On the Function of Graphic Language in Poster Design

Size: px
Start display at page:

Download "On the Function of Graphic Language in Poster Design"

Transcription

1 doi: / On the Function of Graphic Language in Poster Design Hong Zhao Anhui Institute of Information Engineering, Wuhu Anhui, , China Abstract Graphic language in this paper refers specifically to the language separated by raster processor through digital poster editing samples confirmed by editors during the digital poster design, and then stored the in binary form. As soon as the poster design is confirmed, the legitimacy of its source is without doubt. Seeing from the entire workflow, there is still a large risk of encryption in the storage and transmission process of the poster design. Judging from the existing replication encryption testing algorithm, there are some problems such as high feature dimension, high computational cost or low detection rate. And this method is not suitable for binary proofs after color separation. This paper presents a method of detecting the Replication encryption based on graphic language features, which is based on the binary quantization of CMYK target image after color separation, the target graphics is segmented by the method of sliding block, and the local graphic features of the four channels of CMYK block graph is extracted so as to do the encryption detection. Experiment results show that this method has a lower time complexity and high detection rate compared with the previous methods on the graphic encryption detection, and it has good robustness to the rotation attack of the encrypted area of the graph, and the small scale zoom attack and so on. Key words: Copy, Encryption Detection, Graphic Language, Digital Graphics Forensics. 1. INTRODUCTION Although the rapid spread of mobile devices such as mobile phones and tablets has led to the partial separation of media from digital media to digital media, many factors, such as appreciation of art, aging of the society and cost of the Internet, The paper media in the future for a long period of time will bear the main force of information dissemination. Therefore, to ensure the authenticity of the information disseminated by the paper media has important social value and significance. Particularly the design of images posters on paper media, due to their rich content, how to ensure the authenticity and credibility of placard design picture source appears to be particularly important. However, in recent years, digital image processing tools (such as: Photoshop) developed continuously, making the picture encryption technology costs and thresholds continue to decrease. According to statistics, about 10% of the United States newly published color photos are modified and done with Post-processing operation of the photo (Birajdara and Mankar, 2013).And in the domestic poster design; the situation of forged pictures of is endless, such as "South China tiger" "square pigeons" and other photo forgery, having a significant negative impact on the society. In view of this, Graphical cryptography detection not only has important application value in news publishing and cultural communication, but also has been widely concerned by academic circles. There are two types of detection methods: active and passive detection(blind detection) (Popescu and Farid, 2004; Huang and Yan, 2016), active detection technology is mainly based on digital watermarking and digital signature, and need to verify the information of the source image, this will change the original information of the source graphics, and in many cases it is impossible to get the original graphics, without any additional information in the case of the authenticity of the target graphics to identify, so the active detection method does not have good practical applications The passive detection technology is to carry on the analysis of the information carried by the graphics to achieve a graphics encryption detection technology, its main advantage is that no need to embed any data to be detected graphics, so do not destroy the original graphics The situation can be achieved on the authenticity of the target graphics detection. In view of the graphics copy encryption detection, many scholars have made fruitful research work. Most of the existing research results are mostly based on block-based detection method and the keypoint based detection method on the image copy and paste encryption and detection. Block-based graphics encryption detection method is to block the graphics by overlapping blocks, and then extract the feature vector from a large number of blocks to characterize the block, and finally sort through the dictionary or the most recent method, (DCT) is proposed in (Ding and Yang, 2007), which is based on discrete cosine transform (DCT). This method uses the DCT to encrypt the image, and then the image is divided into blocks. (DCT), discrete cosine transform (DCT), A method for detecting the image copy-and-paste encryption is proposed, which combines the 225

2 logarithmic polar coordinates and the wavelet transform to detect and locate the encrypted region of the graphic copy. This method reduces the dimension of the block after the wavelet transform and maps it to the logarithmic polar coordinate system, uses the phase correlation method as the similarity standard between the graphic blocks, and searches the similar blocks in an exhaustive search way. (Ardizzone, Bruno and Mazzola, 2010)The paper studied a method of using a standard texture descriptor to detect a pattern copy region, which uses five standard texture descriptors extracted from a graphical block to characterize the graphic properties. The experimental results show that the statistical texture descriptor is superior to other Texture descriptor has better detection accuracy and faster speed. Here (Liu, Wang, Lian and Wang, 2011) proposed a Hu-invariant moment of the copy encryption detection method, the method from the circular block extraction Hu invariant moment features, experiments results show that this method is robust to such attacks as rotation, blur, JPEG compression, etc. In (Ryu, Lee and Lee, 2010), an encryption detection algorithm for detecting image copy-rotation-movement is proposed, which uses Zernike moments as graph block features, Noise, blur, rotation, etc. In order to enhance the robustness of the algorithm to the large-scale scaling and rotation attack in the image encryption area, (Wu, Wang and Zhang, 2010) proposed a duplicate encryption detection method based on log polar coordinate Fourier transform (LPFT) (LPFFT) detection method based on log polar coordinates (Wu, Wang and Zhang, 2011; Davarzani, Yaghmaie, Mozaffari and Meysam, 2013) proposed a multi-resolution local binary pattern (Multiresolution Local Binary Patterns) graphics copy and paste encryption detection method, This method uses the local binary pattern with different resolution to extract the feature of the block, and improves the detection efficiency by combining the dictionary sorting and the k-d tree method. The method has high detection rate, and has the advantages of rotation, scaling, JPEG compression, which is robust to the rotation and scaling attack of the encrypted area. Furthermore, Li et al. (Cozzolino, Poggi and Verdoliva, 2014) proposed a fast detection method based on the Patch Match algorithm, In (Li, Li, Yang and Sun, 2015), a new method of image segmentation based on image segmentation is proposed, which divides the image into independent semantic blocks, and combines the method based on key points extraction to avoid a large number of non-similar blocks Contrast, in order to improve the detection efficiency, the realization of the graphics copy and paste encryption detection. At present, the work of graphics encryption detection is often used to solve the digital media transmission between the networks whether the encryption occurs, how to encrypt the graphics language detection need to explore a new technical line. In summary, in the entire poster design in this paper, we propose a new encryption algorithm based on graphic language technology, which is based on the technology of graph language, which can be used to detect the encryption of graphics languages, which involves the interdisciplinary knowledge cross-discipline and few related works. In this paper, the graphics language algorithm simulates the binary quantization processing of the CMYK target graphics in the process of graphics processing by the raster graphics processor, and then blocks the target graphics by sliding block method. By extracting four blocks of CMYK, then it is used to detect the encryption of the graphic block. Experimental results show that compared with the traditional digital format image encryption detection method, this method not only has close to even higher detection rate in the encryption detection of graphics language, Which has a low time complexity and can resist attacks such as rotation of the encrypted area, small scale scaling and JPEG compression. The rest of this paper is organized as follows: Section 1 introduces the relevant research work; Section 2 describes the graphic language based on the graphics language copy encryption detection methods; Section 3 for the experimental results analysis and conclusions. 2. GRAPHICS LANGUAGE ENCRYPTION DETECTION BASED ON GRAPHIC LANGUAGE TECHNOLOGY In the graphic poster design process, in order to simulate the continuous visual effects of graphics, generally through the graphics language dot size or frequency changes to simulate the changes in graphics and shadows.graphic graphics in graphics and graphics similar to the source, very good to retain the paper which uses the image invariant feature of image graphics language to deal with the problem. In the process of graphic prepress processing, the dot density feature of graphics is extracted to realize the image copy encryption detection. The basic idea is as follows: Firstly, CMYK color separation processing, and then through the raster graphics processor CMYK graphics language binary quantization processing to get CMYK four-channel graphics language graphics, and then calculate the CMYK each channel plane in the local point density of each pixel, and then the Figure 1 is the basic flow of the graphic language encryption and detection based on the graphic language technology. Firstly, the paper introduces the basic principle of the graphic encryption algorithm based on graphic language. 226

3 source image CMYK color separation Image block dot density feature Image block similarity detection Raster image processor (halftone The image overlapping and block detection result Figure 1. Graphic language copy and encryption detection workflow 2.1. Algorithm Flow A Graphics Language Encryption Detection Algorithm Based on Graphics Language Technology S1: Source graphics CMYK color separation S2:;Graphical language binary quantization of graphics CMYK four channels using raster graphics processor S3 : Calculate the local density of pixels in the plane of each channel of CMYK, i j pij f X, Y ; 9 xi y j1 S4: The size of the S3 to get the M N graphics overlap block, block size B b b ; N M b 1 N b 1 these graph block, and then the dot density S5:From S4, we can get B moments of the block VB are extracted according to the formulas (5), (6), (7) and (8); S6: K d Tree Is constructed by the block dot density feature V B which is extracted from N B block The similarity degree of the blocks is matched by the approximate nearest neighbor search method. The similarity calculation method between the eigenvectors is shown in formula (9); d A, B a S7: The degree of similarity between the two graphic blocks A and B is denoted as graph block of d A, B T (for a threshold) labeled as a copy area. xi, j + u b i, j i, j Thresholding t u Kernel k i, j m, n e i, j + - Figure 2. Error diffusion algorithm process procedures 2.2. Graphic digital graphics language binary quantization method In the process of graphic prepress processing, the main function of raster graphics processor is to convert the graphics into a raster binary graphics device that can directly control the output device according to the characteristics of the output device, that is, the graphics language is screened The lattice graphics processor transforms the continuous graph into binary image, which makes the quantized binary image similar to the original image in visual effect, and the generated graphic language graph retains the content characteristic of 227

