Contrast Enhancement- Based Image Forgery Detection
|
|
- Howard Johnston
- 5 years ago
- Views:
Transcription
1 Contrast Enhancement- Based Image Forgery Detection Anju s Prasad 1, S. Antony Mutharasan 2 1 (CSE,Anna University,Tirunelveli,India,anjusp12@gmail.com) 2 ( CSE,Anna University,Tirunelveli,India,soby5882@gmail.com) Abstract With the rapid development of digital media editing techniques, digital image manipulation becomes rather convenient and easy. With the increasing applications of digital imaging, different types of software tools are introduced for image processing. They are used to combine two images to make it look real or objects can be added or deleted. The manipulation techniques include deletion of details, insertion of details, combining multiple images and false captioning. Detecting these image manipulations has become an important problem. To avoid these problems SVM classifier is proposed which have similar functional form to neural networks. Image, texture and pixel value based features are extracted and analyzed from the images. Then hash values are calculated for these features. The process consists of two phases which are training phase and a testing phase. SVM classifier is trained with a set of images and used to classify the images as genuine or forged. SVM supports both regression and classification tasks and can handle multiple continuous and categorical variables. This method reduces the time and computational complexity. Keywords SVM, digital forensics, image forgery, contrast enhancement, composite image 1.INTRODUCTION With the rapid development of digital media editing techniques, digital image manipulation becomes rather convenient and easy. While it benefits to legal image processing, malicious users might use such innocent manipulations to tamper digital photograph images. Currently, image forgeries are widespread on the Internet and other security related applications such as surveillance and recognition that utilize images are therefore impacted. The event and scene information delivered in images might become no longer believable. In the applications such as law enforcement and news recording, it is also necessary to verify the originality and authenticity of digital images, and make clear the image manipulation history to get more information. To circumvent such a problem, digital forensic techniques have been proposed to blindly verify the integrity and authenticity of digital images. A set of previous works deal with image manipulation detection by classifier-based approaches. Three categories of statistical features including binary similarity, image quality and wavelet statistics were developed. Swamina than proposed to estimate both in-camera and post-camera operation fingerprints for verifying the integrity of photographs. Cao designed a new ensemble manipulation detector to simultaneously detect a wide range of manipulation types on local image patches. Fan et al. proposed to correlate statistical noise features with exchangeable image file format header features for manipulation detection. Although such techniques could detect if manipulation occurred, they fail to determine which specific type of manipulation was enforced. There also exist another category of forensic techniques which focus on detecting specific image manipulations. Since each manipulation typically leaves behind unique fingerprints on images, it is feasible to design individual tests to identify each type of enforced manipulation. The manipulation-specific detection techniques can help recover the image processing history. The prior works focus on detecting different types of alterations, which can be broadly divided into two categories: 1) non-content-changing operations including resampling, compression, sharpening filtering, contrast enhancement and median filtering; 2) content-changing operations, i.e., splicing and composition.note that the prior contrast enhancement forensic algorithms work well under the assumption that the gray level histogram of an unaltered image exhibits a smooth contour. However, digital images are often stored in the JPEG format and even heavily compressed with a middle/low quality factor (Q) in real applications, such as the Internet and mobile phones. It is well-known that the low quality JPEG compression usually generates blocking artifacts, which might cause un smoothness and even locally dense peak bins in the gray level histogram. In such a scenario, the existing approaches fail to detect contrast enhancement in the previously low quality JPEG-compressed images, since the assumption of smoothness becomes dissatisfied. To solve such a problem, we propose to detect the global contrast enhancement not only in uncompressed or high quality JPEG-compressed images, but also in low quality ones. The main strategy relies on the blind identification of zero-height gap bins. Besides global contrast enhancement, the detection of local contrast enhancement is also significant. A valuable application is to identify the cut-and-paste type of forgery images, in which the contrast of one source object region is enhanced to match the rest. Although the composite image created by enhancing single source region could be identified, those enhanced in both source regions may not. In this paper, a new method is proposed to identify both single source enhanced and both source enhanced composite images. Peak/gap pattern of the pixel value mapping applied to each source region is self-learned from the detected block wise peak/gap positions. Then composition boundary is located by detecting the inconsistency between the position vectors in different regions. An SVM is one of many algorithms for supervised learning. Generally, an SVM is a linear classification algorithm that ensures us that the distance between the decision line (discriminator) and the closest example in the training set is maximized. Support Vector Machines are based on the concept of decision planes that define decision Volume: 02 Issue:
2 boundaries. A decision plane is one that separates between a set of objects having different class memberships. A schematic example is shown in the illustration below. In this example, the objects belong either to class GREEN or RED. The separating line defines a boundary on the right side of which all objects are GREEN and to the left of which all objects are RED. Any new object (white circle) falling to the right is labeled, i.e., classified, as GREEN Figure 1.1 Support Vector Machine The above is a classic example of a linear classifier, i.e., a classifier that separates a set of objects into their respective groups (GREEN and RED in this case) with a line. Most classification tasks, however, are not that simple, and often more complex structures are needed in order to make an optimal separation, i.e., correctly classify new objects (test cases) on the basis of the examples that are available (train cases). This situation is depicted in the illustration below. Compared to the previous schematic, it is clear that a full separation of the GREEN and RED objects would require a curve (which is more complex than a line). Classification tasks based on drawing separating lines to distinguish between objects of different class memberships are known as hyper plane classifiers. Support Vector Machines are particularly suited to handle such tasks. 2.PREVIOUS WORKS Digital Photo images are everywhere, on the covers of magazines, in newspapers, in courtrooms, and all over the Internet. Expose to throughout the day and most of the time. Which images can be easily manipulate, need to be aware that seeing does not always simply believing. Then propose methodologies to identify such unbelievable photo images and succeeded to identify forged region by given only the forged image. Formats are additive tag for every file system and contents are relatively expressed with extension based on most popular digital camera uses JPEG and other image formats. Design algorithm running behind with the concept of abnormal anomalies and identify the forgery regions. Image forgeries are widespread on the Internet and other security-related application such as surveillance and recognition that utilize images are therefore impacted. The event and scene information delivered in images might become no longer believable. In the applications such as law enforcement and news recording, it is also necessary to verify the originality and authenticity of digital images, and make clear the image manipulation history to get more information. To circumvent such a problem, digital forensic techniques have been proposed to blindly verify the integrity and authenticity of digital images. A set of previous works deal with mainly five categories: pixel-based techniques detect statistical anomalies introduced at the pixel level format-based techniques leverage the statistical correlations introduced by a specific lossy compression scheme camera-based techniques exploit artifacts introduced by the camera lens, sensor or onchip post-processing physically-based techniques explicitly model and detect anomalies in the three dimensional interaction between physical objects, light, and the camera Geometric based techniques make measurements of objects in the world and their positions relative to the camera. 2.1 Contrast Enhancement Detection Algorithm Based on the above analyses, propose the contrast enhancement detection algorithm as follows. 1) Get the image s normalized gray level histogram h (x). 2) Detect the bin at k as a zero-height gap bin if it satisfies: h(kk) = 0 min{h(kk 1), h(kk + 1)} > ττ 1 kk+ωω1 xx=kk ωω1 h(xx) > ττ 2ωω1+1 (2.1) Here, the first sub-equation assures that the current bin is null. To define a gap bin, the second sub-equation keeps two neighboring bins larger than the threshold τ, as shown. To exclude the zero-height gap bins which may be incorrectly detected in histogram trail-ends, the average of neighboring (2w1 + 1) bins should be larger than τ, as constrained by the third sub-equation. Experiments show that w1 = 3andτ = are appropriate. Note that focus on the detection of isolated zero-height gap bins but not connected bins, which are rarely present in the middle of histograms. 3) Count the number of detected zero-height gap bins, denoted by N g. If it is larger than the decision threshold, contrast enhancement is detected, else not. 3 SYSTEM ARCHITECTURE A novel algorithm is proposed to identify the sourceenhanced composite image created by enforcing contrast adjustment on either single or both source regions. The outline of technique is shown in Figure 3.1. Since positional distribution of the peak/gap bins incurred by contrast enhancement is unique to the involved pixel value mapping, such positional information could serve as fingerprinting feature for identifying different contrast enhancement manipulations. SVM classifier has similar functional form to neural networks. Image, texture and pixel value based features are extracted and analyzed from the images. Then hash values are calculated for these features. The process consists of two phases which are training phase and a testing phase. SVM classifier is trained with a set of images and used to classify the images as genuine or forged. SVM supports both regression and classification tasks Consistency Volume: 02 Issue:
