Source Camera Identification Forensics Based on Wavelet Features
|
|
- Hollie Melton
- 5 years ago
- Views:
Transcription
1 Source Camera Identification Forensics Based on Wavelet Features Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng, China IIH-MSP-29 September 13, 29
2 Outline Introduction Image features based identification Kharrazi s method Our method Experimental results and conclusions IIH-MSP-29
3 Introduction Source Camera Identification: Identifying the source camera of a digital photograph Used for: Establishing the origin of legal photographic evidence IIH-MSP-29
4 Active and Passive Identification Active Identification Embed watermarks No watermarks in most of digital photographics Passive Identification Do not need embed any information Only using image data Our method is a passive identification IIH-MSP-29
5 Using EXIF for Identification which one is its original EXIF? The left one. The EXIF of the right one is replaced by another image. IIH-MSP-29
6 Image Features Based Identification Imaging pipeline in digital cameras Differences in the processing details of each stage among various models of digital cameras Differences of image features in the output images from cameras of different models IIH-MSP-29
7 Kharrazi s Method Polytechnic University, Brooklyn, NY,USA: Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon Using Pattern Recognition Image Features: color features,iqm features, mean of wavelet coefficients IIH-MSP-29
8 Can we do better? Shortage of Kharrazi s method Identification accuracy is not reliable Why? Image Features used are not effective What we do? Extract more effective features IIH-MSP-29
9 Features Extraction Features Selection Classification Our method IIH-MSP-29
10 Wavelet Features Higher-order wavelet statistics Statistics of linear prediction of wavelet coefficients A kind of filter operation in wavelet domain Less dependence on image content Wavelet Coefficient Co-occurrence statistics Distances of co-occurrence matrices in the same orientation between different scales Wavelet features Differences in impact of imaging pipelines on wavelet domain IIH-MSP-29
11 Higher-order Wavelet Features HL r 1,2,3, g, b HH r 1,2,3, g, b LH r 1,2,3, g, b log 2 ( ) log 2 ( ) ( ) ω1 ω2 ω3 g g g g V x, y = V ( x 1, y) + V ( x + 1, y) + V ( x, y 1) υ i i i i + ω V ( x, y + 1) + ω V ( x / 2, y / 2) + ω V ( x, y) g g g 4 i 5 i+ 1 6 i + g r b ω7 Di + 1( x / 2, y / 2) + ω8 Vi ( x, y) + ω9 Vi ( x, y) = Qω E ( ω ) = [ υ Qω ] 2 de( ω) T 2 Q ( υ Qω ) dω = 1 ( T T ω = Q Q) Q υ p = log ( υ ) log ( Qω ) IIH-MSP-29
12 Wavelet Coefficient Co-occurrence Statistics HH r 1,2,3, g, b LH r HL r 1,2,3, g, b 1,2,3, g, b c c c DC( Vi ) = CVi CVi+ 1 c c c DC( H i ) = CH i CH i+ 1 c c c DC( Di ) = CDi CDi + 1 c c c CV i CH i CD : vertical, horizontal, and i diagonal subbands co-occurrence matrices i = 1,2,3,4 c = r, g, b [ j] 2 Contrast = ( i j) DC i, Homogeneity = Correlation = = i j i j DC( i, j) i j 1+ i j i j ( i µ [ i j] 2 Energy DC, = i j [ j] log DC[ i j] Entropy DC i, i, 2 )( j µ σ σ i j j ) DC i [, j] IIH-MSP-29
13 Feature Selection and Classification Sequential Forward Feature Selection (SFFS) Support Vector Machine (SVM) C-support vector classification with non-linear RBF kernel IIH-MSP-29
14 Experiment Experiment samples and parameters Cameras Sensor Camera Parameters Max resolution Sample image parameters Image resolution Image format Kodak DC29 Unspecified CCD 224*15 224*15 JPEG Nikon E57 2/3 inch CCD 256*192 16*12 JPEG Sony DSC-F828 2/3 inch CCD 3264* *96 JPEG Canon PowerShot Pro1 2/3 inch CCD 3264* *768 JPEG Canon PowerShot G2 1/1.8 inch CCD 2272* *768 16* *174 JPEG Canon PowerShot G3 1/1.8 inch CCD 2272* *174 JPEG IIH-MSP-29
15 Experiment result of our method Confusion matrix Camera Kodak Nikon Sony CanonPro1 CanonG2 CanonG3 Accuracy Kodak DC % Nikon % Sony DSC-F % Canon PowerShot Pro % Canon PowerShot G % Canon PowerShot G % IIH-MSP-29
16 Comparison with Kharrazi s method Camera Kodak Nikon Sony CanonPro1 CanonG2 CanonG3 Accuracy Kharrazi s method 94.7% 91.3% 96.3% 85.3% 84.7% 93.3% 9.9% Our method 1% 98.7% 98.7% 96.7% 11.4% 95.3% 1.6% 98.7% 5.4% 98.2% IIH-MSP-29
17 Conclusions 1. Introduce feature based source camera identification 2. Discuss a classic feature based identification method 3. Give a new source camera identification method based on wavelet features IIH-MSP-29
18 Thank you! IIH-MSP-29
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.
More informationIDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION
Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models
More informationCamera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
Journal of Information Systems and Telecommunication, Vol. 1, No. 4, October - December 2013 233 Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM
More informationAutomatic source camera identification using the intrinsic lens radial distortion
Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationSource Camera Model Identification Using Features from contaminated Sensor Noise
Source Camera Model Identification Using Features from contaminated Sensor Noise Amel TUAMA 2,3, Frederic COMBY 2,3, Marc CHAUMONT 1,2,3 1 NÎMES UNIVERSITY, F-30021 Nîmes Cedex 1, France 2 MONTPELLIER
More informationApplying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science
FORENSIC SCIENCE JOURNAL SINCE 2002 Forensic Science Journal 2017;16(1):19-42 fsjournal.cpu.edu.tw DOI:10.6593/FSJ.2017.1601.03 Applying the Sensor Noise based Camera Identification Technique to Trace
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationCamera Model Identification Framework Using An Ensemble of Demosaicing Features
Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu
More informationForensic Classification of Imaging Sensor Types
Forensic Classification of Imaging Sensor Types Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a,edwardj.delp a a School of Electrical and Computer Engineering b School of
More informationImage Tampering Localization via Estimating the Non-Aligned Double JPEG compression
Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian
More informationFragile Sensor Fingerprint Camera Identification
Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationSOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS
SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic
More informationA Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens
A Simple and Effective Image-Statistics-Based Approach to Detecting Recaptured Images from LCD Screens Kai Wang Univ. Grenoble Alpes, CNRS, Grenoble INP, GIPSA-lab, 38000 Grenoble, France Abstract It is
More informationPoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2
Based on Cepstral Mixed Features 12 School of Information and Communication Engineering,Dalian University of Technology,Dalian, 116024, Liaoning, P.R. China E-mail:zww110221@163.com Xiangwei Kong, Xingang
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationExposing Image Forgery with Blind Noise Estimation
Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University
More informationDigital Photography Standards
Digital Photography Standards An Overview of Digital Camera Standards Development in ISO/TC42/WG18 Dr. Hani Muammar UK Expert to ISO/TC42 (Photography) WG18 International Standards Bodies International
More informationScanner Identification Using Sensor Pattern Noise
Scanner Identification Using Sensor Pattern Noise Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer Engineering b School
More informationCamera identification from sensor fingerprints: why noise matters
Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationMultimedia Forensics
Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer
More informationSmartphone image acquisition forensics using sensor fingerprint
IET Computer Vision Research Article Smartphone image acquisition forensics using sensor fingerprint ISSN 1751-9632 Received on 1st August 2014 Revised on 26th October 2014 Accepted on 24th November 2014
More informationDistinguishing between Camera and Scanned Images by Means of Frequency Analysis
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of
More informationDesign and Implementation of an Audio Classification System Based on SVM
Available online at www.sciencedirect.com Procedia ngineering 15 (011) 4031 4035 Advanced in Control ngineering and Information Science Design and Implementation of an Audio Classification System Based
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationSurvey On Passive-Blind Image Forensics
Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal
More informationVISUAL sensor technologies have experienced tremendous
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 1, MARCH 2007 91 Nonintrusive Component Forensics of Visual Sensors Using Output Images Ashwin Swaminathan, Student Member, IEEE, Min
More informationCS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee
CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area
More informationA Proposed Assessment Metrics for Image Steganography
International Journal on Cryptography and Information Security (IJCIS), Vol. 4, No., March 4 A Proposed Assessment Metrics for Image Steganography Mazhar Tayel, Hamed Shawky Department of Electrical Engineering,
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationGIVEN the fast and widespread penetration of multimedia
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008 539 Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust Ahmet Emir Dirik, Husrev Taha Sencar,
More informationConstructing local discriminative features for signal classification
Constructing local discriminative features for signal classification Local features for signal classification Outline Motivations Problem formulation Lifting scheme Local features Conclusions Toy example
More informationOpen Set Source Camera Attribution
Open Set Source Camera Attribution Filipe de O. Costa Institute of Computing University of Campinas (UNICAMP) Campinas, São Paulo, Brazil filipe.costa@students.ic.unicamp.br Michael Eckmann Dept. of Mathematics
More informationWavelet-based image compression
Institut Mines-Telecom Wavelet-based image compression Marco Cagnazzo Multimedia Compression Outline Introduction Discrete wavelet transform and multiresolution analysis Filter banks and DWT Multiresolution
More informationKeywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy
More informationCERIAS Tech Report Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance
CERIAS Tech Report 29-38 Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 4797-286
More informationISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationTECHNICAL DOCUMENTATION
TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification
More informationSeismic fault detection based on multi-attribute support vector machine analysis
INT 5: Fault and Salt @ SEG 2017 Seismic fault detection based on multi-attribute support vector machine analysis Haibin Di, Muhammad Amir Shafiq, and Ghassan AlRegib Center for Energy & Geo Processing
More informationClassification of Digital Photos Taken by Photographers or Home Users
Classification of Digital Photos Taken by Photographers or Home Users Hanghang Tong 1, Mingjing Li 2, Hong-Jiang Zhang 2, Jingrui He 1, and Changshui Zhang 3 1 Automation Department, Tsinghua University,
More informationImage Forgery. Forgery Detection Using Wavelets
Image Forgery Forgery Detection Using Wavelets Introduction Let's start with a little quiz... Let's start with a little quiz... Can you spot the forgery the below image? Let's start with a little quiz...
More informationA New Scheme for No Reference Image Quality Assessment
Author manuscript, published in "3rd International Conference on Image Processing Theory, Tools and Applications, Istanbul : Turkey (2012)" A New Scheme for No Reference Image Quality Assessment Aladine
More informationStudy on the Algorithm of Vibration Source Identification Based on the Optical Fiber Vibration Pre-Warning System
PHOTONIC SENSORS / Vol. 5, No., 5: 8 88 Study on the Algorithm of Vibration Source Identification Based on the Optical Fiber Vibration Pre-Warning System Hongquan QU, Xuecong REN *, Guoxiang LI, Yonghong
More informationKent Academic Repository
Kent Academic Repository Full text document (pdf Citation for published version Sandoval Orozco, A.L. and Arenas, Gonzalez and Rosales, Corripio and Garcia Villalba, L.J. and Hernandez-Castro, Julio C.
More informationEfficient Estimation of CFA Pattern Configuration in Digital Camera Images
Faculty of Computer Science Institute of Systems Architecture, Privacy and Data Security esearch roup Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Electronic Imaging 2010
More informationSurvey on Source Camera Identification Using SPN with PRNU
Survey on Source Camera Identification Using SPN with PRNU Prof. Kapil Tajane, Tanaya Salunke, Pratik Bhavsar, Shubham Bodhe Computer Department Pimpri Chinchwad College of Engeering, Akurdi ABSTRACT Retrieving
More informationISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,
FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection
More informationDigital Image Forgery Detection using Wavelet Decomposition and Edge Detection
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 2 Ver. IV (Mar Apr. 2015), PP 50-56 www.iosrjournals.org Digital Image Forgery Detection
More informationForgery Detection using Noise Inconsistency: A Review
Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by
More informationWeaving Density Evaluation with the Aid of Image Analysis
Lenka Techniková, Maroš Tunák Faculty of Textile Engineering, Technical University of Liberec, Studentská, 46 7 Liberec, Czech Republic, E-mail: lenka.technikova@tul.cz. maros.tunak@tul.cz. Weaving Density
More informationMandeep Singh Associate Professor, Chandigarh University,Gharuan, Punjab, India
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Face Recognition
More informationForensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification
Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence
More informationTO reduce cost, most digital cameras use a single image
134 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 17, NO. 2, FEBRUARY 2008 A Lossless Compression Scheme for Bayer Color Filter Array Images King-Hong Chung and Yuk-Hee Chan, Member, IEEE Abstract In most
More informationFeature Reduction and Payload Location with WAM Steganalysis
Feature Reduction and Payload Location with WAM Steganalysis Andrew Ker & Ivans Lubenko Oxford University Computing Laboratory contact: adk @ comlab.ox.ac.uk SPIE/IS&T Electronic Imaging, San Jose, CA
More informationMultimodal Face Recognition using Hybrid Correlation Filters
Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com
More informationAN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationCOLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee
COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the
More informationCharacterization of LF and LMA signal of Wire Rope Tester
Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Characterization of LF and LMA signal
More informationAnalysis of Wavelet Denoising with Different Types of Noises
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2016 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Kishan
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationDetermining the stego algorithm for JPEG images
STEGANOGRAPHY AND DIGITAL WATERMARKING Determining the stego algorithm for JPEG images T. Pevný and J. Fridrich Abstract: The goal of forensic steganalysis is to detect the presence of embedded data and
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationDemosaicing Algorithm for Color Filter Arrays Based on SVMs
www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationCCD Automatic Gain Algorithm Design of Noncontact Measurement System Based on High-speed Circuit Breaker
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 CCD Automatic Gain Algorithm Design of Noncontact Measurement System Based on High-speed
More informationNo-Reference Perceived Image Quality Algorithm for Demosaiced Images
No-Reference Perceived Image Quality Algorithm for Lamb Anupama Balbhimrao Electronics &Telecommunication Dept. College of Engineering Pune Pune, Maharashtra, India Madhuri Khambete Electronics &Telecommunication
More informationA Novel Multi-size Block Benford s Law Scheme for Printer Identification
A Novel Multi-size Block Benford s Law Scheme for Printer Identification Weina Jiang 1, Anthony T.S. Ho 1, Helen Treharne 1, and Yun Q. Shi 2 1 Dept. of Computing, University of Surrey Guildford, GU2 7XH,
More informationLane Detection in Automotive
Lane Detection in Automotive Contents Introduction... 2 Image Processing... 2 Reading an image... 3 RGB to Gray... 3 Mean and Gaussian filtering... 5 Defining our Region of Interest... 6 BirdsEyeView Transformation...
More informationDigital Image Processing
Digital Image Processing 3 November 6 Dr. ir. Aleksandra Pizurica Prof. Dr. Ir. Wilfried Philips Aleksandra.Pizurica @telin.ugent.be Tel: 9/64.345 UNIVERSITEIT GENT Telecommunicatie en Informatieverwerking
More informationCamera Model Identification With The Use of Deep Convolutional Neural Networks
Camera Model Identification With The Use of Deep Convolutional Neural Networks Amel Tuama, Frédéric Comby, Marc Chaumont To cite this version: Amel Tuama, Frédéric Comby, Marc Chaumont. Camera Model Identification
More informationDifferent-quality Re-demosaicing in Digital Image Forensics
Different-quality Re-demosaicing in Digital Image Forensics 1 Bo Wang, 2 Xiangwei Kong, 3 Lanying Wu *1,2,3 School of Information and Communication Engineering, Dalian University of Technology E-mail:
More informationOnline Large Margin Semi-supervised Algorithm for Automatic Classification of Digital Modulations
Online Large Margin Semi-supervised Algorithm for Automatic Classification of Digital Modulations Hamidreza Hosseinzadeh*, Farbod Razzazi**, and Afrooz Haghbin*** Department of Electrical and Computer
More informationBanknote Authentication
Banknote Authentication Eugen Gillich and Volker Lohweg init - Institute Industrial IT, Department of Electrical Engineering and Computer Science, Ostwestfalen-Lippe University of Applied Sciences, Liebigstr.
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationImage Forensics of High Dynamic Range Imaging
Image Forensics of High Dynamic Range Imaging Philip. J. Bateman, Anthony T. S. Ho, and Johann A. Briffa University of Surrey, Department of Computing, Guildford, Surrey, GU2 7XH, UK {P.Bateman,A.Ho,J.Briffa}@surrey.ac.uk
More informationSATELLITE images are used in many applications such as
IEEE GEOSCIENCE AND REMOTE SENSING LETTERS 1 Satellite Image Contrast Enhancement Using Discrete Wavelet Transform and Singular Value Decomposition Hasan Demirel, Cagri Ozcinar, and Gholamreza Anbarjafari
More informationAccording to the proposed AWB methods as described in Chapter 3, the following
Chapter 4 Experiment 4.1 Introduction According to the proposed AWB methods as described in Chapter 3, the following experiments were designed to evaluate the feasibility and robustness of the algorithms.
