Contrast Enhancement- Based Image Forgery Detection

Size: px
Start display at page:

Download "Contrast Enhancement- Based Image Forgery Detection"

Transcription

1 Contrast Enhancement- Based Image Forgery Detection Anju s Prasad 1, S. Antony Mutharasan 2 1 (CSE,Anna University,Tirunelveli,India,anjusp12@gmail.com) 2 ( CSE,Anna University,Tirunelveli,India,soby5882@gmail.com) Abstract With the rapid development of digital media editing techniques, digital image manipulation becomes rather convenient and easy. With the increasing applications of digital imaging, different types of software tools are introduced for image processing. They are used to combine two images to make it look real or objects can be added or deleted. The manipulation techniques include deletion of details, insertion of details, combining multiple images and false captioning. Detecting these image manipulations has become an important problem. To avoid these problems SVM classifier is proposed which have similar functional form to neural networks. Image, texture and pixel value based features are extracted and analyzed from the images. Then hash values are calculated for these features. The process consists of two phases which are training phase and a testing phase. SVM classifier is trained with a set of images and used to classify the images as genuine or forged. SVM supports both regression and classification tasks and can handle multiple continuous and categorical variables. This method reduces the time and computational complexity. Keywords SVM, digital forensics, image forgery, contrast enhancement, composite image 1.INTRODUCTION With the rapid development of digital media editing techniques, digital image manipulation becomes rather convenient and easy. While it benefits to legal image processing, malicious users might use such innocent manipulations to tamper digital photograph images. Currently, image forgeries are widespread on the Internet and other security related applications such as surveillance and recognition that utilize images are therefore impacted. The event and scene information delivered in images might become no longer believable. In the applications such as law enforcement and news recording, it is also necessary to verify the originality and authenticity of digital images, and make clear the image manipulation history to get more information. To circumvent such a problem, digital forensic techniques have been proposed to blindly verify the integrity and authenticity of digital images. A set of previous works deal with image manipulation detection by classifier-based approaches. Three categories of statistical features including binary similarity, image quality and wavelet statistics were developed. Swamina than proposed to estimate both in-camera and post-camera operation fingerprints for verifying the integrity of photographs. Cao designed a new ensemble manipulation detector to simultaneously detect a wide range of manipulation types on local image patches. Fan et al. proposed to correlate statistical noise features with exchangeable image file format header features for manipulation detection. Although such techniques could detect if manipulation occurred, they fail to determine which specific type of manipulation was enforced. There also exist another category of forensic techniques which focus on detecting specific image manipulations. Since each manipulation typically leaves behind unique fingerprints on images, it is feasible to design individual tests to identify each type of enforced manipulation. The manipulation-specific detection techniques can help recover the image processing history. The prior works focus on detecting different types of alterations, which can be broadly divided into two categories: 1) non-content-changing operations including resampling, compression, sharpening filtering, contrast enhancement and median filtering; 2) content-changing operations, i.e., splicing and composition.note that the prior contrast enhancement forensic algorithms work well under the assumption that the gray level histogram of an unaltered image exhibits a smooth contour. However, digital images are often stored in the JPEG format and even heavily compressed with a middle/low quality factor (Q) in real applications, such as the Internet and mobile phones. It is well-known that the low quality JPEG compression usually generates blocking artifacts, which might cause un smoothness and even locally dense peak bins in the gray level histogram. In such a scenario, the existing approaches fail to detect contrast enhancement in the previously low quality JPEG-compressed images, since the assumption of smoothness becomes dissatisfied. To solve such a problem, we propose to detect the global contrast enhancement not only in uncompressed or high quality JPEG-compressed images, but also in low quality ones. The main strategy relies on the blind identification of zero-height gap bins. Besides global contrast enhancement, the detection of local contrast enhancement is also significant. A valuable application is to identify the cut-and-paste type of forgery images, in which the contrast of one source object region is enhanced to match the rest. Although the composite image created by enhancing single source region could be identified, those enhanced in both source regions may not. In this paper, a new method is proposed to identify both single source enhanced and both source enhanced composite images. Peak/gap pattern of the pixel value mapping applied to each source region is self-learned from the detected block wise peak/gap positions. Then composition boundary is located by detecting the inconsistency between the position vectors in different regions. An SVM is one of many algorithms for supervised learning. Generally, an SVM is a linear classification algorithm that ensures us that the distance between the decision line (discriminator) and the closest example in the training set is maximized. Support Vector Machines are based on the concept of decision planes that define decision Volume: 02 Issue:

