DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

Size: px
Start display at page:

Download "DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES"

Transcription

1 International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj Chittapur, Basaveshwar Engineering College, Bagalkot; S. Murali, Maharaja College Of Engineering Mysore; Abstract We are proposing forensic techniques that are capable of detecting traces of tampering in digital Video without specialized hardware. These techniques operate under The assumption that video contain naturally occurring properties which are disturbed by Tampering, and which can be quantifed, measured, and used to expose video fakes. In this context we are proposing techniques used in copy-paste and copy move interlaced video frames using statistical mean comparision.these techniques provide a valuable forensic techniques for authenticating digital video. Introduction Image and video forgery Nowadays, we come across doctored images and videos frequently and unknowingly. While these images might tarnish the public opinion of a celebrity, cases involving manipulated images with more serious implications have arisen in science and law. The art of making an image/video forgery is as old as photography itself. In its early years, photography became the chosen method for making portraits, and portrait photographers learned that they could improve sales by retouching their photographs to please the purchaser [1]. Photo and video manipulation has become more common in the age of digital cameras and image editing software. In recent years, an exhaustive inventory of every photo manipulation in video would be nearly impossible, so we focus here on the instances that have been most controversial or notorious, or ones that raise the most interesting ethical questions [2]. The photographers have also experimented with video composing, i.e., combining multiple images into one and creating doctored videos. Digital images/video offer many attributes for tamper detection algorithms to take advantage of, specifically the color and brightness of individual pixels as well as the resolution and format. These properties provide scope for the analysis and comparison between the fundamentals of digital forgeries in an effort to develop a better algorithm for detecting tampering in a video. Two types of video forensics schemes are widely used for image/video forgery detection: Active schemes and Passive schemes. In the active schemes, a watermark is used to detect tampering. However, this scheme needs a facility to embed the watermark [3]. On contrary, the Passive schemes extract some intrinsic characteristics of image/video to detect the tampered regions. In this paper we propose a passive forgery detection method based on the statistical mean comparison. Temporal difference of each frame in the input video is analyzed. This process has successfully detected tampered regions. Related Work on Video Forgery Currently, most acquisition and manipulation tools use the JPEG and MPEG standard for image and video compression. As a result, one of the standard approaches is to use the blocking fingerprints introduced by MPEG compression, as reliable indicators of possible image tampering. Not only do these inconsistencies help determine possible forgery, they can also be used to detect the abnormalities due to addition or removal of frames in the video sequence, modified regions or masked regions in the frames. Many passive schemes have been developed for tampered region detection of in-painting JPEG images [4], Histogram equalization based contrast enhancement techniques [5], Blue screen special effects in videos [6], Markov model on motion residue video [7], Ballistics motion [8], Non-sampled contourlet Transformation and Gradients information [9], Advanced statistical and adaptive threshold [10], Correlation noise residue [11], Double MPEG compression [12], Detection duplication [13], Detecting double quantization [14], Photo image forgery techniques [15,17] Luminance Level Techniques [16], and, Anti-forensic techniques for frame add/delete in mpeg video[18]. Though these algorithms show good results they are complicated and take more time to compute. There is need to overcome these two drawbacks. ISSN No: E-ICETT

