Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/397697
Title: | Copy move tampering some new approaches of the detection and localization in a digital image |
Researcher: | Diwan, Anjali |
Guide(s): | Roy, Anil K. |
Keywords: | Engineering and Technology Computer Science Imaging Science and Photographic Technology Digital images Image processing Imaging systems Images, Photographic Image compression Random noise theory Embeddings (Mathematics) |
University: | Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT) |
Completed Date: | 2022 |
Abstract: | quotImages speak. They tell us stories. Digital images carry plethora of information. The availability of cost-effective digital camera-enabled devices has made capturing images a child s play. Statistics witnesses that the use of social networking sites has influenced people s appetite for digital images. Billions and billions of photos are uploaded, shared and forwarded on these platforms. This makes every user an active source of the digital information. newlineThe availability of easy-to-use image editing software helps novice and experts as well capable of creating realistic alterations in these digital images. These alterations could be harmless changes for fun or serious image tampering with malicious intentions. This fact raises eyebrows and questions the authenticity of a digital image. When these digital images are used for specific purposes like news broadcasts, research publications, sports, entertainment, fashion, advertisements, legal proceedings etc., this problem becomes more critical and challenging. Therefore, digital image tampering has since long attracted the research community of image processing. newlineAmong various tampering operations, copy-move tampering is one of the easiest approaches and therefore the most common approach. In the copy-move tampering process, copying and pasting are done on the same image. Hence colour, noise component, intensity range and other properties of the image remain almost unchanged. It makes tampering detection difficult when no clue about the tampering is available other than the image itself. Further, to camouflage tampering some tricks to hide the footprint of tampering are used, such as blurring of the edges of the copy-pasted pat of the image. Technically this can be achieved by some image processing methods, e.g., JPEG compression, addition of Gaussian noise, brightness change, colour reduction, contrast adjustment etc. Occasionally some geometrical transformations such as scaling and rotation of the copied regions before pasting them somewhere else in the same... |
Pagination: | xvi, 145 p. |
URI: | http://hdl.handle.net/10603/397697 |
Appears in Departments: | Department of Information and Communication Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 80.94 kB | Adobe PDF | View/Open |
02_decalaration and certificate.pdf | 211.56 kB | Adobe PDF | View/Open | |
03_acknowledgments.pdf | 56.89 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 59.19 kB | Adobe PDF | View/Open | |
05_contents.pdf | 64.38 kB | Adobe PDF | View/Open | |
06_list of figures, tables and special terms.pdf | 91.33 kB | Adobe PDF | View/Open | |
07_chapter 1.pdf | 2.08 MB | Adobe PDF | View/Open | |
08_chapter 2.pdf | 117.44 kB | Adobe PDF | View/Open | |
09_chapter 3.pdf | 20.45 MB | Adobe PDF | View/Open | |
10_chapter 4.pdf | 62.12 MB | Adobe PDF | View/Open | |
11_chapter 5.pdf | 35.87 MB | Adobe PDF | View/Open | |
12_chapter 6.pdf | 34.44 MB | Adobe PDF | View/Open | |
13_chapter 7.pdf | 61.96 kB | Adobe PDF | View/Open | |
14_references.pdf | 157.34 kB | Adobe PDF | View/Open | |
15_appendix.pdf | 75.9 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 96.48 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: