Image Forgery. Forgery Detection Using Wavelets
|
|
- Laureen Brooke O’Brien’
- 5 years ago
- Views:
Transcription
1 Image Forgery Forgery Detection Using Wavelets
2 Introduction Let's start with a little quiz...
3 Let's start with a little quiz... Can you spot the forgery the below image?
4 Let's start with a little quiz... Can you recognize these identical patches? Existed in the original image Pasted here
5 Let's start with a little quiz... This is the original image: The following detail was hidden
6 Let's start with a little quiz... Can you spot the forgery the below image?
7 Let's start with a little quiz... Can you recognize these identical patches? Existed in the original image Pasted here Pasted here
8 Let's start with a little quiz... This is the original image: The following detail was hidden
9 Let's start with a little quiz... Can you spot the forgery the below image?
10 Let's start with a little quiz... Can you recognize these identical patches? Pasted here Existed in the original image
11 Let's start with a little quiz... This is the original image: The following detail was hidden
12 Introduction The Problem So, as you can probably guess from the quiz we started with, we want to deal with the problem of image forgery by copying and pasting patches from the original image into itself, which is commonly used for hiding image details... Forge...
13 Let's go on...
14 Introduction Our Goal So, our goal is to detect the image forgery i.e. we want to detect and spot 2 or more image patches which are very similar. We base on the fact that in a natural image, the probability of patches to be that similar tends to 0
15 Introduction Our Goal What is the probability to have these 2 identical leaves and their water drops in the same position in one natural image? You're right the probability tends to 0 Some farmer might have wanted to clear an insect from his logo?
16 Introduction Challenges We want to support detection also with rotation Copy-paste with rotation
17 Introduction Difficulties 1) We want to compare each patch to each other patch in the image, in various sizes many comparisons 2) As we also want to support comparison under geometrical transformations, the amount of comparisons becomes enormous and not practical
18 Introduction Former Works There were former works trying to solve the same problem (Like with PCA). The advantages of the solutions we'll see today: 1) Run faster and computationally easier 2) Detection after JPEG Compression or Gaussian noise 3) Detection of rotated duplication
19 Let's go on...
20 Introduction Wavelets Let's start with an example...
21 Introduction Wavelets Let's have a look at the following frequency-domain filters: A horizontal high-pass filter A horizontal low-pass filter And of course some classic image... A vertical high-pass filter A vertical low-pass filter
22 Introduction Wavelets Now, let's take the image and compute the following components: Apply horizontal high-pass filter and vertical high-pass filter
23 Introduction Wavelets Now, let's take the image and compute the following components: Let's call this component HH
24 Introduction Wavelets Now, let's take the image and compute the following components: Apply horizontal low-pass filter and vertical high-pass filter
25 Introduction Wavelets Now, let's take the image and compute the following components: Let's call this component LH
26 Introduction Wavelets Now, let's take the image and compute the following components: Apply horizontal high-pass filter and vertical low-pass filter
27 Introduction Wavelets Now, let's take the image and compute the following components: Let's call this component HL
28 Introduction Wavelets Now, let's apply low pass filter in both directions and down-scale the image (like in Gaussian pyramid): Let's call this component LL
29 Introduction Wavelets Now, let's continue computing the components recursively, using the down-scaled image as the source image: Continuing recursively...
30 Introduction Wavelets We decided to stop the pyramid computations after two iterations, but we could continue to compute more levels... The image, again low-pass-filtered and down-scaled
31 Introduction Wavelets Wavelets features: We name the wavelet components according to their type and hierarchy level: LL2 LH1 HL2 LH2 HH2 HH1 HL1
32 Introduction Wavelets Wavelets features: We can compute any LLi component, including the original image, LL0, by up-scaling the LLi component to its original size and combining it with the HLi, LHi and HHi components We save only the smallest LL component in the pyramid, but, we also save all the HL, LH and HH components, thus we can recursively compute any LLi
33 Introduction Wavelets Wavelet reconstruction of LLi from (i-1) level components : Taken from Matlab documentation:
34 Introduction Wavelets Wavelets benefits: While a regular image gives us only very detailed spatial information (We have no frequency index ):
35 Introduction Wavelets Wavelets benefits:...and while FFT gives us only very detailed frequency information (We cannot see the image):
36 Introduction Wavelets Wavelets benefits: A wavelet pyramid tries to give us both of them:
37 Introduction Wavelets Wavelets spatial vs frequency tradeof: 1) We can get a high resolution spatial information from the wavelet's lower levels (those that are closer to the original image) 2) We can get various frequencies information when going up and down the pyramid levels, where upper levels show lower frequencies
38 Introduction Wavelets More about wavelets: Discrete Wavelet Transform (DWT), also commonly called Wavelets, has huge number of applications in engineering, computer science and other sciences. A remarkable and very known usage of DWT is for JPEG 2000 image compression... We will now see how it helps with detecting copy-paste image forgeries
39 Last steps before the real thing...
40 Introduction Phase Correlation Again, let's start with an example... Take a look at these 2 noisy images:
41 Introduction Phase Correlation If you look deeply, you might be able to see that they are not just translated, but also each of them has its own diferent Gaussian noise...
42 Introduction Phase Correlation Let's apply phase-correlation using the following operation: F is the Fourier Transform conj is the complex conjugate
43 Introduction Phase Correlation The location of this bold white dot tells us that the image are translated according to its location from top-left: (x1, y1) Input Phase Correlation Output IFFT
44 Introduction Phase Correlation Usage for image matching: For 2 similar images, we expect to see a significant peak in the phase-correlation
45 Introduction Phase Correlation Usage for image matching: The most significant advantage of Phase Correlation, in contradiction to other correlations, is the resilience to Gaussian noise, JPEG compression and other noises and defects. It enables to efficiently find similarity while other correlations are mostly good for finding identity
46 Let's start with the interesting stuff...
47 Idea We can split the image to overlapping blocks in some size that we choose, and then we can try to somehow compare them and to look for similar ones. The main problem is that on large image, this process could take very long time
48 Idea An optimization: Let's look for similar blocks in the smallest image in the pyramid. Then, we'll each time continue to a larger level, checking only the candidates found in the former level x x This process might save us a lot of time
49 Idea An example: Forged Image
50 Idea An example: Detection in smallest level LLk
51 Idea An example: Detection in next level LLk-1
52 Idea An example: Detection in next level LLk-2
53 Idea An example: The Original Image
54 Let's go on...
55 Flow Input Image Convert to Grayscale
56 Flow Input Image Convert to Grayscale Compute Wavelet Transform
57 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks We divide the smallest LL image in the pyramid, into all possible (bxb)-sized overlapping blocks
58 Flow Input Image Convert to Grayscale We turn each block into a b^2 sized vector and assign each vector as a row into a (M-b+1)x(N-b+1)-sized matrix Compute Wavelet Transform Matrix of overlapping blocks Block 1 Block (M-b+1) In another matrix, we save each vector's real coordinates in the image
59 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks We remove all blocks with low contrast. We tell that a block has low contrast if the difference between its maximum intensity pixel and its minimum intensity pixel is lower than some predefined threshold T. This helps to prevent noisy results, such as 2 identical blue patches of the sky
60 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks Then, we sort the remaining matrix rows lexicographically
61 Flow Input Image Convert to Grayscale We compute phase-correlation between each block and its p matrix neighbors above and below the current row: Compute Wavelet Transform Matrix of overlapping blocks Compute blocks phase-correlation F is the Fourier Transform conj is the complex conjugate
62 Flow Input Image Convert to Grayscale Compute Wavelet Transform If the maximum value of the phase-correlation of 2 blocks exceeds our defined threshold T, we mark the coordinates of these blocks as candidates that should be checked more deeply in the larger wavelet pyramid's LL images Matrix of overlapping blocks Max Compute blocks phase-correlation
63 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) We will now take the coordinates of the candidate blocks we found similar in the current level, and will check them in the next, more detailed level, LLk-1
64 Flow Input Image Convert to Grayscale Compute Wavelet Transform The process now is much simpler: we already have candidates blocks to compare using phase correlation Candidates for matching Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) We add m pixels on each side of the matching regions, so our Coordinates fit to the larger image
65 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) Again, we compute phase-correlation of the more detailed blocks, and if the largest value exceeds the threshold T, we mark the blocks as candidates for the next level
66 Flow Input Image Convert to Grayscale We repeat this step down the pyramid, until finally we report the matching blocks in LL0 (the original image), as duplicates LLk Compute Wavelet Transform candidates LLk-1 Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images)... candidates LL0
67 Flow Input Image Convert to Grayscale Finally, the LL0 computed candidates are reported as the found duplicates Compute Wavelet Transform LL0 Matrix of overlapping blocks Compute blocks phase-correlation Repeat checking candidates down the pyramid (larger images) Report Duplicates! Duplicates!