2 Methodology and Implementation When a video sequence is captured, there is typically a great deal of redundancy between the successive frames of video. The MPEG video compression technique exploits this redundancy by predicting certain frames in the video sequence from others, then by encoding the residual difference between the predicted frame and the actual frame. Because the predicted difference can be compressed at a higher rate than a frame in its entirety, this leads to a more efficient compression scheme. Performing compression in this manner has its drawbacks, however, because error introduced from one frame will propagate to all frames predicted from it. To prevent error propagation, the video sequence is divided into segments, where each segment is referred to as a group of pictures (gp). Frame prediction is performed within each segment, but never across segments, thus preventing decoding errors in one frame from spreading throughout video sequence. Within each group of pictures, frames are divided into three types: intraframes (I-frames), predicted-frames (P-frames), and bidirectional-frames (B-frames). Each gp begins with an I- frame, followed by a number of P-frames and B-frames. No prediction is performed when encoding I-frames; therefore each I-frame is encoded and decoded independently. During encoding, each I-frame is compressed through a loss process similar to JPEG compression. P-frames are predicatively encoded through a process known as motion estimation. A predicted version of the current P-frame is obtained by first segmenting the frame into 16X16 pixel blocks known as macro blocks, then searching the previous P or I-frame, known as the anchor frame, for the macro block that best matches each macro block in the current P-frame. The locations of these macro blocks in the anchor frame are stored, along with how far each macro block must be displaced to create the predicted frame. These displacements are referred to as motion vectors. The residual error between the predicted frame and the current frame, known as the prediction error, is then compressed using the same JPEG like process that I-frames undergo. Mean Frame Comparison Technique In the given input video, read the content of pictures in terms of input video frames as well as read the content of source of original video frames where in Mean compare operation is performed on every frame of the video.the Mean comparison is performed in frame-by-frame fashion i.e. each and every pixel undergoes Comparison with pixel-by-pixel comparison and extracting the mean of each frame in frame set. On comparison of frames, if the mean value of frames in frame set value is equal then that area is masked in black. If there is any difference in the frame value between these groups of pictures then that area/region can be identified to be tampered. The result viewed will show a black masked area where there is no difference between these group of picture frames i.e. no difference between the pixel value of original and forged frames in videos. And the area where there is pixel frame difference will be highlighted which was a tampered area is been suspected; mathematical model for Mean Comparison is given as: Let f (x) is the original group of picture frame set and let f (y) is the forged group of picture frame set by extracting the features of each frames in forged video set On using Mean Comparisons we obtained as f (z) = f (x) ~ f(y) (1) Where f(z) is the suspected and identified forged region of picture frames in digital videos where f(x) and f(y) are original and forged feature set videos. Audio Forgery Detection Video is made of Moving frames, each attached with an audio. So if changes in audio are made, it is also called forgery. We have implemented a methodology which detects audio forgery in a video. The methodology works as follows. Firstly, the video which is to checked whether it is forged or not is loaded. Then, audio is extracted from the video using some software s and later it converted into wav file. Now the audio is segmented. These segments Ea features are extracted and written in a text file. Now these features are compared with the original segments. And forged segments are found out and classified. Now join only the forged segments and play it. Finally, only the forged audio is found. Mathematically represented as, Assume F(x 1 ) as original and F(x 2 ) as Forged. F(x 1 ) = ( F(a 1 ) + F(a 2 ) + + F(a n ) ) (2) F(x 2 ) = ( F(a 1 ) + F(a 2 ) + + F(a n ) ) (3) Compare the segments and extract only the forged parts and join them. F(y) = (F(a i ) + F(a i+1 ) F(a n ) ) (4) Here the Equation (4) shows the region of forged audio part of tested video i.e. F(y) is the forged part. Results and Discussion Videos have been captured from Sony digital camera, and algorithm implementation has been done in Mat Lab. Also, 100 different videos from various galleries including categories of indoor and outdoor scenes were used for testing. Forgery detection was quite successful in all categories of videos. ISSN No: E-ICETT

3 (ii) Forgery Set identified in video Frame Gallery Fig1. Explains Original Video frames from Original Video (iii) Forged Audio Part Detected Fig2. Explains Forged Video frames from Forgery Video forged original Fig 3. Resultant of Forgery Region Detection of Mean Frame algorithm. Fig4. Result of Mean Frame Comparison Graph of (I) Original Frame Set Gallery From the Figure (1), (2) and (3) explains about an example of Original Frames from tested video later on which is being forged with the help of video editing software with changing Contrast and some part of the frames are changed the content of frame information by applying skillful set where normal person won't be identified with his eyes as forgery one. We testes those videos with perception based and succeeded. With references of Figure (3) it explains the mean compression algorithm result and identified the forgery region in given forged input video as test image. Figure (4) explains the result of average mean of tested original frames (i) and same result can be extracted for forgery frames (ii), we succeed by considering mean comparison between tested original and forged videos.(iii) Explains audio forged region detection with the help of statistical mean frame with extracted feature detection method. Even though we computed for success Rate and Precision Rate for tested video Gallery. The precision and recall rates (Equations (2) and (3)), have been computed based on the number of correctly detected tampered parts in forged videos, in an order to further evaluated the efficiency and robustness. The precision rate is defined as the ration of correctly detected parts to the sum of correctly detected parts plus false positive. False positive are those regions in the image, which are actually not tampered parts, but have detected by the algorithm as tampered parts. ISSN No: E-ICETT