3 Read input image between the peak/gap artifacts detected in different regions is checked for discovering composite images Block wise Peak/Gap Bins Location Normalized To locate composition, the test image is first divided into nonoverlapping blocks. For the i -th block, peak/gap bins in its gray level histogram are located as follows. Here and below, i = 1, 2,, Nb, where Nb is the number of divided blocks. Gap Gap Bins Location: The zero-height gap bins are detected.the position of detected gap bins is labelled as Vig= [Vig(0), Vig(1),, Vig(k),, V ig (255)] (3.1) Where Vig(k) = 1, if the bin at k is a gap; Vig(k) = 0, otherwise. Contrast Enhanced n Forgery image y Normal Peak Bins Location: Peak bins which behave as impulse noise can be located by median filtering. Specifically, the gap bins are first filled with the average of neighboring bins, and then median filtering is applied to the gap-filled histogram. The filtered histogram possesses a smooth contour. Lastly, peak positions are located by thresholding the difference between the gap-filled histogram and its filtered version. The histogram differences for the enhanced. Record the detected peak positions Vip= [Vip(0), Vip(1),, Vip(k),, Vip(255) (3.2 Where Vip(k) =1 refers to a peak Similarity Measure using reference vectors Block wise Gap & Peak Gap &Peak Similarity SVM Classifier To discriminate two source regions, first set a reference position vector for either one. Then each block can be classified by the similarity between its position vector and the reference one. It is reasonable to deem that the blocks with approximate similarity comes from the same source image. The reference position vector should not be selected from splicing boundary fortunately; the block with the largest number of zero-height gap bins is believed to locate within one source region. In boundary blocks, the interaction between the pixels from different source regions makes the number of zero height bins decrease. As a result, the reference gap position vector for its located source region. To measure the overall similarity between the gap position vectors, each gap involved pair should be investigated firstly. Since the histogram at the gray levels out of EDR does not deliver any effective peak/gap information left by contrast enhancement, the element pairs in the intersection of two EDRs are used to measure the similarity. As there exist three possible correspondences for a gap-involved pair. The ratio between the number of matched pairs and that of total gapinvolved pairs is defined as the similarity applied to the image region out of the reference block. Detect Tampering Region Performance analysis The narrow histogram without gap bins might carry with peak bins. As such the peak bins should also be exploited to identify mappings. The reference peak position vector is created by combining the peak position vectors which are more possible from the source region of gap vector. Such creation of position vector is reliable since the collected peak information is relatively accurate. Volume: 02 Issue:
4 3.3.3 Svm Classifier Support vector machines (SVMs) are a set of related supervised learning methods that analyze data and recognize patterns, used for classification and analysis. The standard SVM takes a set of input data and predicts, for each given input, which of two possible classes the input is a member of, which makes the SVM a non-probabilistic binary linear classifier. Since an SVM is a classifier, then given a set of training examples, each marked as belonging to one of two categories, an SVM training algorithm builds a model that predicts whether a new example falls into one category or the other. Intuitively, an SVM model is a representation of the examples as points in space, mapped so that the examples of the separate categories are divided by a clear gap that is as wide as possible. New examples are then mapped into that same space and predicted to belong to a category based on which side of the gap they fall on. A support vector machine constructs a hyper plane or set of hyper planes in a high or infinite dimensional space, which can be used for classification, regression, or other tasks. Intuitively, a good separation is achieved by the hyper plane that has the largest distance to the nearest training data points of any class (socalled functional margin), since in general the larger the margin the lower the generalization error of the classifier. Whereas the original problem may be stated in a finite dimensional space, it often happens that in that space the sets to be discriminated are not linearly separable. For this reason it was proposed that the original finite dimensional space be mapped into a much higher dimensional space, presumably making the separation easier in that space. SVM schemes use a mapping into a larger space so that cross products may be computed easily in terms of the variables in the original space, making the computational load reasonable. The cross products in the larger space are defined in terms of a kernel function K(x,y) selected to suit the problem. The hyper planes in the large space are defined as the set of points whose cross product with a vector in that space is constant. The vectors defining the hyper planes can be chosen to be linear combinations with parameters α i of images of feature vectors that occur in the data base. 4 MODULE DESCRIPITION 1. Contrast Enhancement Detection 2. Peak/Gap bins detection 3. Peak/Gap similarity Measure 4. SVM Composite Detection 5. Performance Analysis 1. Contrast enhancement detection 1) Get the image s normalized gray level histogram h (x). 2) Detect the bin at k as a zero-height gap bin if it satisfies: h(kk) = 0 min{h(kk 1), h(kk + 1)} > ττ (4.1) 1 kk+ωω1 h(xx) > ττ 2ωω1+1 xx=kk ωω1 Here, the first sub-equation assures that the current bin is null. To define a gap bin, the second sub-equation keeps two neighboring bins larger than the threshold τ. To exclude the zero-height gap bins which may be incorrectly detected in histogram trail-ends, the average of neighboring (2w1 + 1) bins should be larger than τ, as constrained by the third subequation. 3) Count the number of detected zero-height gap bins, denoted by N g. If it is larger than the decision threshold, contrast enhancement is detected, else not. 2. Peak/gap bins detection The test image is first divided into no overlapping blocks. For the i -th block, peak/gap bins in its gray level histogram are located. Here, i = 1, 2,, N b, where N b is the number of divided blocks. The position of detected gap bins is labelled as VV ii gg = [VV ii gg (0), VV ii gg (1)., VV ii gg (kk),., VV ii gg (255) if VV ii gg (kk) = 1 the bin at k is a gap, VV ii gg (kk) = 0 otherwise. The gap bins are first filled with the average of neighboring bins, then median filtering is applied to the gap-filled histogram. Lastly, peak positions are located by thresholding the difference between the gap-filled histogram and its filtered version. The detected peak positions as V i p=[ V i p (0), V i p (1),, V i p (k),. V i p (255)]. To further decrease detection errors, the extracted peak/ gap positions are corrected by retaining the co-existing peak/ gap positions in most blocks. Specifically, apply a threshold-based binarization to Cg NN = bb ii ii=1 VV gg /NN bb. The detected co-existing gap positions are recorded as V g =[V g ( 0 ), V g ( 1 ),, V g ( k ),, V g (255)], where V g ( k ) = 1, if C g ( k ) is larger than the threshold; V g ( k ) = 0, otherwise. To eliminate the gap bins which might not be caused by contrast enhancement, the corrected gap position vector, V i gc, is generated Hadamard product, Similarly, the corrected peak position vectorv i pc can also be obtained. 3. Peak/gap similarity measure To discriminate two source regions, first set a reference position vector for either one. Then each block can be classified by the similarity between its position vector and the reference one. To measure the overall similarity between the gap position vectors V i gc and V gr, each gap-involved pair V i gc ( k ) and V gr ( k ) should be investigated firstly. Here, the element pairs in the intersection of two EDRs are used to measure the similarity. There exist three possible correspondences for a gap-involved pair. The reference peak position vector V pr is created by combining the peak position vectors which are more possible from the source region of V pr, namely S 1.Such creation of V pr is reliable since the collected peak information is relatively accurate. The similarity between V i pc and V pr, marked as m i p, is defined in the same form by replacing the gap variables with the corresponding peak ones. If no peak-involved pair exists in EDR intersection, mark m i p = SVM Composite detection Extract each block gap similarity & peak similarity based on ground truth image, train the SVM network. Here design the two class svm classifier,composite versus normal. In training update the weight value of svm. g(x)=w^tx+w0 (4.2) Volume: 02 Issue:
5 where w^t,w0 are the weight values, x is the input. After training predict the output class table based on each block features. 5. Performance analyses In performance analysis, the effectiveness and efficacy of the proposed techniques is compared with the existing techniques. 5.CONCLUSIONS In this paper, propose SVM classifier which has similar functional form to neural networks. Image, texture and pixel value based features are extracted and analyzed from the images. Then hash values are calculated for these features. The process consists of two phases which are training phase and a testing phase. SVM classifier is trained with a set of images and used to classify the images as genuine or forged. SVM supports both regression and classification tasks and can handle multiple continuous and categorical variables. The composition boundary was accurately located by detecting the inconsistency between detected block wise peak/gap positional distributions. In the proposed method reduces the time and computational complexity. As future work to this project, apply an optimal thresholding technique to improve the Detection accuracy which is low due to fixed threshold and also highly noise sensitive for real time applications. REFERENCES 1. T. Arici, S. Dikbas, and Y. Altunbasak, A histogram modification framework and its application for image