68 Working Examples Original Image Forged Image Output
69 Working Examples Original Image Forged Image Output
70 Working Examples Original Image Forged Image Output
71 Working Examples Original Image Forged Image Output
72 Let's see another algorithm...
73 Idea The following algorithm is going to start in a flow that is very similar to the algorithm we've just seen. The following steps are repeated in the same way: Image conversion to Grayscale Calculation of Wavelet transform Dividing the smallest LLk image into all possible bxb blocks
74 Idea After we divided the smallest LLk image into all possible bxb blocks, we are going to continue in a diferent way: Calculating 9-sized feature vectors for each block Sorting the vectors lexicographically in a matrix Looking for similar adjacent matrix rows Checking similarity of candidates' neighbors Let's look deeper...
75 Flow Input Image Convert to Grayscale Compute Wavelet Transform We already have the wavelet pyramid of the grayscale-converted image, like we had in the previous algorithm
76 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features Like we did in the previous algorithm, we divide the smallest LL image in the pyramid into all possible (bxb)-sized overlapping blocks
77 Flow Input Image Convert to Grayscale For each bxb sized block, we calculate the following features: Compute Wavelet Transform Matrix of blocks' features We start with getting 4 sub-blocks of each block B, where the sub-blocks are created by splitting B diagonally 2 times, each time with a different diagonal
78 Flow Input Image Convert to Grayscale The first feature we calculate is the average of the middle of block B Compute Wavelet Transform Block B Matrix of blocks' features The middle of block B If the size of block B is bxb, then they size of the middle of the block should be (b*i)x(b*i), for some constant I we pre-define to be a value between 0.65 and 0.99 (e.g. 2/3)
79 Flow Input Image Convert to Grayscale Block B Compute Wavelet Transform Matrix of blocks' features The middle of block B The benefit of taking the center of the block, is that when copying image patches from area to another area, the border pixels are usually smoothed to fit the new position. Taking the center letting us ignore these border pixels This benefit helps us when the block is on the border of the copied patch
80 Flow Input Image Convert to Grayscale The next 4 features we calculate are the following: Compute Wavelet Transform Matrix of blocks' features We compute the average of the whole block B and of each of the sub-blocks B1-B4
81 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features Now we assign the following values to the feature vector: 2 <-- Average(B1) / Average(B) 3 <-- Average(B2) / Average(B) 4 <-- Average(B3) / Average(B) 5 <-- Average(B4) / Average(B)
82 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features These features help us to deal with Gaussian noise in the image, as if 2 identical blocks differ only because of different Gaussian noise, we still expect in high probability to find similar proportion between respective sub-blocks to the blocks
83 Flow Input Image Convert to Grayscale The next 4 features we calculate are the following: Compute Wavelet Transform Matrix of blocks' features Now we assign the following values to the feature vector: 2 <-- Average(B1) - Average(B) 3 <-- Average(B2) - Average(B) 4 <-- Average(B3) - Average(B) 5 <-- Average(B4) - Average(B)
84 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features These features help us to deal with the cases when a constant value is added to the intensity level of all the pixels at at least one of the blocks. In such a case, the difference of the averages will be similar, and so these 4 features
85 Flow Input Image Convert to Grayscale We've computed the whole feature vector of B Compute Wavelet Transform Matrix of blocks' features Now let's normalize all its components To be in the range of integers [0, 255]
86 Flow Input Image Convert to Grayscale We are now able to assign all these vectors into a matrix M and sort it lexicographically and efficiently using Radix Sort Compute Wavelet Transform 9 columns (the features) Matrix of blocks' features (M-b+1)(N-b+1) rows (one row per block)
87 Flow Input Image Convert to Grayscale Now, when we have the lexicographically sorted matrix of feature vectors, we check each pair of adjacent rows vi, vi+1 Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors For each such pair of vectors, we compute their euclidean distance. If the computed distance is less than our predefined threshold T1 we continue to another check
88 Flow Input Image Convert to Grayscale For each pair of rows that passed the Euclidean distance test and found similar enough, we continue to the next step Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors We compute the distance between their corresponding image coordinates. If the computed distance is greater than our predefined threshold T2, then we define this pair as suspected
89 Flow Input Image Convert to Grayscale Compute Wavelet Transform The first threshold T1 we've just used, helped us to know whether two blocks are similar enough On the other hand, our second threshold T2 we used, helped us to know whether the similar blocks are not too close in the real image, thus we can ignore blocks which are naturally similar Matrix of blocks' features Checking adjacent feature vectors Passed on T1, failed on T2 Passed on T2, Failed on T1 Passed both T1 and T2
90 Flow Input Image Convert to Grayscale Now, when we have a suspected pair of blocks, we check the similarity of their neighbors, using an efficient way, named Neighbor Shift Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors Comparing neighbors If our suspected blocks are b1 and b2, for each neighbor of b1, we will compute the subtraction of its feature vector and the feature vector of b1 We will do the same for the corresponding neighbor of b2.