4 Correctly detected parts Precision Rate = * (2) Correctly detected parts + False Positives The Recall rate is defined as the ratio of correctly detected parts to the sum of correctly detected parts plus false negatives. False negatives are those regions in the image, which are actually tampered parts, but have been not detected by the algorithm. Correctly detected parts Recall Rate = * 100% (3) Correctly detected parts + False Negatives With the help of equation (2) and (3) we succeeded to compute precision rate and recall rate of Mean comparison Algorithm. Table 1 explains the predicating success rate and precision rate of forgery frames applicable in video forgery set. TOOLS USED FOR FRAME SET FORGERY NO OF FRAMES IN FORGERY TESTED VIDEO PRECISSION RATE USING PAINT USING PHOTO SHOP HETROGINIOUS TOOLS RECALL RATE We are getting good result in frames forgery done with paint and heterogeneous image frame editing software s by applying various frame enhancement and modification techniques and lesser in advance frame editing techniques supported by photo shop tool. Conclusion This Paper outlined the methodology used in detecting digital video tampering from images with known and unknown origin. While it is difficult to predict exactly how a malicious person will forge an video, a wide range of techniques have been presented to account for tamper methods. The detection system proposed mean frame comparison technique includes methods based on Mean and pixel comparison of each frames in video data frame set used with unknown image source. An experiment testing this method has been set-up that will help in determining the accuracy and correctness of the proposed tamper detection techniques, as well as when each fails. It has been conjectured that these methods will help in detecting various types of image forgeries, but one has to acknowledge that no silver-bullet exists to account for every type of forgery imaginable. To wrap up testing, an independent experiment is presented to help analyze the correctness of this system of techniques at accurately identifying blind frame set in videos as authentic or forged. Precision rate and recall rate are based on subjective to the forger skills set; it is completely dependent on how forger can viewed and modifies frames in videos. Predication of such skill is challenging for every digital forensic investigator and technocrats. Reference [1] Baxes, G. A., Digital Image Processing: Principles and Applications. New York: John Wiley & Sons, Inc, [2] [3] T.-T. Ng, S.-F. Chang, C.-Y. Lin, and Q. Sun, Passiveblind image forensics, In Multimedia Security Technologies for Digital Rights, W. Zeng, H. Yu, and C.- Y. Lin (eds.), Elsevier, Y.Q. Zhao, et al., Tampered region detection of inpainting JPEG images, Optik - Int. J. Light Electron Opt. (2012), [4] Soong-Der Chen, et al., A new image quality measure for assessment of histogram equalization-based Contrast enhancement techniques, Int. J. Digital Signal Processing 22 (2012) , [5] Junyu Xu,, et al Detection of Blue Screen Special Effects in Videos Physics Procedia 33 ( 2012 ) doi: /j.phpro [6] kesev kancherla et al. Novel Blind Video Forgery Detection Using Markov Models on Motion Residue Intelligent Information and Database Systems Lecture Notes in Computer Science Volume 7198, 2012, pp [7] Hany Farid et al. Exposing Digital Forgeries in Ballistic Motion, IEEE Transactions on information forensics and security VOL. 7, NO. 1, FEBRUARY 2012, doi: /TIFS [8] Richao chen et al. video forgery detection based on Non-sub sampled contourlet Transformation and Gradient Information Informational Technology Journal, 2012 ISSN: doi: /itj.2012 [9] Lakis Christodoulou et al., Advanced statistical and Adaptive Threshold Techniques for moving object detection and segmentation 17th International ISSN No: E-ICETT

