CONTRAST ENHANCEMENT - BASED FORENSICS IN DIGITAL IMAGES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 5
Abstract
As a retouching manipulation, contrast enhancement is typically used to adjust the global brightness and contrast of digital images. In this paper, we propose two novel algorithms to detect the contrast enhancement involved manipulations in digital images. The consistency between regional artifacts is checked for discovering the image forgeries and locating the composition boundary Contrast Enh ancement is a technique of improving the quality of image so that the brightness of the image is preserved. Although there are various techniques implemented for the contrast enhancement but contrast enhancement of HDR images is difficult to achieve. To o vercome such problems contrast enhancement of HDR images using genetic algorithm is proposed. The algorithm implemented here uses genetic algorithm for the filtering of image such as noise reduction and enhance the contrast of image. The proposed algorithm performs better as compared to the other HDR contrast enhancement techniques. The idea is to use genetic algorithm which performs a number of iterations and detect the regions in the image where enhancement is required.
Authors and Affiliations
S. Aruna Devi
COMMON FIXED POINT THEOREMS OF ITERATIONS FOR WEAKCONTRACTION IN CONE METRIC SPACES
In the present paper we prove common fixed point theorems in complete cone metric Spaces for weak contractionwhich generalize and extend some well-known previous results of [9].
A NEW HOMOTOPY PERTURBATION METHOD FOR SOLVING POISSON EQUATION
In this paper, we applies a new homotopy perturbation method (NHPM),to find the exact solution of Poisson equation with Dirichelet and Neumann boundary conditions, to illustrate the ability and reliability of the method...
A Lossless Implementation of Fault Detection Design for High Speed Memory Applications
The technology advancement scaling to Reliability,Availability and Serviceability are the three important parameters to be satisfied by any application. With further reduction in transistor size that leads to smal...
Modifying SHA-512 using Padding, Tree structure and Permutation Boxes
In this age of technology internet has become a day to day necessity. With this growing usage of web data it has become very important to design some secure way to save this web data from various types of attacks. One o...
Stress Simulation of General Steam Turbine Blade Materials
In Industries the Turbines are used for converting the forms of energy, the Blades are the key elements for turbines where the blades of the turbines experiences different types of failures. The common reason of these t...