4 graphics well. General digital graphics language is divided into three categories: order jitter algorithm, error diffusion algorithm and iterative method. Among them the error diffusion algorithm is widely used in practical applications because of its good trade-off between image quality and computational complexity. In this paper, the error diffusion algorithm simulates the raster graphics processor to perform binary quantization on the graph. Fig 2 shows the processing flow of the error diffusion algorithm. When the continuous graph is processed line by line through graph language, the previous processed error is transferred to the currently processed pixel. For the currently processed pixel x i, j, x' i, j is the error sum of transited adjacent area processed pixel, b indicates the binary quantization result of the pixel, i, j diffusion error. i j, and u i, j is the pixel gray value after adding the i, j ',,,,, i j i j i j i j i, j u x x e u b (1) 1 1 ',, i j im jn m, n m0 n1 x e k (2) b i, j 0 ifu 1 ifu i, j i, j t t (3) (3) is the threshold value, and is usually set to 0. Figure 2, the error diffusion filter; different error diffusion filter can generate different quality graphics language graphics. As shown in Figure 3, (b) for the Lena continuous tone Graphic (a) Graphical language graph after binary quantization through graphical language. (a)(b) Figure 3. Lena picture which is based error diffusion After the binary quantization, the binary image has the following characteristics: (1) the original content of the graphics, such as edge information, texture features, etc.; (2) after the two-valued quantization, after the raster graphics processor generated graphics language binary image has the following characteristics: (3) The graph language of the generated graphs can easily extract the point density feature of the graph, which belongs to the statistical feature quantity, and has a definite effect on the post-processing operation of the encrypted area. (4) The binary quantization of graphics reduces the complexity of subsequent computation. 3. EXPERIMENTAL RESULTS ANALYSIS In order to verify the detection efficiency, robustness and performance of the proposed method, we use Benchmark Data set by Christlein et al (Christlein, Riess, Jordan, Riess and Angelopoulou, 2012) to carry out the comparative experiment. On the basis of Visual C ++, the graphics workstations used in the experiment are: AMDAthlonX43.7GHzCPU, DDR31600HZ8G memory. The following are the evaluation methods and related experimental results used in this experiment Evaluation Methods In this paper, we use the precision (Precision), recall rate (Recall) and comprehensive evaluation index F1- Measure to evaluate the algorithm, precision rate and recall rate is calculated as follows: TP TP precision, Re call (4) TP FP TP FN 228

5 2 Pr ecision Re call F1 measure Pr ecision Re call Where TP is the number of encrypted pictures correctly detected by the algorithm; FP is the number of the encrypted pictures that are mistakenly detected by the algorithm; FN is the number of the encrypted pictures which is not detected by the algorithm.f1-measure combines Precision and Recall, The average of the indicators Experimental Results Based on preprocessing raster graphics processing flow, the data set Benchmark Data [M] * has been copied to the conventional encryption detection test, rotation attack experiment, zoom (geometry deformation) attack experiment, Gaussian noise and JPEG compression (DCT (Ding and Yang, 2007), PCA (Popescu and Farid, 2004), Zernike Moments (Ryu, Lee and Lee, 2010), SIFT (Christlein, Riess, Jordan, Riess and Angelopoulou, 2012), MLBP (Davarzani, Yaghmaie, Mozaffari and Meysam, 2013)), and the results show that the proposed method is robust and robust. Of the graphics copy encryption detection method in the accuracy, robustness and performance are better performance. The experimental details are as follows: Routine Testing The Benchmark Data Benchmark data set used in this experiment contains 48 original pictures without any encryption operation and 48 encrypted pictures which have been copied without any other processing except for the translation copy operation and the edge blur processing. The encryption region is difficult to distinguish by the naked eye. We use the proposed method and the above-mentioned four typical methods on the benchmark data set of 96 images were compared test results shown in Table 1. Table 1.Comparison of experimental results of four typical encryption methods Method Precision Recall F1 Method of this paper DCT PCA ZERNIKE MLBP SIFT Based on the analysis of the experimental results in Table 1 and Table 2, the graphic dot density moments proposed in this paper can describe the local features of graphic blocks well. Based on the graphic dot density moments, The MLBP-based method has better performance than other methods, but the method has a great difference in time cost compared with other methods and methods in this paper. Figure 4: We can see that the method proposed in this paper has a higher recognition degree to the encrypted region. (5) (a)(b)(c) Figure 4. The graphic copy and encryption detection examples based on the picture language point density features Rotation Attack Experiment and Scale Attack Experiment In order to verify the robustness of the method to the rotation and scaling attack, we use the data of Benchmark Data to expand the scale of the image, The rotation of the 48 images in the Benchmark Data set is rotated at 2, 10, 60, and 180, respectively.figure 5 shows the results of the test in this paper, Examples of rotation attack test results. 229

6 (a) 2 (b)10 (c)60 (d)180 Figure 5. Rotation attack test examples As shown in Fig. 6, when the image encryption area is rotated, the small area of the pixel is affected by the rotation, but the area of the pixel is much smaller than the pixel area of the overlapped part. The experimental results show that the small angle rotation attack within 10 in the encryption region has no significant effect on the detection effect. For the large angle rotation of 60, the detection of the encrypted region, especially in the case of 180 large-angle rotation, the detection effect is basically the same as the case where the encryption region is not rotated, and the experimental results are in agreement with the theory. Therefore, the proposed method based on graphics language graphics, the dot - density - moment - based graphic encryption detection method is robust to rotation attack. Figure 6. The impact of rotation attack on features extraction From the experimental results, it can be seen that the small-scale scaling attacks in the scale range of 91% - 109% do not influence the scaled attack area of 80% -120% in the zoom attack expansion dataset. The result of the experiment shows that the proposed algorithm can deal with the problem that the scale factor of the image encryption area is between 91% and 100%, and the scale factor of 80% and 120% 109% of the small-scale scaling attacks, with the encryption area scaling increased detection rate decreased due to large-scale graphics 230

7 zoom will cause significant distortion of the zoom area, using the naked eye will be easier to detect, so in practical applications, The graphics encryption area is generally not too large scale scaling Algorithm Performance Comparison At present, the performance of the common graphics copy encryption detection method is mainly affected by three aspects: graphics preprocessing, graphic feature extraction, and graphic feature matching. This paper compares the methods proposed in this paper with the four typical methods in computing performance The time spent on graphics preprocessing is denoted as P-Time, the time spent on pattern feature vector extraction is denoted by F-Time, and the time spent on pattern matching is recorded as the time cost of pattern matching. Is M-Time, and the total processing time is denoted as O-Timetable 2 is the average processing time overhead of the proposed method and the other four typical methods. Table 2. Comparison between method of this paper and five types of typical picture encryption detection method experimental result (Unit: second) Method P-Time F-Time M-Time O-Time Method of this paper DCT PCA ZERNIKE MLBP SIFT Graph feature extraction and feature matching are the main factors that affect the computation time cost of block-based graph copy-paste encryption detection method, and the extracted feature vector dimension of graphics block directly affects the subsequent feature matching efficiency. In this paper, In the block detection method, the DCT-based method extracts the transform coefficients to form the 256-dimensional eigenvector by discrete cosine transform of the block, while the feature extraction in the frequency domain and the similarity matching of the high-dimensional features require high time The PCA method reduces the time cost required for feature matching, but increases the feature extraction time of the block. The PCA method based on the Zernike moment extraction the feature vector is 12-dimension, and the computation time is obviously saved compared with the former two methods. MLBP-based methods need to use many LBP descriptors for feature extraction, such as using the extracted features to form the features of 59, 135, and 18 respectively Vector matrix, and then based on dictionary ordering and k-d tree similar to the subsequent block matching processing, the need to deal with a number of high-dimensional feature vector matrix, an increase of the time complexity of the algorithm. This paper uses CMYK channel extracted from the local graphic features 8-dimensional eigenvector, which has lower feature dimension compared with the above methods, which can save the time cost of similar block matching. Experimental results show that, under the premise of comprehensive consideration of detection rate and detection performance, (DCT, PCA, ZERNIKE, MLBP) is superior to other block-based detection methods in the feature extraction, pattern feature matching and overall detection performance, and the detection method based on key point (SIFT) The detection method only looks for the high entropy point of the graph, and is superior to the block-based detection method in performance, but the sparseness of the key points leads to a lower key point-based method than the block-based method Recall rate. 4. CONCLUSION At present, there is little literature on the research of copy-and-paste encryption detection of graphics languages. Therefore, this paper presents a method to extract the graphic dot density of graphic language to detect copy and encryption the graphic language. First, do the CMYK color separation of the target graphics, then graphics are processed by prepress raster graphics processing, and the k-d tree is constructed by extracting the local graphic features of each channel of CMYK to realize the encryption detection of the graphs. The algorithm is simple and the features extracted by this method and have low dimensionality and rotation invariance. Experimental results show that the method has good detection effect on the image copy and paste encryption detection and has good robustness to the replication region rotation attack, And also has good robustness to small-scale scaling attacks and JPEG compression attacks in the replication area, and it is obviously superior to other block-based graphics copy encryption detection methods in time complexity. ACKNOWLEDGMENTS This work was supported by Research project of Anhui Institute of Information Engineering; Provincial key projects of Anhui Province (SK2016A0124, SK2016A0126);National Undergraduate Innovation Training 231

8 Program ( ); Innovation and entrepreneurship training program for college students in Anhui Province(AH , , , ). REFERENCES Al Sawadi, M., Muhammad, G., Hussain, M., Bebis, G. (2013) Replication Image Forgery Detection Using Local Binary Pattern and Neighborhood Clustering, European Modelling Symposium, pp Ardizzone, E., Bruno, A., Mazzola, G. (2010) Replication forgery detection via texture description, Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp Birajdar, G.K., Mankar, V.H. (2013) Digital image forgery detection using passive techniques: A survey, Digital Investigation, 10(3), pp Christlein, V., Riess, C., Jordan, J, Riess, C., Angelopoulou, E. (2012) An evaluation of popular copy-move forgery detection approaches, IEEE Transactions on Information Forensics and Security, 7(6), pp Cozzolino, D., Poggi, G., Verdoliva, L. (2014) Copy-move forgery detection based on PatchMatch, IEEE International Conference on Image Processing, pp Davarzani, R., Yaghmaie, K., Mozaffari, S., Meysam, T. (2013) Replication forgery detection using multiresolution local binary patterns, Forensic science international, 231(1), pp Ding, H. T., Yang, J. M. (2007) Detection of copy-move forgery in digital images, Journal of Donghua University, 33(1), pp Huang, D., Yan, Y. (2016) Prediction-Based Geographic Routing over VANETs, Rev. Téc. Ing. Univ. Zulia.,39(2), pp Li, J., Li, X.L., Yang, B., Sun, X.M. (2015) Segmentation-based Image Replication Forgery Detection Scheme, IEEE Transactions on Information Forensics and Security,10(3), pp Liu, G.J., Wang, J.W., Lian, S.G., Wang, Z.Q. (2011) A passive image authentication scheme for detecting regionduplication forgery with rotation, Journal of Network and Computer Applications,34(5), pp Myrna, A.N., Venkateshmurthy, M.G., Patil, C.G. (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping, International Conference on Conference on Computational Intelligence and Multimedia Applications, 3, pp Popescu, A.C., Farid, H. (2004) Exposing digital forgeries by detecting duplicated image regions, Comput.sci.dartmouth College Private Ivy League Res.univ,646, pp.tr Ryu, S.J., Lee, M.J., Lee, H.K. (2010) Detection of copy-rotate-move forgery using zernike moments, Information Hiding-international Conference, 6387, pp She, H., Shan, J. (2016) Automatic Color Match for Planar Graphics, Rev. Téc. Ing. Univ. Zulia.,39(5), pp Wu, Q., Wang, S., Zhang, X. (2010) Detection of image region-duplication with rotation and scaling tolerance. Springer: Berlin Heidelberg. Wu, Q., Wang, S., Zhang, X. (2011) Log-polar based scheme for revealing duplicated regions in digital images, IEEE Signal Processing Letters, 18(10), pp

Copy-Move Forgery Detection using DCT and SIFT

Copy-Move Forgery Detection using DCT and SIFT Copy-Move Forgery Detection using DCT and SIFT Amanpreet Kaur Department of Computer Science and Engineering, Lovely Professional University, Punjab, India. Richa Sharma Department of Computer Science

More information

Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations

Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations Copy Move Forgery using Hu s Invariant Moments and Log-Polar Transformations Tejas K, Swathi C, Rajesh Kumar M, Senior member, IEEE School of Electronics Engineering Vellore Institute of Technology Vellore,

More information

Cloning Localization Based On Feature Extraction and K-Means Clustering

Cloning Localization Based On Feature Extraction and K-Means Clustering Cloning Localization Based On Feature Extraction and K-Means Clustering Areej S. Alfraih, Johann A. Briffa, and Stephan Wesemeyer Department of Computing, University of Surrey, Guildford GU2 7XH, UK a.alfraih@surrey.ac.uk

More information

Improved LBP and K-Nearest Neighbors Algorithm

Improved LBP and K-Nearest Neighbors Algorithm Image-Splicing Forgery Detection Based On Improved LBP and K-Nearest Neighbors Algorithm Fahime Hakimi, Department of Electrical and Computer engineering. Zanjan branch, Islamic Azad University. Zanjan,

More information

Advanced Digital Image Forgery Detection by Using SIFT

Advanced Digital Image Forgery Detection by Using SIFT RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

Copy-Move Image Forgery Detection Based on Center-Symmetric Local Binary Pattern

Copy-Move Image Forgery Detection Based on Center-Symmetric Local Binary Pattern IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. I (July Aug. 2015), PP 66-70 www.iosrjournals.org Copy-Move Image Forgery Detection Based on

More information

Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform

Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform Reduced Time Complexity for of Copy-Move Forgery Using Discrete Wavelet Transform Saiqa Khan Computer Engineering Dept., M.H Saboo Siddik College Of Engg., Mumbai, India Arun Kulkarni Information Technology

More information

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Simulative Comparison of Copy- Move Forgery Detection Methods for Digital Images

Simulative Comparison of Copy- Move Forgery Detection Methods for Digital Images Simulative Comparison of Copy- Move Forgery Detection Methods for Digital Images Harpreet Kaur 1, Jyoti Saxena 2 and Sukhjinder Singh 3 1 Research Scholar, 2 Professor and 3 Assistant Professor 1,2,3 Department

More information

Copy-move Forgery Detection in the Presence of Similar but Genuine Objects

Copy-move Forgery Detection in the Presence of Similar but Genuine Objects Copy-move Forgery Detection in the Presence of Similar but Genuine Objects Ye Zhu 1, 2, Tian-Tsong Ng 2, Bihan Wen 3, Xuanjing Shen 1, Bin Li 4 1 College of Computer Science and Technology, Jilin University,

More information

A REVIEW BLOCK BASED COPY MOVE FORGERY DETECTION TECHNIQUES

A REVIEW BLOCK BASED COPY MOVE FORGERY DETECTION TECHNIQUES Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Sahar Q. Saleh 1, Muhammad Hussain 1, Ghulam Muhammad 1, and George Bebis 2 1 College of Computer and Information Sciences,