5 Conference on Digital signal processing doi: /ICDSP [10] Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin and Chiou-Ting Hsu Video Forgery detection using correlation of noise residue Department of Electrical Engineering Tiwan. [11] wehiong wong and Hany Farid Exposing Digital Forgeries in video by detecting double MPEG compresson Proceeding of MM& SEC 2006, ACM Publications ACM /06/0009 [12] wehiong wong and Hany Farid Exposing Digital Forgeries in video by detecting doublication Proceeding of MM& SEC 2007, ACM /07/0009 [13] wehiong wong and Hany Farid Exposing Digital Forgeries in video by detecting double quantization Proceeding of MM& SEC 2009, ACM /07/0009 [14] S. Murali,Govindraj B. Chittapur,Anami Basavaraj S. Detection Of Digital Photo Image Forgery 2012 IEEE International Confernce On Advanced Communication and Control Technology doi: /ICACCCT [15] S. Murali, Anami B.S and Chittapur G.B Detection of Copy-Create Image Forgery Using Luminance Level Techniques 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, doi: /NCVPRIPG [16] Murali S., Anami B. S and Chittapur G. B Detection of Photo- Forgery Detection Techniques International Journal Of Machine Intelligence Issn: EIssn: : 2012 Volume: 4 Issue: 1 [17] Stamm, M.C and K.J. Ray Liu, Anti-forensics for frame deletion/addition in MPEG video 2011 IEEE International Conference on acoustics, speech and signal processing, doi: /ICASSP [18] S. Murali,Basavaraj S. Anami,Govindraj B. Chittapur Detection Of Digital Photo Image Forgery Using JPEG and Direction Filters Proceedings Of International Conference On Current Trends in Engineering and Management,ICCTEM ISBN pp::71. [19] S. Murali, Anami Basavaraj S, Chittapur Govindraj B., Detection Of Digital Photo Image Forgery Advanced communication, Control and Computing Technology 2012 IEEE International Conference Ramanathapuram, Print ISBN: , doi: /ICACCCT , PP: [20] S. Murali, Govindraj B. Chittapur, Prabhakara H.S Format Based Photo Image Forgery Detection CCSEIT -12, Proceedings of second International Conference On Computer Science, Engineering and Information Technology,ACM New York Ny, USA ISBN: , doi: / PP: [21] S. Murali,Govindraj B. Chittapur, Prabhakara H.S Detection Of Digital Photo Image Forgery Using Copy- Create Techniques Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012), Lecture Notes in Electrical Engineering 221, DOI: / _26, _ Springer India 2013,pp: [22] Murali S, Anmi B. S, Chittapur G. B DIGITAL PHOTO IMAGE- FORGERY DETECTION TECHNIQUES International Journal Of Machine Intelligence ISSN Volume: 4; Issue: 1;2012 pp:405 [23] S. Murali, Govindraj B. Chittapur, Prabhakara H. S and Basavaraj S. Anami Comparison and Analysis Of Photo Image Forgery Detection Techniques International Journal Of Computer Science And Applications, Vol: 2No:6 December pp: [24] S. Murali, Govindraj B. Chittapur and Basavaraj S. Anami Jpeg and Direction Filters:Photo Image forgery Detection Techniques International Journal Of Computer Science, systems and Information Technology, Serial Publications, vol 5,No2,2012 ISSN: PP: ISSN No: E-ICETT

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Format Based Photo Forgery Image Detection S. Murali

Format Based Photo Forgery Image Detection S. Murali Format Based Photo Forgery Image Detection S. Murali Govindraj B. Chittapur H. S. Prabhakara Maharaja Research Foundation MIT, Mysore, INDIA Basaveshwar Engineering College Bagalkot, INDIA Maharaja Research

More information

Literature Survey on Image Manipulation Detection

Literature Survey on Image Manipulation Detection Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,

More information

Multimedia Forensics

Multimedia Forensics Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Impeding Forgers at Photo Inception

Impeding Forgers at Photo Inception Impeding Forgers at Photo Inception Matthias Kirchner a, Peter Winkler b and Hany Farid c a International Computer Science Institute Berkeley, Berkeley, CA 97, USA b Department of Mathematics, Dartmouth

More information

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ A REVIEW OF TRENDS IN DIGITAL IMAGE PROCESSING FOR FORENSIC CONSIDERATION Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³ Department of Forensic Science Sam Higginbottom Institute of agriculture Technology

More information

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department

More information

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Exposing Digital Forgeries from JPEG Ghosts

Exposing Digital Forgeries from JPEG Ghosts 1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person

More information

Compression and Image Formats

Compression and Image Formats Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application

More information

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area

More information

Tampering and Copy-Move Forgery Detection Using Sift Feature

Tampering and Copy-Move Forgery Detection Using Sift Feature Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:

More information

Digital Image Processing Introduction

Digital Image Processing Introduction Digital Processing Introduction Dr. Hatem Elaydi Electrical Engineering Department Islamic University of Gaza Fall 2015 Sep. 7, 2015 Digital Processing manipulation data might experience none-ideal acquisition,

More information

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Image Forgery Identification Using JPEG Intrinsic Fingerprints 1 Image Forgery Identification Using JPEG Intrinsic Fingerprints A. Garg, A. Hailu, and R. Sridharan Abstract In this paper a novel method for image forgery detection is presented. he method exploits the

More information

Neuro-Fuzzy based First Responder for Image forgery Identification

Neuro-Fuzzy based First Responder for Image forgery Identification ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Exposing Photo Manipulation with Geometric Inconsistencies

Exposing Photo Manipulation with Geometric Inconsistencies Exposing Photo Manipulation with Geometric Inconsistencies James F. O Brien U.C. Berkeley Collaborators Hany Farid Eric Kee Valentina Conotter Stephen Bailey 1 image-forensics-pg14.key - October 9, 2014

More information

Automation of JPEG Ghost Detection using Graph Based Segmentation

Automation of JPEG Ghost Detection using Graph Based Segmentation International Journal Of Computational Engineering Research (ijceronline.com) Vol. Issue. 2 Automation of JPEG Ghost Detection using Graph Based Segmentation Archana V Mire, Dr S B Dhok 2, Dr P D Porey,

More information

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot 24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor Umesh 1,Mr. Suraj Rana 2 1 M.Tech Student, 2 Associate Professor (ECE) Department of Electronic and Communication Engineering

More information

Tampering Detection Algorithms: A Comparative Study

Tampering Detection Algorithms: A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,

More information

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Chiew K.T., et al. (Eds.): PGRES 2017, Kuala Lumpur: Eastin Hotel, FCSIT, 2017: pp 35-42 IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES Thamarai Subramaniam and Hamid

More information

Practical Content-Adaptive Subsampling for Image and Video Compression

Practical Content-Adaptive Subsampling for Image and Video Compression Practical Content-Adaptive Subsampling for Image and Video Compression Alexander Wong Department of Electrical and Computer Eng. University of Waterloo Waterloo, Ontario, Canada, N2L 3G1 a28wong@engmail.uwaterloo.ca

More information

Countering Anti-Forensics of Lateral Chromatic Aberration

Countering Anti-Forensics of Lateral Chromatic Aberration IH&MMSec 7, June -, 7, Philadelphia, PA, USA Countering Anti-Forensics of Lateral Chromatic Aberration Owen Mayer Drexel University Department of Electrical and Computer Engineering Philadelphia, PA, USA

More information

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012 A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become

More information

Wavelet-based Image Splicing Forgery Detection

Wavelet-based Image Splicing Forgery Detection Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of

More information

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic

More information

Forensic Hash for Multimedia Information

Forensic Hash for Multimedia Information Forensic Hash for Multimedia Information Wenjun Lu, Avinash L. Varna and Min Wu Department of Electrical and Computer Engineering, University of Maryland, College Park, U.S.A email: {wenjunlu, varna, minwu}@eng.umd.edu

More information

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian

More information

Quality Measure of Multicamera Image for Geometric Distortion

Quality Measure of Multicamera Image for Geometric Distortion Quality Measure of Multicamera for Geometric Distortion Mahesh G. Chinchole 1, Prof. Sanjeev.N.Jain 2 M.E. II nd Year student 1, Professor 2, Department of Electronics Engineering, SSVPSBSD College of

More information

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in

More information

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

IMAGE COMPOSITE DETECTION USING CUSTOMIZED IMAGE COMPOSITE DETECTION USING CUSTOMIZED Shrishail Math and R.C.Tripathi Indian Institute of Information Technology,Allahabad ssm@iiita.ac.in rctripathi@iiita.ac.in ABSTRACT The multimedia applications

