Duplicate Object Detection for Digital Image Authentication

نویسندگان

  • Kusam Sharma
  • Pawanesh Abrol
چکیده

Digital Image Authentication has become a very important research area. Digital images can be altered easily using freely available image editing softwares. Many a times, it becomes impossible to ascertain the authentic image from the tampered image. These tampered images can be created by using graphical softwares, or can be manipulated simply by changing the content and context of the image. This creates problems for authentication of the digital image. Tampering a digital image by duplicating an object or a particular segment within the same image is one of the most prominent and easily done forgeries. It is known as copy-move tampering. It is very difficult to find out the duplicated objects or segments within the given image. In this paper, we study the recently developed major approaches to detect duplicate objects in digital images. Initially, the process of digital image tampering is explained. Subsequently, we analyze some of recently developed algorithms like Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD), FourierMellin Transform (FMT), Discrete Cosine Transform (DCT), Principal Component Analysis (PCA), Scale Invariant Features Transform (SIFT), Wavelets and Logpolar Mapping, Block Artifact Grid (BAG), Speedup Robust Features (SURF) etc. for detecting duplicate object within the same image. Preliminary investigations show that different algorithms have different domains of tampering detection and have different merits and demerits. The decision about the content authenticity is complex and can be better established by interpreting the results obtained by applying a set of these methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Copy-Move Forgery Detection in Digital Images: Progress and Challenges

With the advancement of technology and easy availability of imaging tools, it’s not difficult now a days to manipulate digital images to hide or create misleading images. Image forgery detection is currently one of the hot research fields of image processing. Many research papers have been published during recent years. Image forgery has already been categorized. Copy-Move forgery is one of the...

متن کامل

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

The escalation of internet has increased the usage of multimedia contents for wide range of functions. The easy access of the digital contents paves way to manipulate, edit and duplicate the contents using available image processing software. Watermarking process ensures copy protection and data authentication to the multimedia content by embedding watermark. The present paper proposes fidelity...

متن کامل

Detection of Scaled Region Duplication Image Forgery using Color based Segmentation with LSB Signature

Due to the availability of powerful image editing softwares, forgers can tamper the image content easily. There are various types of image forgery, such as image splicing and region duplication forgery. Region duplication is one of the most common manipulations used for tampering digital images. It is vital in image forensics to authenticate the digital image. In this paper, a novel region dupl...

متن کامل

A Secure Authentication Technique using Edge Detection in Watermarking

Digital watermarking is a way of authentication of multimedia objects i.e., videos, images and texts too. Watermarking functions are used not only for authentication, but also protects the data against nasty intent. In this paper the author uses the watermarking function which is purely based on the discrete cosine transform (DCT). Here the image, which is to be watermarked in the original imag...

متن کامل

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016