91 Flow Input Image Convert to Grayscale Compute Wavelet Transform Matrix of blocks' features Checking adjacent feature vectors Comparing neighbors Finally, we'll compare the subtraction result we got for b1 with the result we got in b2. If we get the same result, we will mark also the corresponding neighbors as duplicates
92 Flow Input Image Convert to Grayscale Compute Wavelet Transform Finally, we filter out suspected blocks and their neighbors which cover an area smaller than some threshold we defined in advance. This filtering is done in order to prevent noisy results Matrix of blocks' features Duplicates! Checking adjacent feature vectors Comparing neighbors Report Duplicates!
93 Working Examples A pretty easy detection... Forged Image Output
94 Working Examples An example with Gaussian noise... Forged Image Output
95 Working Examples An example with JPEG Compression... Forged Image Output
96 Try staying concentrated for just a little more...
97 Detecting Rotated Duplications Remember this friend? Copy-paste with rotation
98 Detecting Rotated Duplications We are not going to do many steps diferent than the algorithm we've just seen. One major diference though, is that we're not going to compute any features except for the pixels themselves
99 Detecting Rotated Duplications As we are going to work with the pixels themselves, and not with any computed features, our algorithm will be more limited: - It will not support detection after Gaussian Noise - It will not support detection after JPEG compression For supporting detection of rotated duplications, we will require the following changes...
100 Detecting Rotated Duplications Change 1 Block size Here, our overlapping blocks' size is forced to be 3x3. We enumerate the block's pixels according to the following chart:
101 Detecting Rotated Duplications Change 2 Feature vector size and contents The size of our feature vector is going to be 18 (instead of 9). The first 9 features are the sorted values of all the 9 pixels in the block. The next 9 features is the original location [0-8] of each of the 9 first features (we sorted them, so we want to remember their original location somehow...)
102 Detecting Rotated Duplications Change 3 Calculation of feature vectors similarity Here, we first compare the first 9 features in the vector and we expect to see at least 7 of 9 such similar values. Else, we ignore this pair of blocks An example for 2 matching blocks The circular order is the same, but it is possible to see the rotation
103 Detecting Rotated Duplications Change 3 Calculation of feature vectors similarity If we found enough similar features in the first 9 features, we proceed to check whether the next 9 features of the 2 vectors look similar in their circular order. The circular sequence also implies the rotation angle.
104 Detecting Rotated Duplications Next Steps: After we discovered the similarity of 2 blocks and an angle Θ, we continue with the Neighbor Shif method we used in the regular algorithm, while here we check the similarity of neighbors with the same angle Θ
105 Working Examples An example with rotation, no noise or compression... Forged Image Output
106 Failing Examples A Failing example with Gaussian Noise... Forged Image Output
107 Failing Examples A Failing example with JPEG Compression... Forged Image Output
108 Bibliography Er. Saiqa Khan Er. Arun Kulkarni An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, Vivek Kumar Singh and R.C. Tripathi Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method International Journal of Advanced Science and Technology Vol. 35, October, 2011
109 The End.
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM
AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM T.Manikyala Rao 1, Dr. Ch. Srinivasa Rao 2 Research Scholar, Department of Electronics and Communication Engineering,
More informationAnnouncements. Image Processing. What s an image? Images as functions. Image processing. What s a digital image?
Image Processing Images by Pawan Sinha Today s readings Forsyth & Ponce, chapters 8.-8. http://www.cs.washington.edu/education/courses/49cv/wi/readings/book-7-revised-a-indx.pdf For Monday Watt,.3-.4 (handout)
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationTemplates and Image Pyramids
Templates and Image Pyramids 09/07/17 Computational Photography Derek Hoiem, University of Illinois Why does a lower resolution image still make sense to us? What do we lose? Image: http://www.flickr.com/photos/igorms/136916757/
More informationTemplates and Image Pyramids
Templates and Image Pyramids 09/06/11 Computational Photography Derek Hoiem, University of Illinois Project 1 Due Monday at 11:59pm Options for displaying results Web interface or redirect (http://www.pa.msu.edu/services/computing/faq/autoredirect.html)
More informationImage Scaling. This image is too big to fit on the screen. How can we reduce it? How to generate a halfsized
Resampling Image Scaling This image is too big to fit on the screen. How can we reduce it? How to generate a halfsized version? Image sub-sampling 1/8 1/4 Throw away every other row and column to create
More informationSteganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005
Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.