More information

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images

Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images Two Improved Forensic Methods of Detecting Contrast Enhancement in Digital Images Xufeng Lin, Xingjie Wei and Chang-Tsun Li Department of Computer Science, University of Warwick, Coventry, CV4 7AL, UK

More information

Survey On Passive-Blind Image Forensics

Survey On Passive-Blind Image Forensics Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal

More information

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

Zero-Based Code Modulation Technique for Digital Video Fingerprinting Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and

More information

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online): 2321-0613 High-Quality Jpeg Compression using LDN Comparison and Quantization Noise Analysis S.Sasikumar

More information

An Efficient Method for Vehicle License Plate Detection in Complex Scenes

An Efficient Method for Vehicle License Plate Detection in Complex Scenes Circuits and Systems, 011,, 30-35 doi:10.436/cs.011.4044 Published Online October 011 (http://.scirp.org/journal/cs) An Efficient Method for Vehicle License Plate Detection in Complex Scenes Abstract Mahmood

More information

S SNR 10log. peak peak MSE. 1 MSE I i j

S SNR 10log. peak peak MSE. 1 MSE I i j Noise Estimation Using Filtering and SVD for Image Tampering Detection U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur Walchand College of Engineering, Sangli

More information

Fragile Sensor Fingerprint Camera Identification

Fragile Sensor Fingerprint Camera Identification Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera

More information

Camera identification from sensor fingerprints: why noise matters

Camera identification from sensor fingerprints: why noise matters Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS

More information

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION

Dr. Kusam Sharma *1, Prof. Pawanesh Abrol 2, Prof. Devanand 3 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Feature Based Analysis of Copy-Paste Image Tampering

More information

Digital Image Forgery Detection using Wavelet Decomposition and Edge Detection

Digital Image Forgery Detection using Wavelet Decomposition and Edge Detection IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 2 Ver. IV (Mar Apr. 2015), PP 50-56 www.iosrjournals.org Digital Image Forgery Detection

More information

SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES. Received August 2008; accepted October 2008

SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES. Received August 2008; accepted October 2008 ICIC Express Letters ICIC International c 2008 ISSN 1881-803X Volume 2, Number 4, December 2008 pp. 409 414 SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES

More information

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES

IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES IMAGE QUALITY FEATURE BASED DETECTION ALGORITHM FOR FORGERY IN IMAGES Shrishail Math 1 and R.C.Tripathi Indian Institute of Information Technology, Allahabad, India,1101 1 ssm@iiita.ac.in rctripathi@iiita.ac.in

More information

PRIOR IMAGE JPEG-COMPRESSION DETECTION

PRIOR IMAGE JPEG-COMPRESSION DETECTION Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION

More information

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns

More information

Information Forensics: An Overview of the First Decade

Information Forensics: An Overview of the First Decade Received March 8, 2013, accepted April 6, 2013, published May 10, 2013. Digital Object Identifier 10.1109/ACCESS.2013.2260814 Information Forensics: An Overview of the First Decade MATTHEW C. STAMM (MEMBER,

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

Forgery Detection using Noise Inconsistency: A Review

Forgery Detection using Noise Inconsistency: A Review Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by

More information

Copy-Move Image Forgery Detection using SVD

Copy-Move Image Forgery Detection using SVD Copy-Move Image Forgery Detection using SVD Mr. Soumen K. Patra 1, Mr. Abhijit D. Bijwe 2 1M. Tech in Communication, Department of Electronics & Communication, Priyadarshini Institute of Engineering &

More information

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008 Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright

More information

An Efficient Method for Contrast Enhancement in Still Images using Histogram Modification Framework

An Efficient Method for Contrast Enhancement in Still Images using Histogram Modification Framework Journal of Computer Science 8 (5): 775-779, 2012 ISSN 1549-3636 2012 Science Publications An Efficient Method for Contrast Enhancement in Still Images using Histogram Modification Framework 1 Ravichandran,

More information

IMAGE SPLICING FORGERY DETECTION

IMAGE SPLICING FORGERY DETECTION IMAGE SPLICING FORGERY DETECTION 1 SIDDHI GAUR, 2 SHAMIK TIWARI 1 M.Tech, 2 Assistant Professor, Dept of CSE, Mody University of Science and Technology, Sikar,India E-mail: 1 siddhi.gaur14@gmail.com, 2