2 boundaries. A decision plane is one that separates between a set of objects having different class memberships. A schematic example is shown in the illustration below. In this example, the objects belong either to class GREEN or RED. The separating line defines a boundary on the right side of which all objects are GREEN and to the left of which all objects are RED. Any new object (white circle) falling to the right is labeled, i.e., classified, as GREEN Figure 1.1 Support Vector Machine The above is a classic example of a linear classifier, i.e., a classifier that separates a set of objects into their respective groups (GREEN and RED in this case) with a line. Most classification tasks, however, are not that simple, and often more complex structures are needed in order to make an optimal separation, i.e., correctly classify new objects (test cases) on the basis of the examples that are available (train cases). This situation is depicted in the illustration below. Compared to the previous schematic, it is clear that a full separation of the GREEN and RED objects would require a curve (which is more complex than a line). Classification tasks based on drawing separating lines to distinguish between objects of different class memberships are known as hyper plane classifiers. Support Vector Machines are particularly suited to handle such tasks. 2.PREVIOUS WORKS Digital Photo images are everywhere, on the covers of magazines, in newspapers, in courtrooms, and all over the Internet. Expose to throughout the day and most of the time. Which images can be easily manipulate, need to be aware that seeing does not always simply believing. Then propose methodologies to identify such unbelievable photo images and succeeded to identify forged region by given only the forged image. Formats are additive tag for every file system and contents are relatively expressed with extension based on most popular digital camera uses JPEG and other image formats. Design algorithm running behind with the concept of abnormal anomalies and identify the forgery regions. Image forgeries are widespread on the Internet and other security-related application such as surveillance and recognition that utilize images are therefore impacted. The event and scene information delivered in images might become no longer believable. In the applications such as law enforcement and news recording, it is also necessary to verify the originality and authenticity of digital images, and make clear the image manipulation history to get more information. To circumvent such a problem, digital forensic techniques have been proposed to blindly verify the integrity and authenticity of digital images. A set of previous works deal with mainly five categories: pixel-based techniques detect statistical anomalies introduced at the pixel level format-based techniques leverage the statistical correlations introduced by a specific lossy compression scheme camera-based techniques exploit artifacts introduced by the camera lens, sensor or onchip post-processing physically-based techniques explicitly model and detect anomalies in the three dimensional interaction between physical objects, light, and the camera Geometric based techniques make measurements of objects in the world and their positions relative to the camera. 2.1 Contrast Enhancement Detection Algorithm Based on the above analyses, propose the contrast enhancement detection algorithm as follows. 1) Get the image s normalized gray level histogram h (x). 2) Detect the bin at k as a zero-height gap bin if it satisfies: h(kk) = 0 min{h(kk 1), h(kk + 1)} > ττ 1 kk+ωω1 xx=kk ωω1 h(xx) > ττ 2ωω1+1 (2.1) Here, the first sub-equation assures that the current bin is null. To define a gap bin, the second sub-equation keeps two neighboring bins larger than the threshold τ, as shown. To exclude the zero-height gap bins which may be incorrectly detected in histogram trail-ends, the average of neighboring (2w1 + 1) bins should be larger than τ, as constrained by the third sub-equation. Experiments show that w1 = 3andτ = are appropriate. Note that focus on the detection of isolated zero-height gap bins but not connected bins, which are rarely present in the middle of histograms. 3) Count the number of detected zero-height gap bins, denoted by N g. If it is larger than the decision threshold, contrast enhancement is detected, else not. 3 SYSTEM ARCHITECTURE A novel algorithm is proposed to identify the sourceenhanced composite image created by enforcing contrast adjustment on either single or both source regions. The outline of technique is shown in Figure 3.1. Since positional distribution of the peak/gap bins incurred by contrast enhancement is unique to the involved pixel value mapping, such positional information could serve as fingerprinting feature for identifying different contrast enhancement manipulations. SVM classifier has similar functional form to neural networks. Image, texture and pixel value based features are extracted and analyzed from the images. Then hash values are calculated for these features. The process consists of two phases which are training phase and a testing phase. SVM classifier is trained with a set of images and used to classify the images as genuine or forged. SVM supports both regression and classification tasks Consistency Volume: 02 Issue:

3 Read input image between the peak/gap artifacts detected in different regions is checked for discovering composite images Block wise Peak/Gap Bins Location Normalized To locate composition, the test image is first divided into nonoverlapping blocks. For the i -th block, peak/gap bins in its gray level histogram are located as follows. Here and below, i = 1, 2,, Nb, where Nb is the number of divided blocks. Gap Gap Bins Location: The zero-height gap bins are detected.the position of detected gap bins is labelled as Vig= [Vig(0), Vig(1),, Vig(k),, V ig (255)] (3.1) Where Vig(k) = 1, if the bin at k is a gap; Vig(k) = 0, otherwise. Contrast Enhanced n Forgery image y Normal Peak Bins Location: Peak bins which behave as impulse noise can be located by median filtering. Specifically, the gap bins are first filled with the average of neighboring bins, and then median filtering is applied to the gap-filled histogram. The filtered histogram possesses a smooth contour. Lastly, peak positions are located by thresholding the difference between the gap-filled histogram and its filtered version. The histogram differences for the enhanced. Record the detected peak positions Vip= [Vip(0), Vip(1),, Vip(k),, Vip(255) (3.2 Where Vip(k) =1 refers to a peak Similarity Measure using reference vectors Block wise Gap & Peak Gap &Peak Similarity SVM Classifier To discriminate two source regions, first set a reference position vector for either one. Then each block can be classified by the similarity between its position vector and the reference one. It is reasonable to deem that the blocks with approximate similarity comes from the same source image. The reference position vector should not be selected from splicing boundary fortunately; the block with the largest number of zero-height gap bins is believed to locate within one source region. In boundary blocks, the interaction between the pixels from different source regions makes the number of zero height bins decrease. As a result, the reference gap position vector for its located source region. To measure the overall similarity between the gap position vectors, each gap involved pair should be investigated firstly. Since the histogram at the gray levels out of EDR does not deliver any effective peak/gap information left by contrast enhancement, the element pairs in the intersection of two EDRs are used to measure the similarity. As there exist three possible correspondences for a gap-involved pair. The ratio between the number of matched pairs and that of total gapinvolved pairs is defined as the similarity applied to the image region out of the reference block. Detect Tampering Region Performance analysis The narrow histogram without gap bins might carry with peak bins. As such the peak bins should also be exploited to identify mappings. The reference peak position vector is created by combining the peak position vectors which are more possible from the source region of gap vector. Such creation of position vector is reliable since the collected peak information is relatively accurate. Volume: 02 Issue:

4 3.3.3 Svm Classifier Support vector machines (SVMs) are a set of related supervised learning methods that analyze data and recognize patterns, used for classification and analysis. The standard SVM takes a set of input data and predicts, for each given input, which of two possible classes the input is a member of, which makes the SVM a non-probabilistic binary linear classifier. Since an SVM is a classifier, then given a set of training examples, each marked as belonging to one of two categories, an SVM training algorithm builds a model that predicts whether a new example falls into one category or the other. Intuitively, an SVM model is a representation of the examples as points in space, mapped so that the examples of the separate categories are divided by a clear gap that is as wide as possible. New examples are then mapped into that same space and predicted to belong to a category based on which side of the gap they fall on. A support vector machine constructs a hyper plane or set of hyper planes in a high or infinite dimensional space, which can be used for classification, regression, or other tasks. Intuitively, a good separation is achieved by the hyper plane that has the largest distance to the nearest training data points of any class (socalled functional margin), since in general the larger the margin the lower the generalization error of the classifier. Whereas the original problem may be stated in a finite dimensional space, it often happens that in that space the sets to be discriminated are not linearly separable. For this reason it was proposed that the original finite dimensional space be mapped into a much higher dimensional space, presumably making the separation easier in that space. SVM schemes use a mapping into a larger space so that cross products may be computed easily in terms of the variables in the original space, making the computational load reasonable. The cross products in the larger space are defined in terms of a kernel function K(x,y) selected to suit the problem. The hyper planes in the large space are defined as the set of points whose cross product with a vector in that space is constant. The vectors defining the hyper planes can be chosen to be linear combinations with parameters α i of images of feature vectors that occur in the data base. 4 MODULE DESCRIPITION 1. Contrast Enhancement Detection 2. Peak/Gap bins detection 3. Peak/Gap similarity Measure 4. SVM Composite Detection 5. Performance Analysis 1. Contrast enhancement detection 1) Get the image s normalized gray level histogram h (x). 2) Detect the bin at k as a zero-height gap bin if it satisfies: h(kk) = 0 min{h(kk 1), h(kk + 1)} > ττ (4.1) 1 kk+ωω1 h(xx) > ττ 2ωω1+1 xx=kk ωω1 Here, the first sub-equation assures that the current bin is null. To define a gap bin, the second sub-equation keeps two neighboring bins larger than the threshold τ. To exclude the zero-height gap bins which may be incorrectly detected in histogram trail-ends, the average of neighboring (2w1 + 1) bins should be larger than τ, as constrained by the third subequation. 3) Count the number of detected zero-height gap bins, denoted by N g. If it is larger than the decision threshold, contrast enhancement is detected, else not. 2. Peak/gap bins detection The test image is first divided into no overlapping blocks. For the i -th block, peak/gap bins in its gray level histogram are located. Here, i = 1, 2,, N b, where N b is the number of divided blocks. The position of detected gap bins is labelled as VV ii gg = [VV ii gg (0), VV ii gg (1)., VV ii gg (kk),., VV ii gg (255) if VV ii gg (kk) = 1 the bin at k is a gap, VV ii gg (kk) = 0 otherwise. The gap bins are first filled with the average of neighboring bins, then median filtering is applied to the gap-filled histogram. Lastly, peak positions are located by thresholding the difference between the gap-filled histogram and its filtered version. The detected peak positions as V i p=[ V i p (0), V i p (1),, V i p (k),. V i p (255)]. To further decrease detection errors, the extracted peak/ gap positions are corrected by retaining the co-existing peak/ gap positions in most blocks. Specifically, apply a threshold-based binarization to Cg NN = bb ii ii=1 VV gg /NN bb. The detected co-existing gap positions are recorded as V g =[V g ( 0 ), V g ( 1 ),, V g ( k ),, V g (255)], where V g ( k ) = 1, if C g ( k ) is larger than the threshold; V g ( k ) = 0, otherwise. To eliminate the gap bins which might not be caused by contrast enhancement, the corrected gap position vector, V i gc, is generated Hadamard product, Similarly, the corrected peak position vectorv i pc can also be obtained. 3. Peak/gap similarity measure To discriminate two source regions, first set a reference position vector for either one. Then each block can be classified by the similarity between its position vector and the reference one. To measure the overall similarity between the gap position vectors V i gc and V gr, each gap-involved pair V i gc ( k ) and V gr ( k ) should be investigated firstly. Here, the element pairs in the intersection of two EDRs are used to measure the similarity. There exist three possible correspondences for a gap-involved pair. The reference peak position vector V pr is created by combining the peak position vectors which are more possible from the source region of V pr, namely S 1.Such creation of V pr is reliable since the collected peak information is relatively accurate. The similarity between V i pc and V pr, marked as m i p, is defined in the same form by replacing the gap variables with the corresponding peak ones. If no peak-involved pair exists in EDR intersection, mark m i p = SVM Composite detection Extract each block gap similarity & peak similarity based on ground truth image, train the SVM network. Here design the two class svm classifier,composite versus normal. In training update the weight value of svm. g(x)=w^tx+w0 (4.2) Volume: 02 Issue:

5 where w^t,w0 are the weight values, x is the input. After training predict the output class table based on each block features. 5. Performance analyses In performance analysis, the effectiveness and efficacy of the proposed techniques is compared with the existing techniques. 5.CONCLUSIONS In this paper, propose SVM classifier which has similar functional form to neural networks. Image, texture and pixel value based features are extracted and analyzed from the images. Then hash values are calculated for these features. The process consists of two phases which are training phase and a testing phase. SVM classifier is trained with a set of images and used to classify the images as genuine or forged. SVM supports both regression and classification tasks and can handle multiple continuous and categorical variables. The composition boundary was accurately located by detecting the inconsistency between detected block wise peak/gap positional distributions. In the proposed method reduces the time and computational complexity. As future work to this project, apply an optimal thresholding technique to improve the Detection accuracy which is low due to fixed threshold and also highly noise sensitive for real time applications. REFERENCES 1. T. Arici, S. Dikbas, and Y. Altunbasak, A histogram modification framework and its application for image contrast enhancement, IEEE Trans. Image Process., vol. 18, no. 9, pp , Sep M. Barni, M. Fontani, and B. Tondi, A universal technique to hide traces of histogram-based image manipulations, in Proc. ACM Multimedia Security Workshop, Coventry, England, 2012, pp S. Battiato, A. Bosco, A. Castorina, and G. Messina, Automatic image enhancement by content dependent exposure correction, EURASIP J. Appl. Signal Process., vol. 12, pp , Jan S. Bayram, I. Avcubas, B. Sankur, and N. Memon, Image manipulation detection, J. Electron. Imag., vol. 15, no. 4, pp , T. Bianchi and A. Piva, Detection of non-aligned double JPEG compression based on integer periodicity maps, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp , Apr H. Cao and A. C. Kot, Manipulation detection on image patches using FusionBoost, IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp , Jun G. Cao, Y. Zhao, R. Ni, and A. C. Kot, Unsharp masking sharpening detection via overshoot artifacts analysis, IEEE Signal Process. Lett., vol. 18, no. 10, pp , Oct G. Cao, Y. Zhao, and R. Ni, Forensic estimation of gamma correction in digital images, in Proc. 17th IEEE Int. Conf. Image Process., Hong Kong, 2010, pp C. Chen, J. Ni, and J. Huang, Blind detection of median filtering in digital images: A difference domain based approach, IEEE Trans. Image Process., vol. 22, no. 12, pp , Dec J. Fan, H. Cao, and A. C. Kot, Estimating EXIF parameters based on noise features for image manipulation detection, IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp , Apr H. Farid, Image forgery detection, IEEE Signal Process. Mag., vol. 26, no. 2, pp , Mar P. Ferrara, T. Bianchiy, A. De Rosaz, and A. Piva, Reverse engineering of double compressed images in the presence of contrast enhancement, in Proc. IEEE Workshop Multimedia Signal Process., Pula, Croatia, Sep./Oct. 2013, pp S.-C. Huang, F.-C. Cheng, and Y.-S. Chiu, Efficient contrast enhancement using adaptive gamma correction with weighting distribution, IEEE Trans. Image Process., vol. 22, no. 3, pp , Mar M. Kirchner and J. Fridrich, On detection of median filtering in digital images, in Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, San Jose, CA, USA, Jan. 2010, pp D. Mahajan, R. Ramamoorthi, and B. Curless, A theory of frequency domain invariants: Spherical harmonic identities for BRDF/lighting transfer and image consistency, IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 2, pp , Feb B. Mahdian and S. Saic, A bibliography on blind methods for identifying image forgery, Image Commun., vol. 25, no. 6, pp , Jul W. B. Pennebaker and J. L. Mitchell, JPEG Still Image Data Compression Standard. New York, NY, USA: Van Nostrand, C. Popescu and H. Farid, Exposing digital forgeries by detecting traces of resampling, IEEE Trans. Signal Process., vol. 53, no. 2, pp , Feb Volume: 02 Issue:

WITH THE rapid development of digital media editing

WITH THE rapid development of digital media editing IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 2014 515 Contrast Enhancement-Based Forensics in Digital Images Gang Cao, Yao Zhao, Senior Member, IEEE, Rongrong Ni, Member,

More information

Digital Image Forgery Detection Based on GLCM and HOG Features

Digital Image Forgery Detection Based on GLCM and HOG Features Digital Image Forgery Detection Based on GLCM and HOG Features Liya Baby 1, Ann Jose 2 Department of Electronics and Communication, Ilahia College of Engineering and Technology, Muvattupuzha, Ernakulam,

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES. Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian

FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES. Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian FORENSIC DETECTION OF MEDIAN FILTERING IN DIGITAL IMAGES Gang Cao Yao Zhao Rongrong Ni Lifang Yu Huawei Tian Institute of Information Science, Beijing Jiaotong University, Beijing, 44, China {6256, yzhao,

More information

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important

More information

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu

More information

HIDING TRACES OF MEDIAN FILTERING IN DIGITAL IMAGES. M. Fontani, M. Barni

HIDING TRACES OF MEDIAN FILTERING IN DIGITAL IMAGES. M. Fontani, M. Barni HIDING TRACES OF MEDIAN FILTERING IN DIGITAL IMAGES M. Fontani, M. Barni Dept. of Information Engineering - University of Siena via Roma 56, Siena (IT) ABSTRACT Detection of median filtering is an important

More information

Detecting Digital Image Forgeries By Multi-illuminant Estimators

Detecting Digital Image Forgeries By Multi-illuminant Estimators Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID

More information

Forensic analysis of JPEG image compression

Forensic analysis of JPEG image compression Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic

More information

I. INTRODUCTION. Figure-1 Basic block of text analysis

I. INTRODUCTION. Figure-1 Basic block of text analysis ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com Detection and Localization of Texts from Natural Scene Images: A Hybrid Approach Priyanka Muchhadiya Post Graduate Fellow,

More information

Detection of Digital Image Splicing Using Luminance

Detection of Digital Image Splicing Using Luminance Detection of Digital Image Splicing Using Luminance P.Sabeena Burvin, II M.Tech(IT), Department of IT, Francis Xavier Engineering College,Tirunelveli. Mail Id: sabu.nce@gmail.com J.Monica Esther, Asst

More information

Improved LBP and K-Nearest Neighbors Algorithm

Improved LBP and K-Nearest Neighbors Algorithm Image-Splicing Forgery Detection Based On Improved LBP and K-Nearest Neighbors Algorithm Fahime Hakimi, Department of Electrical and Computer engineering. Zanjan branch, Islamic Azad University. Zanjan,

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

IMAGE and video editing has become increasingly easy

IMAGE and video editing has become increasingly easy IEEE SIGNAL PROCESSING LETTERS, VOL. XX, NO. Y, MONTH YEAR 1 ACE - An Effective Anti-forensic Contrast Enhancement Technique Hareesh Ravi, Member, IEEE, A V Subramanyam, Member, IEEE, and Sabu Emmanuel,

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery

Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery Improving the Detection and Localization of Duplicated Regions in Copy-Move Image Forgery Maryam Jaberi, George Bebis Computer Science and Eng. Dept. University of Nevada, Reno Reno, USA (mjaberi,bebis)@cse.unr.edu

More information

IMAGE and video editing has become increasingly easy and

IMAGE and video editing has become increasingly easy and IEEE SIGNAL PROCESSING LETTERS, VOL. XX, NO. Y, MONTH YEAR 1 ACE - An Effective Anti-forensic Contrast Enhancement Technique Hareesh Ravi, Member, IEEE, A V Subramanyam, Member, IEEE, and Sabu Emmanuel,

More information

Deliverable D6.3 Release of publicly available datasets and software tools

Deliverable D6.3 Release of publicly available datasets and software tools Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents

More information

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:

More information

Advanced Digital Image Forgery Detection by Using SIFT

Advanced Digital Image Forgery Detection by Using SIFT RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering

More information

Combined Hashing/Watermarking Method for Image Authentication

Combined Hashing/Watermarking Method for Image Authentication Combined Hashing/Watermarking Method for Image Authentication Vlado Kitanovski, Dimitar Taskovski, and Sofija Bogdanova Abstract In this paper we present a combined hashing/watermarking method for image

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015 Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET

More information

Recognition of Gurmukhi Text from Sign Board Images Captured from Mobile Camera

Recognition of Gurmukhi Text from Sign Board Images Captured from Mobile Camera International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1839-1845 International Research Publications House http://www. irphouse.com Recognition of

More information

Reverse engineering of double compressed images in the presence of contrast enhancement

Reverse engineering of double compressed images in the presence of contrast enhancement Reverse engineering of double compressed images in the presence of contrast enhancement P. Ferrara #, T. Bianchi, A. De Rosa, A. Piva # National Institute of Optics (INO), Firenze, Italy pasquale.ferrara@ino.it

More information

Scene Text Detection Using Machine Learning Classifiers

Scene Text Detection Using Machine Learning Classifiers 601 Scene Text Detection Using Machine Learning Classifiers Nafla C.N. 1, Sneha K. 2, Divya K.P. 3 1 (Department of CSE, RCET, Akkikkvu, Thrissur) 2 (Department of CSE, RCET, Akkikkvu, Thrissur) 3 (Department

More information

Classifying Images with Visual/Textual Cues. By Steven Kappes and Yan Cao

Classifying Images with Visual/Textual Cues. By Steven Kappes and Yan Cao Classifying Images with Visual/Textual Cues By Steven Kappes and Yan Cao Motivation Image search Building large sets of classified images Robotics Background Object recognition is unsolved Deformable shaped

More information

Automatic Image Forgery Exposure using Illuminant Measure of Face Region and Random Object Detection Method

Automatic Image Forgery Exposure using Illuminant Measure of Face Region and Random Object Detection Method IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 2 Ver. I (Mar Apr. 2014), PP 47-52 Automatic Image Forgery Exposure using Illuminant

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni

More information

A Key-Point Based Robust Algorithm for Detecting Cloning Forgery

A Key-Point Based Robust Algorithm for Detecting Cloning Forgery Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Mariam

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS

CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS B.Vanajakshi Department of Electronics & Communications Engg. Assoc.prof. Sri Viveka Institute of Technology Vijayawada, India E-mail:

More information

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features 1 Kum Sharanamma, 2 Krishnapriya Sharma 1,2 SIR MVIT Abstract- To describe the image features the Local binary pattern (LBP)

More information

A Robust Wipe Detection Algorithm

A Robust Wipe Detection Algorithm A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,

More information

Spam Filtering Using Visual Features

Spam Filtering Using Visual Features Spam Filtering Using Visual Features Sirnam Swetha Computer Science Engineering sirnam.swetha@research.iiit.ac.in Sharvani Chandu Electronics and Communication Engineering sharvani.chandu@students.iiit.ac.in

More information

Light Field Occlusion Removal

Light Field Occlusion Removal Light Field Occlusion Removal Shannon Kao Stanford University kaos@stanford.edu Figure 1: Occlusion removal pipeline. The input image (left) is part of a focal stack representing a light field. Each image

More information

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor COSC160: Detection and Classification Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Problem I. Strategies II. Features for training III. Using spatial information? IV. Reducing dimensionality

More information

Image retrieval based on bag of images

Image retrieval based on bag of images University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Image retrieval based on bag of images Jun Zhang University of Wollongong

More information

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University 2011 Eighth International Conference Computer Graphics, Imaging and Visualization COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM Najah Muhammad 1, Muhammad Hussain 2, Ghulam Muhammad 2, and

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH

AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH Sai Tejaswi Dasari #1 and G K Kishore Babu *2 # Student,Cse, CIET, Lam,Guntur, India * Assistant Professort,Cse, CIET, Lam,Guntur, India Abstract-

More information

Color Local Texture Features Based Face Recognition

Color Local Texture Features Based Face Recognition Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India

More information

Multi-scale Techniques for Document Page Segmentation

Multi-scale Techniques for Document Page Segmentation Multi-scale Techniques for Document Page Segmentation Zhixin Shi and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR), State University of New York at Buffalo, Amherst

More information

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html

More information

CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS

CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS Setiawan Hadi Mathematics Department, Universitas Padjadjaran e-mail : shadi@unpad.ac.id Abstract Geometric patterns generated by superimposing

More information

Motivation. Gray Levels

Motivation. Gray Levels Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding

More information

Total Variation Based Forensics for JPEG Compression

Total Variation Based Forensics for JPEG Compression International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 6, September 2014, PP 8-13 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Total Variation Based Forensics

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

Bus Detection and recognition for visually impaired people

Bus Detection and recognition for visually impaired people Bus Detection and recognition for visually impaired people Hangrong Pan, Chucai Yi, and Yingli Tian The City College of New York The Graduate Center The City University of New York MAP4VIP Outline Motivation

More information

WITH the ease of digital image manipulation, like

WITH the ease of digital image manipulation, like 816 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 4, DECEMBER 2010 Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection Yu-Feng Hsu and Shih-Fu

More information

Motivation. Intensity Levels

Motivation. Intensity Levels Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding

More information

Classification Algorithms in Data Mining

Classification Algorithms in Data Mining August 9th, 2016 Suhas Mallesh Yash Thakkar Ashok Choudhary CIS660 Data Mining and Big Data Processing -Dr. Sunnie S. Chung Classification Algorithms in Data Mining Deciding on the classification algorithms

More information

NTHU Rain Removal Project

NTHU Rain Removal Project People NTHU Rain Removal Project Networked Video Lab, National Tsing Hua University, Hsinchu, Taiwan Li-Wei Kang, Institute of Information Science, Academia Sinica, Taipei, Taiwan Chia-Wen Lin *, Department

More information

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection Nivi Varghese 1, Charlse M Varghese 2 1, 2 Department of Computer Science and Engineering, KMP College of Engineering,

More information

A Survey on Face-Sketch Matching Techniques

A Survey on Face-Sketch Matching Techniques A Survey on Face-Sketch Matching Techniques Reshma C Mohan 1, M. Jayamohan 2, Arya Raj S 3 1 Department of Computer Science, SBCEW 2 Department of Computer Science, College of Applied Science 3 Department

More information

CS 223B Computer Vision Problem Set 3

CS 223B Computer Vision Problem Set 3 CS 223B Computer Vision Problem Set 3 Due: Feb. 22 nd, 2011 1 Probabilistic Recursion for Tracking In this problem you will derive a method for tracking a point of interest through a sequence of images.

