Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/397697
Title: Copy move tampering some new approaches of the detection and localization in a digital image
Researcher: Diwan, Anjali
Guide(s): Roy, Anil K.
Keywords: Engineering and Technology
Computer Science
Imaging Science and Photographic Technology
Digital images
Image processing
Imaging systems
Images, Photographic
Image compression
Random noise theory
Embeddings (Mathematics)
University: Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT)
Completed Date: 2022
Abstract: quotImages speak. They tell us stories. Digital images carry plethora of information. The availability of cost-effective digital camera-enabled devices has made capturing images a child s play. Statistics witnesses that the use of social networking sites has influenced people s appetite for digital images. Billions and billions of photos are uploaded, shared and forwarded on these platforms. This makes every user an active source of the digital information. newlineThe availability of easy-to-use image editing software helps novice and experts as well capable of creating realistic alterations in these digital images. These alterations could be harmless changes for fun or serious image tampering with malicious intentions. This fact raises eyebrows and questions the authenticity of a digital image. When these digital images are used for specific purposes like news broadcasts, research publications, sports, entertainment, fashion, advertisements, legal proceedings etc., this problem becomes more critical and challenging. Therefore, digital image tampering has since long attracted the research community of image processing. newlineAmong various tampering operations, copy-move tampering is one of the easiest approaches and therefore the most common approach. In the copy-move tampering process, copying and pasting are done on the same image. Hence colour, noise component, intensity range and other properties of the image remain almost unchanged. It makes tampering detection difficult when no clue about the tampering is available other than the image itself. Further, to camouflage tampering some tricks to hide the footprint of tampering are used, such as blurring of the edges of the copy-pasted pat of the image. Technically this can be achieved by some image processing methods, e.g., JPEG compression, addition of Gaussian noise, brightness change, colour reduction, contrast adjustment etc. Occasionally some geometrical transformations such as scaling and rotation of the copied regions before pasting them somewhere else in the same...
Pagination: xvi, 145 p.
URI: http://hdl.handle.net/10603/397697
Appears in Departments:Department of Information and Communication Technology

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File80.94 kBAdobe PDFView/Open
02_decalaration and certificate.pdf211.56 kBAdobe PDFView/Open
03_acknowledgments.pdf56.89 kBAdobe PDFView/Open
04_abstract.pdf59.19 kBAdobe PDFView/Open
05_contents.pdf64.38 kBAdobe PDFView/Open
06_list of figures, tables and special terms.pdf91.33 kBAdobe PDFView/Open
07_chapter 1.pdf2.08 MBAdobe PDFView/Open
08_chapter 2.pdf117.44 kBAdobe PDFView/Open
09_chapter 3.pdf20.45 MBAdobe PDFView/Open
10_chapter 4.pdf62.12 MBAdobe PDFView/Open
11_chapter 5.pdf35.87 MBAdobe PDFView/Open
12_chapter 6.pdf34.44 MBAdobe PDFView/Open
13_chapter 7.pdf61.96 kBAdobe PDFView/Open
14_references.pdf157.34 kBAdobe PDFView/Open
15_appendix.pdf75.9 kBAdobe PDFView/Open
80_recommendation.pdf96.48 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: