Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations

06/07/2018
by   Tejas K, et al.
0

With the increase in interchange of data, there is a growing necessity of security. Considering the volumes of digital data that is transmitted, they are in need to be secure. Among the many forms of tampering possible, one widespread technique is Copy Move Forgery CMF. This forgery occurs when parts of the image are copied and duplicated elsewhere in the same image. There exist a number of algorithms to detect such a forgery in which the primary step involved is feature extraction. The feature extraction techniques employed must have lesser time and space complexity involved for an efficient and faster processing of media. Also, majority of the existing state of art techniques often tend to falsely match similar genuine objects as copy move forged during the detection process. To tackle these problems, the paper proposes a novel algorithm that recognizes a unique approach of using Hus Invariant Moments and Log polar Transformations to reduce feature vector dimension to one feature per block simultaneously detecting CMF among genuine similar objects in an image. The qualitative and quantitative results obtained demonstrate the effectiveness of this algorithm.

READ FULL TEXT
research
09/11/2018

Intensity and Rescale Invariant Copy Move Forgery Detection Techniques

In this contemporary world digital media such as videos and images behav...
research
08/26/2013

Detection of copy-move forgery in digital images based on DCT

With rapid advances in digital information processing systems, and more ...
research
06/03/2019

Robust copy-move forgery detection by false alarms control

Detecting reliably copy-move forgeries is difficult because images do co...
research
01/27/2016

Revisiting copy-move forgery detection by considering realistic image with similar but genuine objects

Many images, of natural or man-made scenes often contain Similar but Gen...
research
09/09/2021

Copy-Move Image Forgery Detection Based on Evolving Circular Domains Coverage

The aim of this paper is to improve the accuracy of copy-move forgery de...
research
04/15/2013

GPU Acclerated Automated Feature Extraction from Satellite Images

The availability of large volumes of remote sensing data insists on high...
research
07/08/2022

Copy Propagation subsumes Constant Propagation

Constant propagation and copy propagation are code transformations that ...

Please sign up or login with your details

Forgot password? Click here to reset