• Title/Summary/Keyword: copy-move

Search Result 28, Processing Time 0.031 seconds

Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms

  • Thajeel, Salam A.;Mahmood, Ali Shakir;Humood, Waleed Rasheed;Sulong, Ghazali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4005-4025
    • /
    • 2019
  • Copy-move forgery (CMF) in digital images is a detrimental tampering of artefacts that requires precise detection and analysis. CMF is performed by copying and pasting a part of an image into other portions of it. Despite several efforts to detect CMF, accurate identification of noise, blur and rotated region-mediated forged image areas is still difficult. A novel algorithm is developed on the basis of quaternion polar complex exponential transform (QPCET) to detect CMF and is conducted involving a few steps. Firstly, the suspicious image is divided into overlapping blocks. Secondly, invariant features for each block are extracted using QPCET. Thirdly, the duplicated image blocks are determined using k-dimensional tree (kd-tree) block matching. Lastly, a new technique is introduced to reduce the flat region-mediated false matches. Experiments are performed on numerous images selected from the CoMoFoD database. MATLAB 2017b is used to employ the proposed method. Metrics such as correct and false detection ratios are utilised to evaluate the performance of the proposed CMF detection method. Experimental results demonstrate the precise and efficient CMF detection capacity of the proposed approach even under image distortion including rotation, scaling, additive noise, blurring, brightness, colour reduction and JPEG compression. Furthermore, our method can solve the false match problem and outperform existing ones in terms of precision and false positive rate. The proposed approach may serve as a basis for accurate digital image forensic investigations.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

Comparison of Image Duplication Detection Using the Polar Coordinates System and Histogram of Oriented Gradients Methods

  • Gunadi, Kartika;Adipranata, Rudy;Suryajaya, Ivan
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.1
    • /
    • pp.67-73
    • /
    • 2019
  • In the current era of digital technology, and with the help of existing software, digital photo manipulation is becoming easier and faster. One example of this is the development of powerful image processing software that makes it easy for a digital image to be manipulated and edited. It is therefore very important to protect and maintain public trust in digital images. Several methods have been developed to detect image manipulation. In this paper, we compare two methods for detecting image duplication due to copy-move actions, namely the polar coordinate system and the histogram of oriented gradients methods. The former is a method based on the transfer of a Cartesian image to a polar form, making it easy to tell whether there are objects that have undergone a copy/move in an image, while the latter is a method for retrieving information related to the distribution, which uses a target in the local area as a tool to represent the shape of the target. We compare the accuracy, speed and memory usage of these two methods.

Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm (L0 Norm 기반의 LE(Local Effect) 연산자를 이용한 디지털 이미지 위변조 검출 기술 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.153-162
    • /
    • 2020
  • Digital image forgery detection is one of very important fields in the field of digital forensics. As the forged images change naturally through the advancement of technology, it has made it difficult to detect forged images. In this paper, we use passive forgery detection for copy paste forgery in digital images. In addition, it detects copy-paste forgery using the L0 Norm-based LE operator, and compares the detection accuracy with the forgery detection using the existing L2, L1 Norm-based LE operator. In comparison of detection rates, the proposed lower triangular(Ayalneh and Choi) window was more robust to BAG mismatch detection than the conventional window filter. In addition, in the case of using the lower triangular window, the performance of image forgery detection was measured increasingly higher as the L2, L1 and L0 Norm LE operator was performed.

Approximate Detection Method for Image Up-Sampling

  • Tu, Ching-Ting;Lin, Hwei-Jen;Yang, Fu-Wen;Chang, Hsiao-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.462-482
    • /
    • 2014
  • This paper proposes a new resampling detection method for images that detects whether an image has been resampled and recovers the corresponding resampling rate. The proposed method uses a given set of zeroing masks for various resampling factors to evaluate the convolution values of the input image with the zeroing masks. Improving upon our previous work, the proposed method detects more resampling factors by checking for some periodicity with an approximate detection mechanism. The experimental results demonstrate that the proposed method is effective and efficient.

Design of Object-Oriented Cideo Controller based on Stack (스택기반 객체 지향형 영상 제어기 설계)

  • 박주현;김영민
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.7
    • /
    • pp.69-77
    • /
    • 1998
  • In this paper, a controller is designed for efficient controlling of video data with object-oriented feature. The need of controlling video data in an object unit is on the rise for the reason of rapidly growing demand for high-quality video services. We propose a programmable architecture with stack buffers which can minimize a scheduling overhead by having separate buffes for genral data and return addresses. The buffers are veyr useful for move and copy operations for multitasking and task switching. The controller offers extended instructions that process several data types including 32bit integrer type. Operation speed of the controller is from 77MHz to 44MHz.

  • PDF

Early-Split register coalescing for reducing data move instruction (데이터 이동 명령어 최소화를 위한 레지스터 할당 기법)

  • Hong SungHyun;Kim Jinpyo;Moon Soo-mook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.907-909
    • /
    • 2005
  • copy, load, store와 같은 데이터 이동 명령은 프로그램의 수행시간을 늘리며 코드의 크기도 증가시킨다. 따라서, 최적화 컴파일러의 레지스터 할당 단계에서 이런 데이터 이동 명령들을 줄이는 것이 중요하다. 데이터 이동명령을 줄이기 위해서 그래프 컬러링 기반의 레지스터 할당 기법의 다양한 개선안이 나와있다. 여기서는 이 중에서 조기 분할 레지스터 융합 기법을 VLIW 시뮬레이터에서 구현하여 그 성능을 확인해본다. 조기 분할 레지스터 융합 기법은 융합된 가상 레지스터가 가장 적은 비용을 가지는 레지스터를 포함하고 있는 경우, 융합된 레지스터 자체를 스필하지 않고, 잠재적 스필 단계에서 분리하여 적은 비용의 레지스터만을 스필하도록 하는 것이다.

  • PDF

Image Forgery Detection Using Gabor Filter (가보 필터를 이용한 이미지 위조 검출 기법)

  • NININAHAZWE, Sheilha;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.520-522
    • /
    • 2014
  • Due to the availability of easy-to-use and powerful image editing tools, the authentication of digital images cannot be taken for granted and it gives rise to non-intrusive forgery detection problem because all imaging devices do not embed watermark. Forgery detection plays an important role in this case. In this paper, an effective framework for passive-blind method for copy-move image forgery detection is proposed, based on Gabor filter which is robust to illumination, rotation invariant, robust to scale. For the detection, the suspicious image is selected and Gabor wavelet is applied from whole scale space and whole direction space. We will extract the mean and the standard deviation as the texture features and feature vectors. Finally, a distance is calculated between two textures feature vectors to determine the forgery, and the decision will be made based on that result.

SEAS (Symbolic Editing and Design Aid System) (회로도면과 IC Mask Layout을 위한 2차원 Grphic Editor)

  • Jo, Jae-Joo;Cha, Gun-Up;Kim, Jung-Soon
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.1
    • /
    • pp.149-158
    • /
    • 1987
  • This paper describes the SEAS which is a 2-dimensional graphic editor for schematic circuit and IC mask layout. This system runs on general purpose computer and Tektronix 4110 series graphic terminal. With this system, user can edit schematic circuits and/or IC mask layout with 2 level hierarchy. This system supports more than 20 kinds of built-in symbol, user definable internal symbols, 60 macros, 16 function keys, 4 level on-screen menu operation and edit-in-place of cell in main drawing. And it provides editing functions such as reflection, rotation, move and copy of one or a group of elements, and modification of polygona geometry etc. To improve the excution speed, we used local memory of graphic terminal. For the portability of the program, the system is written in FORTRAN 77 programming language.

  • PDF

Transposable Genetic Elements, the Mechanisms of Transposition, and Their Uses in Genetic Studies (게놈 내 전이성 인자와 그 이동기구 및 이용)

  • 한창열;한지학
    • Korean Journal of Plant Tissue Culture
    • /
    • v.22 no.5
    • /
    • pp.241-260
    • /
    • 1995
  • Transposons, present in the genomes of all living organisms, are genetic element that can change positions, or transpose, within the genome. Most genomes contain several kinds of transposable elements and the molecular details of the mechanisms by which these transposons move have recently been uncovered in many families of transposable elements. Transposition is brought about by an enzyme known as transposaese encoded by the autonomous transposon itself, but, in the unautonomous transposon lacking the gene encoding the transposase, movement occurs only at the presence of the enzyme encoded by the autonomous one. There are two types of transposition events, conservative and replicative transposition. In the former the transposon moves without replication, both strands of the DNA moving together from one place to the other while in the latter the transposition frequently involves DNA replication, so one copy of transposon remains at its original site as another copy insole to a new site. The insertion of transposon into a gene can prevent it expression whereas excision from the gene may restore the ability of the gene to be expressed. There are marked similarities between transposons and certain viruses having single stranded Plus (+) RNA genomes. Retrotransposons, which differ from the ordinary transposons in that they transpose via an RNA-intermediate, behave much like retroviruses and have a structure of integrated retrovial DNA when they are inserted to a new target site. An insertional mutagenesis called transposon-tagging is now being used in a number of plant species to isolate genes involved in developmental and metabolic processes which have been proven difficult to approach by the traditional methods. Attempts to device a transposon-tagging system based on the maize Ac for use in heterologous species have been made by many research workers.

  • PDF