Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/331740
Title: | Efficient algorithms for copy move tampering detection |
Researcher: | Nirmal jothi J |
Guide(s): | Letitia S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems copy move tampering detection |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | In today s world everybody uses digital images for conveying information from one end to other. Due to advancement in computer technology there are several image editing software which are introduced and allowed to modify the content of an image. In recent days, web applications undergo several problems related to security issues. Tampering is stated as the process of editing or altering the content of the image files in web applications where numerous business corporations working across the world. Several laws are announced to punish severely especially when the hacker modify the images regarding government or MNCs. After the arrival of several powerful graphics editing software like GIMP, Adobe Photoshop, Corel Paintshop, a fake image can be very easily created. Apart from that, some tampering software is cost-free and efficiently achieves the target of tampering. These software have some advantages. However, apart from those advantages, it is hazardous and produces unlimited tampered outcome which cannot be differentiated from the original image. Widespread availability of advanced digital image technology and powerful image editing software tools has made it easy to edit image content. One popular challenging task is copy-move forgery detection. Here, one portion of the image is copied and it is pasted into another portion within the same image. It is very difficult to differentiate such kind of tampered images with naked eyes. Whenever digital images are produced as evidences in court for insurance claims or news reports, the authenticity of the images become critical since they have the power to influence the outcomes and decisions. Hence, Computer society is in need of a technique which guarantees the authenticity of the images. newline |
Pagination: | xxi, 165p. |
URI: | http://hdl.handle.net/10603/331740 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.65 kB | Adobe PDF | View/Open |
02_certificates.pdf | 65.61 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 392.27 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 125.3 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 79.39 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 428.28 kB | Adobe PDF | View/Open | |
07_contents.pdf | 18.39 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 7.65 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 73.45 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 80.48 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 332.94 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 270.27 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 1.09 MB | Adobe PDF | View/Open | |
14_chapter4.pdf | 985.97 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 651.87 kB | Adobe PDF | View/Open | |
16_chapter6.pdf | 845.47 kB | Adobe PDF | View/Open | |
17_conclusion.pdf | 26.05 kB | Adobe PDF | View/Open | |
18_references.pdf | 154.78 kB | Adobe PDF | View/Open | |
19_listofpublications.pdf | 79.91 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 49.27 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: