Elucidating Digital deception: Spot counterfeit fragment
نویسندگان
چکیده
An ordinary person always has confidence in the integrity of visual imagery and believes it without any doubt. But today's digital technology has eroded this trust. A relatively new method called image forgery is extensively being used everywhere. This paper proposes a method to depict forged regions in the digital image. The results for the proposed work are obtained using the MATLAB version 7.10.0.499(R2010a). The projected design is such that it extracts the regions that are forged. The proposed scheme is composed for uncompressed still images. Experimental outcome reveals well the validity of the proposed approach.
منابع مشابه
Deception Tactics and Counterfeit Deception in Online Environments
With widespread globalization happening at an alarming speed, the manufacturing and copying of goods has become a matter of routine for counterfeiters. The Internet has provided a new advantage for counterfeiters the opportunity to sell goods without prior consumer inspection. Leveraging this opportunity, deceitful purveyors of imitation goods engage in unethical practices such as selling count...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملHow private is private information? The ability to spot deception in an economic game
We provide experimental evidence on the ability to detect deceit in a buyer-seller game with asymmetric information. Sellers have private information about the value of a good and sometimes have incentives to mislead buyers. We examine if buyers can spot deception in face-to-face encounters. We vary whether buyers can interrogate the seller and the contextual richness. The buyers' prediction ac...
متن کاملSystem-Generated Digital Forensic Evidence in Graphic Design Applications
Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital fore...
متن کاملFooling the Eye of the Beholder: Deceptive Status Signalling among the Poor in Developing Countries
Poor consumers in the developing world use a variety of status signalling devices that rely on deception of the observer. A frequently used deceptive strategy is the consumption of counterfeit instead of original status-intensive goods, mainly cheap copies of expensive brand-name goods from developed countries. The choice for such deceptive modes of conspicuous consumption is analysed within a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013