More informationProf. Feng Liu. Fall /04/2018
Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/04/2018 1 Last Time Image file formats Color quantization 2 Today Dithering Signal Processing Homework 1 due today in class Homework
More informationCS6670: Computer Vision Noah Snavely. Administrivia. Administrivia. Reading. Last time: Convolution. Last time: Cross correlation 9/8/2009
CS667: Computer Vision Noah Snavely Administrivia New room starting Thursday: HLS B Lecture 2: Edge detection and resampling From Sandlot Science Administrivia Assignment (feature detection and matching)
More informationWavelet-based image compression
Institut Mines-Telecom Wavelet-based image compression Marco Cagnazzo Multimedia Compression Outline Introduction Discrete wavelet transform and multiresolution analysis Filter banks and DWT Multiresolution
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationImage Pyramids. Sanja Fidler CSC420: Intro to Image Understanding 1 / 35
Image Pyramids Sanja Fidler CSC420: Intro to Image Understanding 1 / 35 Finding Waldo Let s revisit the problem of finding Waldo This time he is on the road template (filter) image Sanja Fidler CSC420:
More informationDigital images. Digital Image Processing Fundamentals. Digital images. Varieties of digital images. Dr. Edmund Lam. ELEC4245: Digital Image Processing
Digital images Digital Image Processing Fundamentals Dr Edmund Lam Department of Electrical and Electronic Engineering The University of Hong Kong (a) Natural image (b) Document image ELEC4245: Digital
More informationSPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel
SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel Dnyaneshwar.K 1, CH.Suneetha 2 Abstract In this paper, Compression and improving the Quality of
More informationFACE RECOGNITION USING NEURAL NETWORKS
Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING
More informationSECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS
RADT 3463 - COMPUTERIZED IMAGING Section I: Chapter 2 RADT 3463 Computerized Imaging 1 SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS RADT 3463 COMPUTERIZED IMAGING Section I: Chapter 2 RADT
More informationA Modified Image Coder using HVS Characteristics
A Modified Image Coder using HVS Characteristics Mrs Shikha Tripathi, Prof R.C. Jain Birla Institute Of Technology & Science, Pilani, Rajasthan-333 031 shikha@bits-pilani.ac.in, rcjain@bits-pilani.ac.in
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationISSN: (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDigital Image Processing
Digital Image Processing 3 November 6 Dr. ir. Aleksandra Pizurica Prof. Dr. Ir. Wilfried Philips Aleksandra.Pizurica @telin.ugent.be Tel: 9/64.345 UNIVERSITEIT GENT Telecommunicatie en Informatieverwerking
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More informationEmbedded Systems CSEE W4840. Design Document. Hardware implementation of connected component labelling
Embedded Systems CSEE W4840 Design Document Hardware implementation of connected component labelling Avinash Nair ASN2129 Jerry Barona JAB2397 Manushree Gangwar MG3631 Spring 2016 Table of Contents TABLE
More informationIntroduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1
Objective: Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 This Matlab Project is an extension of the basic correlation theory presented in the course. It shows a practical application
More informationCh. Bhanuprakash 2 2 Asistant Professor, Mallareddy Engineering College, Hyderabad, A.P, INDIA. R.Jawaharlal 3, B.Sreenivas 4 3,4 Assocate Professor
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Image Compression
More informationFilters. Materials from Prof. Klaus Mueller
Filters Materials from Prof. Klaus Mueller Think More about Pixels What exactly a pixel is in an image or on the screen? Solid square? This cannot be implemented A dot? Yes, but size matters Pixel Dots
More informationFourier Transform. Any signal can be expressed as a linear combination of a bunch of sine gratings of different frequency Amplitude Phase
Fourier Transform Fourier Transform Any signal can be expressed as a linear combination of a bunch of sine gratings of different frequency Amplitude Phase 2 1 3 3 3 1 sin 3 3 1 3 sin 3 1 sin 5 5 1 3 sin
More informationOrthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich *
Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Dept. of Computer Science, University of Buenos Aires, Argentina ABSTRACT Conventional techniques for signal
More informationDigital Image Processing. Digital Image Fundamentals II 12 th June, 2017
Digital Image Processing Digital Image Fundamentals II 12 th June, 2017 Image Enhancement Image Enhancement Types of Image Enhancement Operations Neighborhood Operations on Images Spatial Filtering Filtering
More informationInterpolation of CFA Color Images with Hybrid Image Denoising
2014 Sixth International Conference on Computational Intelligence and Communication Networks Interpolation of CFA Color Images with Hybrid Image Denoising Sasikala S Computer Science and Engineering, Vasireddy
More informationA Novel Approach for MRI Image De-noising and Resolution Enhancement
A Novel Approach for MRI Image De-noising and Resolution Enhancement 1 Pravin P. Shetti, 2 Prof. A. P. Patil 1 PG Student, 2 Assistant Professor Department of Electronics Engineering, Dr. J. J. Magdum
More informationComputer Science and Engineering
Volume, Issue 11, November 201 ISSN: 2277 12X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach
More informationMidterm Examination CS 534: Computational Photography
Midterm Examination CS 534: Computational Photography November 3, 2015 NAME: SOLUTIONS Problem Score Max Score 1 8 2 8 3 9 4 4 5 3 6 4 7 6 8 13 9 7 10 4 11 7 12 10 13 9 14 8 Total 100 1 1. [8] What are
More informationSampling and Pyramids
Sampling and Pyramids 15-463: Rendering and Image Processing Alexei Efros with lots of slides from Steve Seitz Today Sampling Nyquist Rate Antialiasing Gaussian and Laplacian Pyramids 1 Fourier transform
More informationRobust watermarking based on DWT SVD
Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India anumol.josph00@gmail.com, anusudhak@yahoo.co.in Abstract
More informationThe Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.
The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D. Home The Book by Chapters About the Book Steven W. Smith Blog Contact Book Search Download this chapter in PDF
More informationMATLAB 6.5 Image Processing Toolbox Tutorial
MATLAB 6.5 Image Processing Toolbox Tutorial The purpose of this tutorial is to gain familiarity with MATLAB s Image Processing Toolbox. This tutorial does not contain all of the functions available in
More informationMotion illusion, rotating snakes
Motion illusion, rotating snakes Image Filtering 9/4/2 Computer Vision James Hays, Brown Graphic: unsharp mask Many slides by Derek Hoiem Next three classes: three views of filtering Image filters in spatial
More informationImage compression with multipixels
UE22 FEBRUARY 2016 1 Image compression with multipixels Alberto Isaac Barquín Murguía Abstract Digital images, depending on their quality, can take huge amounts of storage space and the number of imaging
More informationWhy Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best
Elementary Plots Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools are not always the best More importantly, it is easy to lie
More informationDigital Image Processing 3/e
Laboratory Projects for Digital Image Processing 3/e by Gonzalez and Woods 2008 Prentice Hall Upper Saddle River, NJ 07458 USA www.imageprocessingplace.com The following sample laboratory projects are
More informationScienceDirect. A Novel DWT based Image Securing Method using Steganography
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based
More informationPassive Image Forensic Method to detect Copy Move Forgery in Digital Images
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 96-104 Passive Image Forensic Method to detect Copy Move Forgery in
More informationMATLAB Image Processing Toolbox
MATLAB Image Processing Toolbox Copyright: Mathworks 1998. The following is taken from the Matlab Image Processing Toolbox users guide. A complete online manual is availabe in the PDF form (about 5MB).
More informationRemoval of ocular artifacts from EEG signals using adaptive threshold PCA and Wavelet transforms
Available online at www.interscience.in Removal of ocular artifacts from s using adaptive threshold PCA and Wavelet transforms P. Ashok Babu 1, K.V.S.V.R.Prasad 2 1 Narsimha Reddy Engineering College,
More informationData Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationAnalysis of Wavelet Denoising with Different Types of Noises
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2016 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Kishan
More informationImage Processing - License Plate Localization and Letters Extraction *
OpenStax-CNX module: m33156 1 Image Processing - License Plate Localization and Letters Extraction * Cynthia Sung Chinwei Hu Kyle Li Lei Cao This work is produced by OpenStax-CNX and licensed under the
More informationDigital Image Processing
Digital Image Processing Part 2: Image Enhancement Digital Image Processing Course Introduction in the Spatial Domain Lecture AASS Learning Systems Lab, Teknik Room T26 achim.lilienthal@tech.oru.se Course
More informationCoding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes
Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes G.Bhaskar 1, G.V.Sridhar 2 1 Post Graduate student, Al Ameer College Of Engineering, Visakhapatnam, A.P, India 2 Associate
More informationPerformance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Image Compression Mr.P.S.Jagadeesh Kumar Associate Professor,
More informationCSC 320 H1S CSC320 Exam Study Guide (Last updated: April 2, 2015) Winter 2015
Question 1. Suppose you have an image I that contains an image of a left eye (the image is detailed enough that it makes a difference that it s the left eye). Write pseudocode to find other left eyes in
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationStatistical Tests: More Complicated Discriminants
03/07/07 PHY310: Statistical Data Analysis 1 PHY310: Lecture 14 Statistical Tests: More Complicated Discriminants Road Map When the likelihood discriminant will fail The Multi Layer Perceptron discriminant
More informationImages and Filters. EE/CSE 576 Linda Shapiro
Images and Filters EE/CSE 576 Linda Shapiro What is an image? 2 3 . We sample the image to get a discrete set of pixels with quantized values. 2. For a gray tone image there is one band F(r,c), with values
More informationComputer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015
Computer Graphics Si Lu Fall 2017 http://www.cs.pdx.edu/~lusi/cs447/cs447_547_comput er_graphics.htm 10/02/2015 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/
More informationWhy Should We Care? More importantly, it is easy to lie or deceive people with bad plots
Elementary Plots Why Should We Care? Everyone uses plotting But most people ignore or are unaware of simple principles Default plotting tools (or default settings) are not always the best More importantly,
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationRGB Image Reconstruction Using Two-Separated Band Reject Filters
RGB Image Reconstruction Using Two-Separated Band Reject Filters Muthana H. Hamd Computer/ Faculty of Engineering, Al Mustansirya University Baghdad, Iraq ABSTRACT Noises like impulse or Gaussian noise
More informationEfficient Image Compression Technique using JPEG2000 with Adaptive Threshold
Efficient Image Compression Technique using JPEG2000 with Adaptive Threshold Md. Masudur Rahman Mawlana Bhashani Science and Technology University Santosh, Tangail-1902 (Bangladesh) Mohammad Motiur Rahman
More informationCS4495/6495 Introduction to Computer Vision. 2C-L3 Aliasing
CS4495/6495 Introduction to Computer Vision 2C-L3 Aliasing Recall: Fourier Pairs (from Szeliski) Fourier Transform Sampling Pairs FT of an impulse train is an impulse train Sampling and Aliasing Sampling
More informationCompression and Image Formats
Compression Compression and Image Formats Reduce amount of data used to represent an image/video Bit rate and quality requirements Necessary to facilitate transmission and storage Required quality is application
More informationCSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.
CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,
More information06: Thinking in Frequencies. CS 5840: Computer Vision Instructor: Jonathan Ventura
06: Thinking in Frequencies CS 5840: Computer Vision Instructor: Jonathan Ventura Decomposition of Functions Taylor series: Sum of polynomials f(x) =f(a)+f 0 (a)(x a)+ f 00 (a) 2! (x a) 2 + f 000 (a) (x
More informationCS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee
CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area
More informationProf. Feng Liu. Fall /02/2018
Prof. Feng Liu Fall 2018 http://www.cs.pdx.edu/~fliu/courses/cs447/ 10/02/2018 1 Announcements Free Textbook: Linear Algebra By Jim Hefferon http://joshua.smcvt.edu/linalg.html/ Homework 1 due in class
More informationSampling and Reconstruction
Sampling and Reconstruction Many slides from Steve Marschner 15-463: Computational Photography Alexei Efros, CMU, Fall 211 Sampling and Reconstruction Sampled representations How to store and compute with
More informationMAS336 Computational Problem Solving. Problem 3: Eight Queens
MAS336 Computational Problem Solving Problem 3: Eight Queens Introduction Francis J. Wright, 2007 Topics: arrays, recursion, plotting, symmetry The problem is to find all the distinct ways of choosing
More informationDigital Image Forgery Detection using Wavelet Decomposition and Edge Detection
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 2 Ver. IV (Mar Apr. 2015), PP 50-56 www.iosrjournals.org Digital Image Forgery Detection
More informationThe Camera Club. David Champion January 2011
The Camera Club B&W Negative Proccesing After Scanning. David Champion January 2011 That s how to scan a negative, now I will explain how to process the image using Photoshop CS5. To achieve a good scan
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1
VHDL design of lossy DWT based image compression technique for video conferencing Anitha Mary. M 1 and Dr.N.M. Nandhitha 2 1 VLSI Design, Sathyabama University Chennai, Tamilnadu 600119, India 2 ECE, Sathyabama
More informationImagesPlus Basic Interface Operation
ImagesPlus Basic Interface Operation The basic interface operation menu options are located on the File, View, Open Images, Open Operators, and Help main menus. File Menu New The New command creates a
More informationCS 445 HW#2 Solutions
1. Text problem 3.1 CS 445 HW#2 Solutions (a) General form: problem figure,. For the condition shown in the Solving for K yields Then, (b) General form: the problem figure, as in (a) so For the condition
More informationA PROPOSED ALGORITHM FOR DIGITAL WATERMARKING
A PROPOSED ALGORITHM FOR DIGITAL WATERMARKING Dr. Mohammed F. Al-Hunaity dr_alhunaity@bau.edu.jo Meran M. Al-Hadidi Merohadidi77@gmail.com Dr.Belal A. Ayyoub belal_ayyoub@ hotmail.com Abstract: This paper
More informationOn Fusion Algorithm of Infrared and Radar Target Detection and Recognition of Unmanned Surface Vehicle
Journal of Applied Science and Engineering, Vol. 21, No. 4, pp. 563 569 (2018) DOI: 10.6180/jase.201812_21(4).0008 On Fusion Algorithm of Infrared and Radar Target Detection and Recognition of Unmanned
More informationPerformance Analysis of Local Adaptive Real Oriented Dual Tree Wavelet Transform in Image Processing
Performance Analysis of Local Adaptive Real Oriented Dual Tree Wavelet Transform in Image Processing Swati Khare 1, Harshvardhan Mathur 2 M.Tech, Department of Computer Science and Engineering, Sobhasaria
More informationII. Basic Concepts in Display Systems
Special Topics in Display Technology 1 st semester, 2016 II. Basic Concepts in Display Systems * Reference book: [Display Interfaces] (R. L. Myers, Wiley) 1. Display any system through which ( people through
More informationChapter 2 Image Enhancement in the Spatial Domain
Chapter 2 Image Enhancement in the Spatial Domain Abstract Although the transform domain processing is essential, as the images naturally occur in the spatial domain, image enhancement in the spatial domain
More informationModified Skin Tone Image Hiding Algorithm for Steganographic Applications
Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationLane Detection in Automotive
Lane Detection in Automotive Contents Introduction... 2 Image Processing... 2 Reading an image... 3 RGB to Gray... 3 Mean and Gaussian filtering... 5 Defining our Region of Interest... 6 BirdsEyeView Transformation...