More informationThis work is protected by copyright and other intellectual property rights and duplication or sale of all or part is not permitted, except that
This work is protected by copyright and other intellectual property rights and duplication or sale of all or part is not permitted, except that material may be duplicated by you for research, private study,
More informationRetrieval of Large Scale Images and Camera Identification via Random Projections
Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management
More informationAutomatic Density Detection and Recognition of Fabric Structure Using Image Processing
RESEARCH ARTICLE OPEN ACCESS Automatic Density Detection and Recognition of Fabric Structure Using Image Processing Miss. Ravina D. Karnik 1,Prof.(Dr)Mrs.L.S.Admuthe 2 1(Department of Electronics, DKTE
More informationAnalysis on Color Filter Array Image Compression Methods
Analysis on Color Filter Array Image Compression Methods Sung Hee Park Electrical Engineering Stanford University Email: shpark7@stanford.edu Albert No Electrical Engineering Stanford University Email:
More informationCamera identification by grouping images from database, based on shared noise patterns
Camera identification by grouping images from database, based on shared noise patterns Teun Baar, Wiger van Houten, Zeno Geradts Digital Technology and Biometrics department, Netherlands Forensic Institute,
More informationDetection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery
Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,
More informationAdvanced Techniques in Urban Remote Sensing
Advanced Techniques in Urban Remote Sensing Manfred Ehlers Institute for Geoinformatics and Remote Sensing (IGF) University of Osnabrueck, Germany mehlers@igf.uni-osnabrueck.de Contents Urban Remote Sensing:
More informationPassive Measurement of Vertical Transfer Function in Ocean Waveguide using Ambient Noise
Proceedings of Acoustics - Fremantle -3 November, Fremantle, Australia Passive Measurement of Vertical Transfer Function in Ocean Waveguide using Ambient Noise Xinyi Guo, Fan Li, Li Ma, Geng Chen Key Laboratory
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationCS534 Introduction to Computer Vision. Linear Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University
CS534 Introduction to Computer Vision Linear Filters Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines What are Filters Linear Filters Convolution operation Properties of Linear Filters
More informationRobust watermarking based on DWT SVD
Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India anumol.josph00@gmail.com, anusudhak@yahoo.co.in Abstract
More informationAuthentication Algorithm for Color Images using Watermarking Techniques
Auntication Algorithm for Color Images using Watermarking Techniques LUIS ROSALES-ROLDAN, CLARA CRUZ-RAMOS, MARIKO NAKANO-MIYATAKE and HECTOR PEREZ-MEANA Postgraduate Section, Mechanical Electrical Engineering
More informationWavelet-Based Multiresolution Matching for Content-Based Image Retrieval
Wavelet-Based Multiresolution Matching for Content-Based Image Retrieval Te-Wei Chiang 1 Tienwei Tsai 2 Yo-Ping Huang 2 1 Department of Information Networing Technology, Chihlee Institute of Technology,
More informationPerformance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression Mr.P.S.Jagadeesh Kumar Associate Professor,
More informationFace Recognition System Based on Infrared Image
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 6, Issue 1 [October. 217] PP: 47-56 Face Recognition System Based on Infrared Image Yong Tang School of Electronics
More informationWheel Health Monitoring Using Onboard Sensors
Wheel Health Monitoring Using Onboard Sensors Brad M. Hopkins, Ph.D. Project Engineer Condition Monitoring Amsted Rail Company, Inc. 1 Agenda 1. Motivation 2. Overview of Methodology 3. Application: Wheel
More informationVyshali S, Suresh Kumar R
An Implementation of Automatic Clothing Pattern and Color Recognition for Visually Impaired People Vyshali S, Suresh Kumar R Abstract Daily chores might be a difficult task for visually impaired people.
More informationFILE # CANON POWERSHOT A3400 IS CHARGER EBOOK
28 November, 2018 FILE # CANON POWERSHOT A3400 IS CHARGER EBOOK Document Filetype: PDF 448.31 KB 0 FILE # CANON POWERSHOT A3400 IS CHARGER EBOOK Charge your PowerShot A3400 IS battery pack in a flash with
More informationSupervisors: Rachel Cardell-Oliver Adrian Keating. Program: Bachelor of Computer Science (Honours) Program Dates: Semester 2, 2014 Semester 1, 2015
Supervisors: Rachel Cardell-Oliver Adrian Keating Program: Bachelor of Computer Science (Honours) Program Dates: Semester 2, 2014 Semester 1, 2015 Background Aging population [ABS2012, CCE09] Need to
More informationInfrasound Source Identification Based on Spectral Moment Features
International Journal of Intelligent Information Systems 2016; 5(3): 37-41 http://www.sciencepublishinggroup.com/j/ijiis doi: 10.11648/j.ijiis.20160503.11 ISSN: 2328-7675 (Print); ISSN: 2328-7683 (Online)
More informationImage Processing Of Oct Glaucoma Images And Information Theory Analysis
University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 1-1-2009 Image Processing Of Oct Glaucoma Images And Information Theory Analysis Shuting Wang University of
More information