More information

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3

Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan 2 Prof. Ramayan Pratap Singh 3 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 05, 2015 ISSN (online: 2321-0613 Artifacts and Antiforensic Noise Removal in JPEG Compression Bismitha N 1 Anup Chandrahasan

More information

Global Contrast Enhancement Detection via Deep Multi-Path Network

Global Contrast Enhancement Detection via Deep Multi-Path Network Global Contrast Enhancement Detection via Deep Multi-Path Network Cong Zhang, Dawei Du, Lipeng Ke, Honggang Qi School of Computer and Control Engineering University of Chinese Academy of Sciences, Beijing,

More information

Color Image Segmentation in RGB Color Space Based on Color Saliency

Color Image Segmentation in RGB Color Space Based on Color Saliency Color Image Segmentation in RGB Color Space Based on Color Saliency Chen Zhang 1, Wenzhu Yang 1,*, Zhaohai Liu 1, Daoliang Li 2, Yingyi Chen 2, and Zhenbo Li 2 1 College of Mathematics and Computer Science,

More information

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid

A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University Images and Graphics Images and Graphics Graphics and images are non-textual information that can be displayed and printed. Graphics (vector graphics) are an assemblage of lines, curves or circles with

More information

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING Gilbert Peterson Abstract The use of digital photography has increased over the past few years, a trend which opens the door for new and creative

More information

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network 436 JOURNAL OF COMPUTERS, VOL. 5, NO. 9, SEPTEMBER Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network Chung-Chi Wu Department of Electrical Engineering,

More information

University of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999.

University of Bristol - Explore Bristol Research. Peer reviewed version Link to published version (if available): /ISCAS.1999. Fernando, W. A. C., Canagarajah, C. N., & Bull, D. R. (1999). Automatic detection of fade-in and fade-out in video sequences. In Proceddings of ISACAS, Image and Video Processing, Multimedia and Communications,

More information

Bandit Detection using Color Detection Method

Bandit Detection using Color Detection Method Available online at www.sciencedirect.com Procedia Engineering 29 (2012) 1259 1263 2012 International Workshop on Information and Electronic Engineering Bandit Detection using Color Detection Method Junoh,

More information

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models

More information

An Improved Bernsen Algorithm Approaches For License Plate Recognition

An Improved Bernsen Algorithm Approaches For License Plate Recognition IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 78-834, ISBN: 78-8735. Volume 3, Issue 4 (Sep-Oct. 01), PP 01-05 An Improved Bernsen Algorithm Approaches For License Plate Recognition

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

How Many Pixels Do We Need to See Things?

How Many Pixels Do We Need to See Things? How Many Pixels Do We Need to See Things? Yang Cai Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA ycai@cmu.edu

More information

Subjective evaluation of image color damage based on JPEG compression

Subjective evaluation of image color damage based on JPEG compression 2014 Fourth International Conference on Communication Systems and Network Technologies Subjective evaluation of image color damage based on JPEG compression Xiaoqiang He Information Engineering School

More information

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. Home The Book by Chapters About the Book Steven W. Smith Blog Contact Book Search Download this chapter in PDF

More information

Method for Real Time Text Extraction of Digital Manga Comic

Method for Real Time Text Extraction of Digital Manga Comic Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University

More information

Effective Contrast Enhancement using Adaptive Gamma Correction and Weighting Distribution Function

Effective Contrast Enhancement using Adaptive Gamma Correction and Weighting Distribution Function e t International Journal on Emerging Technologies (Special Issue on ICRIET-2016) 7(2): 299-303(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Effective Contrast Enhancement using Adaptive

More information

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com

More information

A Mathematical model for the determination of distance of an object in a 2D image

A Mathematical model for the determination of distance of an object in a 2D image A Mathematical model for the determination of distance of an object in a 2D image Deepu R 1, Murali S 2,Vikram Raju 3 Maharaja Institute of Technology Mysore, Karnataka, India rdeepusingh@mitmysore.in

More information

Adaptive Gamma Correction With Weighted Distribution And Recursively Separated And Weighted Histogram Equalization: A Comparative Study