More information

RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE

RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE RESTORATION OF DEGRADED DOCUMENTS USING IMAGE BINARIZATION TECHNIQUE K. Kaviya Selvi 1 and R. S. Sabeenian 2 1 Department of Electronics and Communication Engineering, Communication Systems, Sona College

More information

Fingerprint Classification Using Orientation Field Flow Curves

Fingerprint Classification Using Orientation Field Flow Curves Fingerprint Classification Using Orientation Field Flow Curves Sarat C. Dass Michigan State University sdass@msu.edu Anil K. Jain Michigan State University ain@msu.edu Abstract Manual fingerprint classification

More information

Digital Image Forgery detection using color Illumination and Decision Tree Classification

Digital Image Forgery detection using color Illumination and Decision Tree Classification RESEARCH ARTICLE OPEN ACCESS Digital Image Forgery detection using color Illumination and Decision Tree Classification Chitra Ganesan, V.R. Bhuma Chitra Ganesan, the author is currently pursuing M.E (Software

More information

Enhancing DubaiSat-1 Satellite Imagery Using a Single Image Super-Resolution

Enhancing DubaiSat-1 Satellite Imagery Using a Single Image Super-Resolution Enhancing DubaiSat-1 Satellite Imagery Using a Single Image Super-Resolution Saeed AL-Mansoori 1 and Alavi Kunhu 2 1 Associate Image Processing Engineer, SIPAD Image Enhancement Section Emirates Institution

More information

Robot Learning. There are generally three types of robot learning: Learning from data. Learning by demonstration. Reinforcement learning

Robot Learning. There are generally three types of robot learning: Learning from data. Learning by demonstration. Reinforcement learning Robot Learning 1 General Pipeline 1. Data acquisition (e.g., from 3D sensors) 2. Feature extraction and representation construction 3. Robot learning: e.g., classification (recognition) or clustering (knowledge

More information

Copy-Move Forgery Detection using DCT and SIFT

Copy-Move Forgery Detection using DCT and SIFT Copy-Move Forgery Detection using DCT and SIFT Amanpreet Kaur Department of Computer Science and Engineering, Lovely Professional University, Punjab, India. Richa Sharma Department of Computer Science

More information

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER

SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER SCENARIO BASED ADAPTIVE PREPROCESSING FOR STREAM DATA USING SVM CLASSIFIER P.Radhabai Mrs.M.Priya Packialatha Dr.G.Geetha PG Student Assistant Professor Professor Dept of Computer Science and Engg Dept

More information

An Approach for Reduction of Rain Streaks from a Single Image

An Approach for Reduction of Rain Streaks from a Single Image An Approach for Reduction of Rain Streaks from a Single Image Vijayakumar Majjagi 1, Netravati U M 2 1 4 th Semester, M. Tech, Digital Electronics, Department of Electronics and Communication G M Institute

More information

Image Classification based on Saliency Driven Nonlinear Diffusion and Multi-scale Information Fusion Ms. Swapna R. Kharche 1, Prof.B.K.

Image Classification based on Saliency Driven Nonlinear Diffusion and Multi-scale Information Fusion Ms. Swapna R. Kharche 1, Prof.B.K. Image Classification based on Saliency Driven Nonlinear Diffusion and Multi-scale Information Fusion Ms. Swapna R. Kharche 1, Prof.B.K.Chaudhari 2 1M.E. student, Department of Computer Engg, VBKCOE, Malkapur

More information

CONTENT ADAPTIVE SCREEN IMAGE SCALING

CONTENT ADAPTIVE SCREEN IMAGE SCALING CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Text Information Extraction And Analysis From Images Using Digital Image Processing Techniques

Text Information Extraction And Analysis From Images Using Digital Image Processing Techniques Text Information Extraction And Analysis From Images Using Digital Image Processing Techniques Partha Sarathi Giri Department of Electronics and Communication, M.E.M.S, Balasore, Odisha Abstract Text data

More information

Detection of Seam Carving and Localization of Seam Insertions in Digital Images

Detection of Seam Carving and Localization of Seam Insertions in Digital Images Detection of Seam Carving and Localization of Seam Insertions in Digital Images Anindya Sarkar, Lakshmanan Nataraj and B. S. Manjunath Vision Research Laboratory University of California, Santa Barbara

More information

SPECTRAL METHODS TO DETERMINE THE EXACT SCALING FACTOR OF RESAMPLED DIGITAL IMAGES

SPECTRAL METHODS TO DETERMINE THE EXACT SCALING FACTOR OF RESAMPLED DIGITAL IMAGES SPECTRAL METHODS TO DETERMINE THE EXACT SCALING FACTOR OF RESAMPLED DIGITAL IMAGES Stefan Pfennig TU Dresden, Faculty of Computer Science 162 Dresden, Germany stefan.pfennig@tu-dresden.de Matthias Kirchner

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

Direction-Length Code (DLC) To Represent Binary Objects

Direction-Length Code (DLC) To Represent Binary Objects IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 29-35 www.iosrjournals.org Direction-Length Code (DLC) To Represent Binary

More information

Use of Local Minimization for Lossless Gray Image Compression

Use of Local Minimization for Lossless Gray Image Compression Narendra Kumar et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 Use of Local Minimization for Lossless Gray Image Compression Narendra Kumar 1, Dr. Sachin

More information

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric

More information

An Empirical Analysis of Communities in Real-World Networks

An Empirical Analysis of Communities in Real-World Networks An Empirical Analysis of Communities in Real-World Networks Chuan Sheng Foo Computer Science Department Stanford University csfoo@cs.stanford.edu ABSTRACT Little work has been done on the characterization

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Scanner Parameter Estimation Using Bilevel Scans of Star Charts

Scanner Parameter Estimation Using Bilevel Scans of Star Charts ICDAR, Seattle WA September Scanner Parameter Estimation Using Bilevel Scans of Star Charts Elisa H. Barney Smith Electrical and Computer Engineering Department Boise State University, Boise, Idaho 8375

More information

Robot localization method based on visual features and their geometric relationship

Robot localization method based on visual features and their geometric relationship , pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department

More information

Multiple-View Object Recognition in Band-Limited Distributed Camera Networks

Multiple-View Object Recognition in Band-Limited Distributed Camera Networks in Band-Limited Distributed Camera Networks Allen Y. Yang, Subhransu Maji, Mario Christoudas, Kirak Hong, Posu Yan Trevor Darrell, Jitendra Malik, and Shankar Sastry Fusion, 2009 Classical Object Recognition

More information

A Study on Different JPEG Steganograhic Schemes

A Study on Different JPEG Steganograhic Schemes A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India

More information

Babu Madhav Institute of Information Technology Years Integrated M.Sc.(IT)(Semester - 7)

Babu Madhav Institute of Information Technology Years Integrated M.Sc.(IT)(Semester - 7) 5 Years Integrated M.Sc.(IT)(Semester - 7) 060010707 Digital Image Processing UNIT 1 Introduction to Image Processing Q: 1 Answer in short. 1. What is digital image? 1. Define pixel or picture element?

More information

A new approach to reference point location in fingerprint recognition

A new approach to reference point location in fingerprint recognition A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl

More information

A threshold decision of the object image by using the smart tag

A threshold decision of the object image by using the smart tag A threshold decision of the object image by using the smart tag Chang-Jun Im, Jin-Young Kim, Kwan Young Joung, Ho-Gil Lee Sensing & Perception Research Group Korea Institute of Industrial Technology (

More information

Fundamentals of Digital Image Processing

Fundamentals of Digital Image Processing \L\.6 Gw.i Fundamentals of Digital Image Processing A Practical Approach with Examples in Matlab Chris Solomon School of Physical Sciences, University of Kent, Canterbury, UK Toby Breckon School of Engineering,

More information

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation

More information

A Robust Visual Identifier Using the Trace Transform

A Robust Visual Identifier Using the Trace Transform A Robust Visual Identifier Using the Trace Transform P. Brasnett*, M.Z. Bober* *Mitsubishi Electric ITE VIL, Guildford, UK. paul.brasnett@vil.ite.mee.com, miroslaw.bober@vil.ite.mee.com Keywords: image

More information

Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal

Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal Sparse Component Analysis (SCA) in Random-valued and Salt and Pepper Noise Removal Hadi. Zayyani, Seyyedmajid. Valliollahzadeh Sharif University of Technology zayyani000@yahoo.com, valliollahzadeh@yahoo.com

More information

Data mining with Support Vector Machine

Data mining with Support Vector Machine Data mining with Support Vector Machine Ms. Arti Patle IES, IPS Academy Indore (M.P.) artipatle@gmail.com Mr. Deepak Singh Chouhan IES, IPS Academy Indore (M.P.) deepak.schouhan@yahoo.com Abstract: Machine

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal

More information

Texture Segmentation by Windowed Projection

Texture Segmentation by Windowed Projection Texture Segmentation by Windowed Projection 1, 2 Fan-Chen Tseng, 2 Ching-Chi Hsu, 2 Chiou-Shann Fuh 1 Department of Electronic Engineering National I-Lan Institute of Technology e-mail : fctseng@ccmail.ilantech.edu.tw

More information

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

SPATIAL DOMAIN QUANTIZATION NOISE BASED IMAGE FILTERING DETECTION

SPATIAL DOMAIN QUANTIZATION NOISE BASED IMAGE FILTERING DETECTION SPATIAL DOMAIN QUANTIZATION NOISE BASED IMAGE FILTERING DETECTION Hareesh Ravi, A.V. Subramanyam, Sabu Emmanuel Electronics and Communication Engineering, Indraprastha Institute of Information Technology,

More information

Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks

Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks Neslihan Kose, Jean-Luc Dugelay Multimedia Department EURECOM Sophia-Antipolis, France {neslihan.kose, jean-luc.dugelay}@eurecom.fr

More information

Learning to Recognize Faces in Realistic Conditions

Learning to Recognize Faces in Realistic Conditions 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Fractional Discrimination for Texture Image Segmentation

Fractional Discrimination for Texture Image Segmentation Fractional Discrimination for Texture Image Segmentation Author You, Jia, Sattar, Abdul Published 1997 Conference Title IEEE 1997 International Conference on Image Processing, Proceedings of the DOI https://doi.org/10.1109/icip.1997.647743

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive PEARSON Prentice Hall Pearson Education International Contents Preface xv Acknowledgments

More information