More information

Gabor Filter HOG Based Copy Move Forgery Detection

Gabor Filter HOG Based Copy Move Forgery Detection IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 41-45 www.iosrjournals.org Gabor Filter HOG Based Copy Move Forgery Detection Monisha Mohan

More information

SURF-based Detection of Copy-Move Forgery in Flat Region

SURF-based Detection of Copy-Move Forgery in Flat Region SURF-based Detection of Copy-Move Forgery in Flat Region 1 Guang-qun Zhang, *2 Hang-jun Wang 1,First Author,* 2Corresponding Author School of Information Engineering, Zhejiang A&F University, 311300, Lin

More information

A Study of Copy-Move Forgery Detection Scheme Based on Segmentation

A Study of Copy-Move Forgery Detection Scheme Based on Segmentation IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 27 A Study of Copy-Move Forgery Detection Scheme Based on Segmentation Mohammed Ikhlayel, Mochamad Hariadi

More information

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet MATEC Web of Conferences 25, 0301 8 ( 2015) DOI: 10.1051/ matecconf/ 20152 503018 C Owned by the authors, published by EDP Sciences, 2015 An Adaptive Color Image Visible Watermark Algorithm Supporting

More information

DWT and SIFT based Passive Copy-Move Forgery Detection

DWT and SIFT based Passive Copy-Move Forgery Detection DWT and SIFT based Passive Copy-Move Forgery Detection Lakhwinder Kaur Bhullar M.E. (ECE) Sumit Budhiraja Assistant Professor, ECE Anaahat Dhindsa Assistant Professor, ECE ABSTRACT With the use of powerful

More information

Anushree U. Tembe 1, Supriya S. Thombre 2 ABSTRACT I. INTRODUCTION. Department of Computer Science & Engineering, YCCE, Nagpur, Maharashtra, India

Anushree U. Tembe 1, Supriya S. Thombre 2 ABSTRACT I. INTRODUCTION. Department of Computer Science & Engineering, YCCE, Nagpur, Maharashtra, India ABSTRACT 2017 IJSRSET Volume 3 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Copy-Paste Forgery Detection in Digital Image Forensic Anushree U. Tembe

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate

More information

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University 2011 Eighth International Conference Computer Graphics, Imaging and Visualization COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM Najah Muhammad 1, Muhammad Hussain 2, Ghulam Muhammad 2, and

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation , pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,

More information

DETECTING COPY MOVE FORGERY IN DIGITAL IMAGE USING SIFT

DETECTING COPY MOVE FORGERY IN DIGITAL IMAGE USING SIFT International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 199-204 DOI: http://dx.doi.org/10.21172/1.73.028 e ISSN:2278 621X DETECTING COPY MOVE FORGERY IN DIGITAL IMAGE

More information

An Improved SIFT-Based Copy-Move Forgery Detection Method Using T-Linkage and Multi-Scale Analysis

An Improved SIFT-Based Copy-Move Forgery Detection Method Using T-Linkage and Multi-Scale Analysis Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 2, March 2016 An Improved SIFT-Based Copy-Move Forgery Detection Method Using

More information

Digital Image Forensics in Multimedia Security: A Review

Digital Image Forensics in Multimedia Security: A Review Digital Image Forensics in Multimedia Security: A Review Vivek Singh Computer Science & Engineering Department Jaypee University of engineering and technology, Raghogarh, guna, india Neelesh Kumar Jain

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION. REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION Ling-ling WAN 1,Fan CHEN 1, Hong-jie HE 1,Lei ZHANG 2 1 the School of Information Science and Technology, Southwest

More information

Improved DSIFT Descriptor based Copy-Rotate-Move Forgery Detection

Improved DSIFT Descriptor based Copy-Rotate-Move Forgery Detection Improved DSIFT Descriptor based Copy-Rotate-Move Forgery Detection Ali Retha Hasoon Khayeat 1,2, Xianfang Sun 1, Paul L. Rosin 1 1 School of Computer Science & Informatices, Cardi University, UK KhayeatAR@Cardiff.ac.uk,

More information

Research on QR Code Image Pre-processing Algorithm under Complex Background

Research on QR Code Image Pre-processing Algorithm under Complex Background Scientific Journal of Information Engineering May 207, Volume 7, Issue, PP.-7 Research on QR Code Image Pre-processing Algorithm under Complex Background Lei Liu, Lin-li Zhou, Huifang Bao. Institute of

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,

More information

Automatic Shadow Removal by Illuminance in HSV Color Space

Automatic Shadow Removal by Illuminance in HSV Color Space Computer Science and Information Technology 3(3): 70-75, 2015 DOI: 10.13189/csit.2015.030303 http://www.hrpub.org Automatic Shadow Removal by Illuminance in HSV Color Space Wenbo Huang 1, KyoungYeon Kim

More information

Copy Move Forgery Detection through Graph Neighborhood Degree

Copy Move Forgery Detection through Graph Neighborhood Degree Copy Move Forgery Detection through Graph Neighborhood Degree Prabhash Kumar Singh 1, Biswapati Jana 2, Sharmistha Halder (Jana) 3 1 Department of Computer Science, Vidyasagar University, Midnapore, WB,