Adaptive Gamma Correction With Weighted Distribution And Recursively Separated And Weighted Histogram Equalization: A Comparative Study Adaptive Gamma Correction With Weighted Distribution And Recursively Separated And Weighted Histogram Equalization: A Comparative Study Meenu Dailla Student AIMT,Karnal India Prabhjot Kaur Asst. Professor

More information

RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS

RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT DETECTION IN VIDEO IMAGES USING CONNECTED COMPONENT ANALYSIS International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(4), pp.137-141 DOI: http://dx.doi.org/10.21172/1.74.018 e-issn:2278-621x RESEARCH PAPER FOR ARBITRARY ORIENTED TEAM TEXT

More information

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS

ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS ENF ANALYSIS ON RECAPTURED AUDIO RECORDINGS Hui Su, Ravi Garg, Adi Hajj-Ahmad, and Min Wu {hsu, ravig, adiha, minwu}@umd.edu University of Maryland, College Park ABSTRACT Electric Network (ENF) based forensic

More information

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.

A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L. A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, 138632,

More information

Auditory modelling for speech processing in the perceptual domain

Auditory modelling for speech processing in the perceptual domain ANZIAM J. 45 (E) ppc964 C980, 2004 C964 Auditory modelling for speech processing in the perceptual domain L. Lin E. Ambikairajah W. H. Holmes (Received 8 August 2003; revised 28 January 2004) Abstract

More information

Applications & Theory

Applications & Theory Applications & Theory Azadeh Kushki azadeh.kushki@ieee.org Professor K N Plataniotis Professor K.N. Plataniotis Professor A.N. Venetsanopoulos Presentation Outline 2 Part I: The case for WLAN positioning

More information

Matlab Based Vehicle Number Plate Recognition

Matlab Based Vehicle Number Plate Recognition International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 9 (2017), pp. 2283-2288 Research India Publications http://www.ripublication.com Matlab Based Vehicle Number

More information

Analysis of Various Methodology of Hand Gesture Recognition System using MATLAB

Analysis of Various Methodology of Hand Gesture Recognition System using MATLAB Analysis of Various Methodology of Hand Gesture Recognition System using MATLAB Komal Hasija 1, Rajani Mehta 2 Abstract Recognition is a very effective area of research in regard of security with the involvement

More information

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin

A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION. Scott Deeann Chen and Pierre Moulin A TWO-PART PREDICTIVE CODER FOR MULTITASK SIGNAL COMPRESSION Scott Deeann Chen and Pierre Moulin University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering 5 North Mathews

More information

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying 1,HAN Yan-bin 2 and ZHANG Yu-lin 3 1 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China

More information

EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY

EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY S.Gayathri 1, N.Mohanapriya 2, B.Kalaavathi 3 1 PG student, Computer Science and Engineering,

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

On the efficiency of luminance-based palette reordering of color-quantized images

On the efficiency of luminance-based palette reordering of color-quantized images On the efficiency of luminance-based palette reordering of color-quantized images Armando J. Pinho 1 and António J. R. Neves 2 1 Dep. Electrónica e Telecomunicações / IEETA, University of Aveiro, 3810

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMAGE COMPRESSION FOR TROUBLE FREE TRANSMISSION AND LESS STORAGE SHRUTI S PAWAR

More information

Comparative Analysis of Lossless Image Compression techniques SPHIT, JPEG-LS and Data Folding

Comparative Analysis of Lossless Image Compression techniques SPHIT, JPEG-LS and Data Folding Comparative Analysis of Lossless Compression techniques SPHIT, JPEG-LS and Data Folding Mohd imran, Tasleem Jamal, Misbahul Haque, Mohd Shoaib,,, Department of Computer Engineering, Aligarh Muslim University,

More information

Independent Component Analysis- Based Background Subtraction for Indoor Surveillance

Independent Component Analysis- Based Background Subtraction for Indoor Surveillance Independent Component Analysis- Based Background Subtraction for Indoor Surveillance Du-Ming Tsai, Shia-Chih Lai IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 1, pp. 158 167, JANUARY 2009 Presenter

More information

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras

More information