move and splicing.
Authors and Affiliations
Tu Huynh-Kha, Thuong Le-Tien, Synh Ha-Viet-Uyen, Khoa Huynh-Van, Marie Luong
Analysis of Child Computer Interaction in Edutainment and Simulation Games Application on Android Platform in Indonesia
Child Computer Interaction (CCI) has become a challenge in utilizing the technology as education media. The increasing number of children, who use advanced gadgets in Indonesia such as smartphones and tablet PCs, provide...
An Algorithm that Prevents SPAM Attacks using Blockchain
There are many systems and methods for prevent-ing spam attacks. However, at present there is no specific tried-and-true method for preventing such attacks. In this paper, we propose an algorithm, “SAGA BC” to prevent sp...
A General Model for Similarity Measurement between Objects
The problem to detect the similarity or the differ-ence between objects are faced regularly in several domains of applications such as e-commerce, social network, expert system, data mining, decision support system, etc....
IMPLEMENTATION OF NODE ENERGY BASED ON ENCRYPTION KEYING
This paper deals with Designing cost-efficient, secure network protocols for any Networks is a challenging problem because node in a network itself is resource-limited. Since the communication cost is the most dominant f...
Face Recognition Based on Improved SIFT Algorithm
People are usually identified by their faces. Developments in the past few decades have enabled human to automatically do the identification process.Now, face recognition process employs the advanced statistical science...