contrast enhancement, IEEE Trans. Image Process., vol. 18, no. 9, pp , Sep M. Barni, M. Fontani, and B. Tondi, A universal technique to hide traces of histogram-based image manipulations, in Proc. ACM Multimedia Security Workshop, Coventry, England, 2012, pp S. Battiato, A. Bosco, A. Castorina, and G. Messina, Automatic image enhancement by content dependent exposure correction, EURASIP J. Appl. Signal Process., vol. 12, pp , Jan S. Bayram, I. Avcubas, B. Sankur, and N. Memon, Image manipulation detection, J. Electron. Imag., vol. 15, no. 4, pp , T. Bianchi and A. Piva, Detection of non-aligned double JPEG compression based on integer periodicity maps, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp , Apr H. Cao and A. C. Kot, Manipulation detection on image patches using FusionBoost, IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp , Jun G. Cao, Y. Zhao, R. Ni, and A. C. Kot, Unsharp masking sharpening detection via overshoot artifacts analysis, IEEE Signal Process. Lett., vol. 18, no. 10, pp , Oct G. Cao, Y. Zhao, and R. Ni, Forensic estimation of gamma correction in digital images, in Proc. 17th IEEE Int. Conf. Image Process., Hong Kong, 2010, pp C. Chen, J. Ni, and J. Huang, Blind detection of median filtering in digital images: A difference domain based approach, IEEE Trans. Image Process., vol. 22, no. 12, pp , Dec J. Fan, H. Cao, and A. C. Kot, Estimating EXIF parameters based on noise features for image manipulation detection, IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp , Apr H. Farid, Image forgery detection, IEEE Signal Process. Mag., vol. 26, no. 2, pp , Mar P. Ferrara, T. Bianchiy, A. De Rosaz, and A. Piva, Reverse engineering of double compressed images in the presence of contrast enhancement, in Proc. IEEE Workshop Multimedia Signal Process., Pula, Croatia, Sep./Oct. 2013, pp S.-C. Huang, F.-C. Cheng, and Y.-S. Chiu, Efficient contrast enhancement using adaptive gamma correction with weighting distribution, IEEE Trans. Image Process., vol. 22, no. 3, pp , Mar M. Kirchner and J. Fridrich, On detection of median filtering in digital images, in Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, San Jose, CA, USA, Jan. 2010, pp D. Mahajan, R. Ramamoorthi, and B. Curless, A theory of frequency domain invariants: Spherical harmonic identities for BRDF/lighting transfer and image consistency, IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 2, pp , Feb B. Mahdian and S. Saic, A bibliography on blind methods for identifying image forgery, Image Commun., vol. 25, no. 6, pp , Jul W. B. Pennebaker and J. L. Mitchell, JPEG Still Image Data Compression Standard. New York, NY, USA: Van Nostrand, C. Popescu and H. Farid, Exposing digital forgeries by detecting traces of resampling, IEEE Trans. Signal Process., vol. 53, no. 2, pp , Feb Volume: 02 Issue:
WITH THE rapid development of digital media editing
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 2014 515 Contrast Enhancement-Based Forensics in Digital Images Gang Cao, Yao Zhao, Senior Member, IEEE, Rongrong Ni, Member,
More informationDigital Image Forgery Detection Based on GLCM and HOG Features
Digital Image Forgery Detection Based on GLCM and HOG Features Liya Baby 1, Ann Jose 2 Department of Electronics and Communication, Ilahia College of Engineering and Technology, Muvattupuzha, Ernakulam,
More informationDYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION
DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of
More informationFORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES. Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian
FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian Institute of Information Science, Beijing Jiaotong University, Beijing, 44, China {6256, yzhao,
More informationIMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur
IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important
More informationIMAGE COMPRESSION USING ANTI-FORENSICS METHOD
IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu
More informationHIDING TRACES OF MEDIAN FILTERING IN DIGITAL IMAGES. M. Fontani, M. Barni
HIDING TRACES OF MEDIAN FILTERING IN DIGITAL IMAGES M. Fontani, M. Barni Dept. of Information Engineering - University of Siena via Roma 56, Siena (IT) ABSTRACT Detection of median filtering is an important
More informationDetecting Digital Image Forgeries By Multi-illuminant Estimators
Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID
More informationForensic analysis of JPEG image compression
Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic
More informationI. INTRODUCTION. Figure-1 Basic block of text analysis
ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com Detection and Localization of Texts from Natural Scene Images: A Hybrid Approach Priyanka Muchhadiya Post Graduate Fellow,
More informationDetection of Digital Image Splicing Using Luminance
Detection of Digital Image Splicing Using Luminance P.Sabeena Burvin, II M.Tech(IT), Department of IT, Francis Xavier Engineering College,Tirunelveli. Mail Id: sabu.nce@gmail.com J.Monica Esther, Asst
More informationImproved LBP and K-Nearest Neighbors Algorithm
Image-Splicing Forgery Detection Based On Improved LBP and K-Nearest Neighbors Algorithm Fahime Hakimi, Department of Electrical and Computer engineering. Zanjan branch, Islamic Azad University. Zanjan,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationIMAGE and video editing has become increasingly easy
IEEE SIGNAL PROCESSING LETTERS, VOL. XX, NO. Y, MONTH YEAR 1 ACE - An Effective Anti-forensic Contrast Enhancement Technique Hareesh Ravi, Member, IEEE, A V Subramanyam, Member, IEEE, and Sabu Emmanuel,
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationImproving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery
Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery Maryam Jaberi, George Bebis Computer Science and Eng. Dept. University of Nevada, Reno Reno, USA (mjaberi,bebis)@cse.unr.edu
More informationIMAGE and video editing has become increasingly easy and
IEEE SIGNAL PROCESSING LETTERS, VOL. XX, NO. Y, MONTH YEAR 1 ACE - An Effective Anti-forensic Contrast Enhancement Technique Hareesh Ravi, Member, IEEE, A V Subramanyam, Member, IEEE, and Sabu Emmanuel,
More informationDeliverable D6.3 Release of publicly available datasets and software tools
Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents
More informationThe Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge
WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:
More informationAdvanced Digital Image Forgery Detection by Using SIFT
RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering
More informationCombined Hashing/Watermarking Method for Image Authentication
Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationRecognition of Gurmukhi Text from Sign Board Images Captured from Mobile Camera
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1839-1845 International Research Publications House http://www. irphouse.com Recognition of
More informationReverse engineering of double compressed images in the presence of contrast enhancement
Reverse engineering of double compressed images in the presence of contrast enhancement P. Ferrara #, T. Bianchi, A. De Rosa, A. Piva # National Institute of Optics (INO), Firenze, Italy pasquale.ferrara@ino.it
More informationScene Text Detection Using Machine Learning Classifiers
601 Scene Text Detection Using Machine Learning Classifiers Nafla C.N. 1, Sneha K. 2, Divya K.P. 3 1 (Department of CSE, RCET, Akkikkvu, Thrissur) 2 (Department of CSE, RCET, Akkikkvu, Thrissur) 3 (Department
More informationClassifying Images with Visual/Textual Cues. By Steven Kappes and Yan Cao
Classifying Images with Visual/Textual Cues By Steven Kappes and Yan Cao Motivation Image search Building large sets of classified images Robotics Background Object recognition is unsolved Deformable shaped
More informationAutomatic Image Forgery Exposure using Illuminant Measure of Face Region and Random Object Detection Method
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 2 Ver. I (Mar Apr. 2014), PP 47-52 Automatic Image Forgery Exposure using Illuminant
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni
More informationA Key-Point Based Robust Algorithm for Detecting Cloning Forgery
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Mariam
More informationFace Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN
2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationCLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS
CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS B.Vanajakshi Department of Electronics & Communications Engg. Assoc.prof. Sri Viveka Institute of Technology Vijayawada, India E-mail:
More informationContent Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features
Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features 1 Kum Sharanamma, 2 Krishnapriya Sharma 1,2 SIR MVIT Abstract- To describe the image features the Local binary pattern (LBP)
More informationA Robust Wipe Detection Algorithm
A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,
More informationSpam Filtering Using Visual Features
Spam Filtering Using Visual Features Sirnam Swetha Computer Science Engineering sirnam.swetha@research.iiit.ac.in Sharvani Chandu Electronics and Communication Engineering sharvani.chandu@students.iiit.ac.in
More informationLight Field Occlusion Removal
Light Field Occlusion Removal Shannon Kao Stanford University kaos@stanford.edu Figure 1: Occlusion removal pipeline. The input image (left) is part of a focal stack representing a light field. Each image
More informationCOSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor
COSC160: Detection and Classification Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Problem I. Strategies II. Features for training III. Using spatial information? IV. Reducing dimensionality
More informationImage retrieval based on bag of images
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Image retrieval based on bag of images Jun Zhang University of Wollongong
More informationCOPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University
2011 Eighth International Conference Computer Graphics, Imaging and Visualization COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM Najah Muhammad 1, Muhammad Hussain 2, Ghulam Muhammad 2, and
More informationRobust Image Watermarking based on DCT-DWT- SVD Method
Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationAN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH
AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH Sai Tejaswi Dasari #1 and G K Kishore Babu *2 # Student,Cse, CIET, Lam,Guntur, India * Assistant Professort,Cse, CIET, Lam,Guntur, India Abstract-
More informationColor Local Texture Features Based Face Recognition
Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India
More informationMulti-scale Techniques for Document Page Segmentation
Multi-scale Techniques for Document Page Segmentation Zhixin Shi and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR), State University of New York at Buffalo, Amherst
More informationBiometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)
Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html
More informationCIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS
CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS Setiawan Hadi Mathematics Department, Universitas Padjadjaran e-mail : shadi@unpad.ac.id Abstract Geometric patterns generated by superimposing
More informationMotivation. Gray Levels
Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding
More informationTotal Variation Based Forensics for JPEG Compression
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 6, September 2014, PP 8-13 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Total Variation Based Forensics
More informationCombined Fingerprint Minutiae Template Generation
Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of
More informationBus Detection and recognition for visually impaired people
Bus Detection and recognition for visually impaired people Hangrong Pan, Chucai Yi, and Yingli Tian The City College of New York The Graduate Center The City University of New York MAP4VIP Outline Motivation
More informationWITH the ease of digital image manipulation, like
816 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 4, DECEMBER 2010 Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection Yu-Feng Hsu and Shih-Fu
More informationMotivation. Intensity Levels
Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding
More informationClassification Algorithms in Data Mining
August 9th, 2016 Suhas Mallesh Yash Thakkar Ashok Choudhary CIS660 Data Mining and Big Data Processing -Dr. Sunnie S. Chung Classification Algorithms in Data Mining Deciding on the classification algorithms
More informationNTHU Rain Removal Project
People NTHU Rain Removal Project Networked Video Lab, National Tsing Hua University, Hsinchu, Taiwan Li-Wei Kang, Institute of Information Science, Academia Sinica, Taipei, Taiwan Chia-Wen Lin *, Department
More informationAn Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection
An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection Nivi Varghese 1, Charlse M Varghese 2 1, 2 Department of Computer Science and Engineering, KMP College of Engineering,
More informationA Survey on Face-Sketch Matching Techniques
A Survey on Face-Sketch Matching Techniques Reshma C Mohan 1, M. Jayamohan 2, Arya Raj S 3 1 Department of Computer Science, SBCEW 2 Department of Computer Science, College of Applied Science 3 Department
More informationCS 223B Computer Vision Problem Set 3
CS 223B Computer Vision Problem Set 3 Due: Feb. 22 nd, 2011 1 Probabilistic Recursion for Tracking In this problem you will derive a method for tracking a point of interest through a sequence of images.
More informationRESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE
RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE K. Kaviya Selvi 1 and R. S. Sabeenian 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College
More informationFingerprint Classification Using Orientation Field Flow Curves
Fingerprint Classification Using Orientation Field Flow Curves Sarat C. Dass Michigan State University sdass@msu.edu Anil K. Jain Michigan State University ain@msu.edu Abstract Manual fingerprint classification
More informationDigital Image Forgery detection using color Illumination and Decision Tree Classification
RESEARCH ARTICLE OPEN ACCESS Digital Image Forgery detection using color Illumination and Decision Tree Classification Chitra Ganesan, V.R. Bhuma Chitra Ganesan, the author is currently pursuing M.E (Software
More informationEnhancing DubaiSat-1 Satellite Imagery Using a Single Image Super-Resolution
Enhancing DubaiSat-1 Satellite Imagery Using a Single Image Super-Resolution Saeed AL-Mansoori 1 and Alavi Kunhu 2 1 Associate Image Processing Engineer, SIPAD Image Enhancement Section Emirates Institution
More informationRobot Learning. There are generally three types of robot learning: Learning from data. Learning by demonstration. Reinforcement learning
Robot Learning 1 General Pipeline 1. Data acquisition (e.g., from 3D sensors) 2. Feature extraction and representation construction 3. Robot learning: e.g., classification (recognition) or clustering (knowledge
More informationCopy-Move Forgery Detection using DCT and SIFT
Copy-Move Forgery Detection using DCT and SIFT Amanpreet Kaur Department of Computer Science and Engineering, Lovely Professional University, Punjab, India. Richa Sharma Department of Computer Science
More informationSCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER
SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER P.Radhabai Mrs.M.Priya Packialatha Dr.G.Geetha PG Student Assistant Professor Professor Dept of Computer Science and Engg Dept
More informationAn Approach for Reduction of Rain Streaks from a Single Image
An Approach for Reduction of Rain Streaks from a Single Image Vijayakumar Majjagi 1, Netravati U M 2 1 4 th Semester, M. Tech, Digital Electronics, Department of Electronics and Communication G M Institute
More informationImage Classification based on Saliency Driven Nonlinear Diffusion and Multi-scale Information Fusion Ms. Swapna R. Kharche 1, Prof.B.K.
Image Classification based on Saliency Driven Nonlinear Diffusion and Multi-scale Information Fusion Ms. Swapna R. Kharche 1, Prof.B.K.Chaudhari 2 1M.E. student, Department of Computer Engg, VBKCOE, Malkapur
More informationCONTENT ADAPTIVE SCREEN IMAGE SCALING
CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationText Information Extraction And Analysis From Images Using Digital Image Processing Techniques
Text Information Extraction And Analysis From Images Using Digital Image Processing Techniques Partha Sarathi Giri Department of Electronics and Communication, M.E.M.S, Balasore, Odisha Abstract Text data
More informationDetection of Seam Carving and Localization of Seam Insertions in Digital Images
Detection of Seam Carving and Localization of Seam Insertions in Digital Images Anindya Sarkar, Lakshmanan Nataraj and B. S. Manjunath Vision Research Laboratory University of California, Santa Barbara
More informationSPECTRAL METHODS TO DETERMINE THE EXACT SCALING FACTOR OF RESAMPLED DIGITAL IMAGES
SPECTRAL METHODS TO DETERMINE THE EXACT SCALING FACTOR OF RESAMPLED DIGITAL IMAGES Stefan Pfennig TU Dresden, Faculty of Computer Science 162 Dresden, Germany stefan.pfennig@tu-dresden.de Matthias Kirchner
More information(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)
Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application
More informationDirection-Length Code (DLC) To Represent Binary Objects
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 29-35 www.iosrjournals.org Direction-Length Code (DLC) To Represent Binary
More informationUse of Local Minimization for Lossless Gray Image Compression
Narendra Kumar et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 Use of Local Minimization for Lossless Gray Image Compression Narendra Kumar 1, Dr. Sachin
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationAn Empirical Analysis of Communities in Real-World Networks
An Empirical Analysis of Communities in Real-World Networks Chuan Sheng Foo Computer Science Department Stanford University csfoo@cs.stanford.edu ABSTRACT Little work has been done on the characterization
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More informationScanner Parameter Estimation Using Bilevel Scans of Star Charts
ICDAR, Seattle WA September Scanner Parameter Estimation Using Bilevel Scans of Star Charts Elisa H. Barney Smith Electrical and Computer Engineering Department Boise State University, Boise, Idaho 8375
More informationRobot localization method based on visual features and their geometric relationship
, pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department
More informationMultiple-View Object Recognition in Band-Limited Distributed Camera Networks
in Band-Limited Distributed Camera Networks Allen Y. Yang, Subhransu Maji, Mario Christoudas, Kirak Hong, Posu Yan Trevor Darrell, Jitendra Malik, and Shankar Sastry Fusion, 2009 Classical Object Recognition
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationBabu Madhav Institute of Information Technology Years Integrated M.Sc.(IT)(Semester - 7)
5 Years Integrated M.Sc.(IT)(Semester - 7) 060010707 Digital Image Processing UNIT 1 Introduction to Image Processing Q: 1 Answer in short. 1. What is digital image? 1. Define pixel or picture element?
More informationA new approach to reference point location in fingerprint recognition
A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl
More informationA threshold decision of the object image by using the smart tag
A threshold decision of the object image by using the smart tag Chang-Jun Im, Jin-Young Kim, Kwan Young Joung, Ho-Gil Lee Sensing & Perception Research Group Korea Institute of Industrial Technology (
More informationFundamentals of Digital Image Processing
\L\.6 Gw.i Fundamentals of Digital Image Processing A Practical Approach with Examples in Matlab Chris Solomon School of Physical Sciences, University of Kent, Canterbury, UK Toby Breckon School of Engineering,
More informationData Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon
Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation
More informationA Robust Visual Identifier Using the Trace Transform
A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image
More informationSparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal
Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal Hadi. Zayyani, Seyyedmajid. Valliollahzadeh Sharif University of Technology zayyani000@yahoo.com, valliollahzadeh@yahoo.com
More informationData mining with Support Vector Machine
Data mining with Support Vector Machine Ms. Arti Patle IES, IPS Academy Indore (M.P.) artipatle@gmail.com Mr. Deepak Singh Chouhan IES, IPS Academy Indore (M.P.) deepak.schouhan@yahoo.com Abstract: Machine
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationA Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence
A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal
More informationTexture Segmentation by Windowed Projection
Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw
More informationRGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata
RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationSPATIAL DOMAIN QUANTIZATION NOISE BASED IMAGE FILTERING DETECTION
SPATIAL DOMAIN QUANTIZATION NOISE BASED IMAGE FILTERING DETECTION Hareesh Ravi, A.V. Subramanyam, Sabu Emmanuel Electronics and Communication Engineering, Indraprastha Institute of Information Technology,
More informationCountermeasure for the Protection of Face Recognition Systems Against Mask Attacks
Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr
More informationLearning to Recognize Faces in Realistic Conditions
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationFractional Discrimination for Texture Image Segmentation
Fractional Discrimination for Texture Image Segmentation Author You, Jia, Sattar, Abdul Published 1997 Conference Title IEEE 1997 International Conference on Image Processing, Proceedings of the DOI https://doi.org/10.1109/icip.1997.647743
More informationDigital Image Processing
Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive PEARSON Prentice Hall Pearson Education International Contents Preface xv Acknowledgments
More information