More information

An Angle Estimation to Landmarks for Autonomous Satellite Navigation

An Angle Estimation to Landmarks for Autonomous Satellite Navigation 5th International Conference on Environment, Materials, Chemistry and Power Electronics (EMCPE 2016) An Angle Estimation to Landmarks for Autonomous Satellite Navigation Qing XUE a, Hongwen YANG, Jian

More information

A Key-Point Based Robust Algorithm for Detecting Cloning Forgery

A Key-Point Based Robust Algorithm for Detecting Cloning Forgery Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Mariam

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , )

DOI: /jos Tel/Fax: by Journal of Software. All rights reserved. , ) ISSN 1000-9825, CODEN RUXUEW E-mail: jos@iscasaccn Journal of Software, Vol17, No2, February 2006, pp315 324 http://wwwjosorgcn DOI: 101360/jos170315 Tel/Fax: +86-10-62562563 2006 by Journal of Software

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

Dual System for Copy-move Forgery Detection using Block-based LBP-HF and FWHT Features

Dual System for Copy-move Forgery Detection using Block-based LBP-HF and FWHT Features Engineering Letters, 26:1, EL_26_1_20 Dual System for Copy-move Forgery Detection using Block-based LBP-HF and FWHT Features Badal Soni, Member, IAENG, Pradip K. Das and Dalton Meitei Thounaojam, Member,

More information

Research and application of volleyball target tracking algorithm based on surf corner detection

Research and application of volleyball target tracking algorithm based on surf corner detection Acta Technica 62 No. 3A/217, 187 196 c 217 Institute of Thermomechanics CAS, v.v.i. Research and application of volleyball target tracking algorithm based on surf corner detection Guowei Yuan 1 Abstract.

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features 1 Kum Sharanamma, 2 Krishnapriya Sharma 1,2 SIR MVIT Abstract- To describe the image features the Local binary pattern (LBP)

More information

Implementation of ContourLet Transform For Copyright Protection of Color Images

Implementation of ContourLet Transform For Copyright Protection of Color Images Implementation of ContourLet Transform For Copyright Protection of Color Images * S.janardhanaRao,** Dr K.Rameshbabu Abstract In this paper, a watermarking algorithm that uses the wavelet transform with

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

A Study and Analysis on a Perceptual Image Hash Algorithm Based on Invariant Moments

A Study and Analysis on a Perceptual Image Hash Algorithm Based on Invariant Moments Sensors & Transducers 013 by IFSA http://www.sensorsportal.com A Study and Analysis on a Perceptual Image Hash Algorithm Based on Invariant Moments Hu Bin School of Civil Engineering and Transportation,

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

Thinking Beyond the Block Block Matching for Copy Move Forgery Detection Revisited

Thinking Beyond the Block Block Matching for Copy Move Forgery Detection Revisited Thinking Beyond the Block Block Matching for Copy Move Forgery Detection Revisited Matthias Kirchner Pascal Schöttle Christian Riess Binghamton University University of Münster Stanford University IS&T/SPIE

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery

Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery Maryam Jaberi, George Bebis Computer Science and Eng. Dept. University of Nevada, Reno Reno, USA (mjaberi,bebis)@cse.unr.edu

More information

Pictures at an Exhibition

Pictures at an Exhibition Pictures at an Exhibition Han-I Su Department of Electrical Engineering Stanford University, CA, 94305 Abstract We employ an image identification algorithm for interactive museum guide with pictures taken

More information

Detecting Digital Image Forgeries By Multi-illuminant Estimators

Detecting Digital Image Forgeries By Multi-illuminant Estimators Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Copy-Move Forgery Detection Scheme using SURF Algorithm

Copy-Move Forgery Detection Scheme using SURF Algorithm Copy-Move Forgery Detection Scheme using SURF Algorithm Ezhilvallarasi V. 1, Gayathri A. 2 and Dharani Devi P. 3 1 Student, Dept of ECE, IFET College of Engineering, Villupuram 2 Student, Dept of ECE,

More information

Fingerprint Ridge Distance Estimation: Algorithms and the Performance*

Fingerprint Ridge Distance Estimation: Algorithms and the Performance* Fingerprint Ridge Distance Estimation: Algorithms and the Performance* Xiaosi Zhan, Zhaocai Sun, Yilong Yin, and Yayun Chu Computer Department, Fuyan Normal College, 3603, Fuyang, China xiaoszhan@63.net,

More information

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Zhiyan Zhang 1, Wei Qian 1, Lei Pan 1 & Yanjun Li 1 1 University of Shanghai for Science and Technology, China

More information

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive PEARSON Prentice Hall Pearson Education International Contents Preface xv Acknowledgments

More information

A Novel Extreme Point Selection Algorithm in SIFT

A Novel Extreme Point Selection Algorithm in SIFT A Novel Extreme Point Selection Algorithm in SIFT Ding Zuchun School of Electronic and Communication, South China University of Technolog Guangzhou, China zucding@gmail.com Abstract. This paper proposes

More information

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,

More information

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN

OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN P.Vickram, Dr. A. Sri Krishna and D.Swapna Department of Computer Science & Engineering, R.V. R & J.C College of Engineering, Guntur ABSTRACT

More information

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform A Robust Hybrid Blind Digital Image System Using Discrete Wavelet Transform and Contourlet Transform Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy Abstract In this paper, a hybrid blind digital

More information

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Feature-Guided K-Means Algorithm for Optimal Image Vector

More information

Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation

Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation D. Maheswari 1, Dr. V.Radha 2 1 Department of Computer Science, Avinashilingam Deemed University for Women,

More information

The Elimination Eyelash Iris Recognition Based on Local Median Frequency Gabor Filters

The Elimination Eyelash Iris Recognition Based on Local Median Frequency Gabor Filters Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 3, May 2015 The Elimination Eyelash Iris Recognition Based on Local Median

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

Training-Free, Generic Object Detection Using Locally Adaptive Regression Kernels

Training-Free, Generic Object Detection Using Locally Adaptive Regression Kernels Training-Free, Generic Object Detection Using Locally Adaptive Regression Kernels IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIENCE, VOL.32, NO.9, SEPTEMBER 2010 Hae Jong Seo, Student Member,

More information

Learning based face hallucination techniques: A survey

Learning based face hallucination techniques: A survey Vol. 3 (2014-15) pp. 37-45. : A survey Premitha Premnath K Department of Computer Science & Engineering Vidya Academy of Science & Technology Thrissur - 680501, Kerala, India (email: premithakpnath@gmail.com)

More information

Structure-adaptive Image Denoising with 3D Collaborative Filtering

Structure-adaptive Image Denoising with 3D Collaborative Filtering , pp.42-47 http://dx.doi.org/10.14257/astl.2015.80.09 Structure-adaptive Image Denoising with 3D Collaborative Filtering Xuemei Wang 1, Dengyin Zhang 2, Min Zhu 2,3, Yingtian Ji 2, Jin Wang 4 1 College

More information

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels International Journal of Computer Science & Communication Vol., No. 2, July-December 200, pp. 35-356 Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels Kirti Arora Jasuja & Baljit

More information

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto

More information

The Afresh Transform Algorithm Based on Limited Histogram Equalization of Low Frequency DCT Coefficients

The Afresh Transform Algorithm Based on Limited Histogram Equalization of Low Frequency DCT Coefficients Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 623-630 623 Open Access The Afresh Transform Algorithm Based on Limited Histogram Equalization

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Rotation Invariant Finger Vein Recognition *

Rotation Invariant Finger Vein Recognition * Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,

More information

A Robust Image Watermarking Scheme using Image Moment Normalization

A Robust Image Watermarking Scheme using Image Moment Normalization A Robust Image ing Scheme using Image Moment Normalization Latha Parameswaran, and K. Anbumani Abstract Multimedia security is an incredibly significant area of concern. A number of papers on robust digital

More information

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch

More information

Image Copy Move Forgery Detection using Block Representing Method

Image Copy Move Forgery Detection using Block Representing Method Image Copy Move Forgery Detection using Block Representing Method Rohini.A.Maind, Alka Khade, D.K.Chitre Abstract- As one of the most successful applications of image analysis and understanding, digital

More information

Combining cellular automata and local binary patterns for copy-move forgery detection. Dijana Tralic, Sonja Grgic, Xianfang Sun & Paul L.

Combining cellular automata and local binary patterns for copy-move forgery detection. Dijana Tralic, Sonja Grgic, Xianfang Sun & Paul L. Combining cellular automata and local binary patterns for copy-move forgery detection Dijana Tralic, Sonja Grgic, Xianfang Sun Paul L. Rosin Multimedia Tools and Applications An International Journal ISSN

More information

Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding

Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria 2 Department

More information

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY Journal of Theoretical Applied nformation Technology 31 August 2012 Vol 42 No2 2005-2012 JATT & LLS All rights reserved SSN: 1992-8645 wwwjatitorg E-SSN: 1817-3195 A SEM-FRAGLE WATERMARNG SCHEME FOR MAGE

More information

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs Volume 73 No.6, July 2013 Performance Analysis of Discrete Wavelet Transform based Audio ing on Indian Classical Songs C. M. Juli Janardhanan Department of ECE Government Engineering College, Wayanad Mananthavady,

More information

An Adaptive Histogram Equalization Algorithm on the Image Gray Level Mapping *

An Adaptive Histogram Equalization Algorithm on the Image Gray Level Mapping * Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 601 608 2012 International Conference on Solid State Devices and Materials Science An Adaptive Histogram Equalization Algorithm on

More information

Algorithm for the Digital Forgery Catching Technique for Image Processing Application

Algorithm for the Digital Forgery Catching Technique for Image Processing Application Algorithm for the Digital Forgery Catching Technique for Image Processing Application Manish Jain 1, Vinod Rampure 2 ¹Department of Computer Science and Engineering, Modern Institute of Technology and

More information

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc 0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc

More information