More informationPrinceton ELE 201, Spring 2014 Laboratory No. 2 Shazam
Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam 1 Background In this lab we will begin to code a Shazam-like program to identify a short clip of music using a database of songs. The basic procedure
More information1. (a) Explain the process of Image acquisition. (b) Discuss different elements used in digital image processing system. [8+8]
Code No: R05410408 Set No. 1 1. (a) Explain the process of Image acquisition. (b) Discuss different elements used in digital image processing system. [8+8] 2. (a) Find Fourier transform 2 -D sinusoidal
More informationVU Signal and Image Processing. Torsten Möller + Hrvoje Bogunović + Raphael Sahann
052600 VU Signal and Image Processing Torsten Möller + Hrvoje Bogunović + Raphael Sahann torsten.moeller@univie.ac.at hrvoje.bogunovic@meduniwien.ac.at raphael.sahann@univie.ac.at vda.cs.univie.ac.at/teaching/sip/17s/
More informationImage Quality Estimation of Tree Based DWT Digital Watermarks
International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,
More informationIntroduction to Color Theory
Systems & Biomedical Engineering Department SBE 306B: Computer Systems III (Computer Graphics) Dr. Ayman Eldeib Spring 2018 Introduction to With colors you can set a mood, attract attention, or make a
More informationChapter 4 SPEECH ENHANCEMENT
44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or
More informationMITOCW watch?v=zkcj6jrhgy8
MITOCW watch?v=zkcj6jrhgy8 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To
More informationPast questions from the last 6 years of exams for programming 101 with answers.
1 Past questions from the last 6 years of exams for programming 101 with answers. 1. Describe bubble sort algorithm. How does it detect when the sequence is sorted and no further work is required? Bubble
More informationImage Processing Final Test
Image Processing 048860 Final Test Time: 100 minutes. Allowed materials: A calculator and any written/printed materials are allowed. Answer 4-6 complete questions of the following 10 questions in order
More information15EI403J- IMAGE PROCESSING LAB MANUAL
15EI403J- IMAGE PROCESSING LAB MANUAL Department of Electronics and Instrumentation Engineering Faculty of Engineering and Technology Department of Electronics and Instrumentation Engineering SRM IST,
More informationVision Review: Image Processing. Course web page:
Vision Review: Image Processing Course web page: www.cis.udel.edu/~cer/arv September 7, Announcements Homework and paper presentation guidelines are up on web page Readings for next Tuesday: Chapters 6,.,
More informationPractical Image and Video Processing Using MATLAB
Practical Image and Video Processing Using MATLAB Chapter 10 Neighborhood processing What will we learn? What is neighborhood processing and how does it differ from point processing? What is convolution
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationConway s Soldiers. Jasper Taylor
Conway s Soldiers Jasper Taylor And the maths problem that I did was called Conway s Soldiers. And in Conway s Soldiers you have a chessboard that continues infinitely in all directions and every square
More informationLast Lecture. photomatix.com
Last Lecture photomatix.com Today Image Processing: from basic concepts to latest techniques Filtering Edge detection Re-sampling and aliasing Image Pyramids (Gaussian and Laplacian) Removing handshake
More informationForensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification
Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence
More informationCSCI 1290: Comp Photo
CSCI 29: Comp Photo Fall 28 @ Brown University James Tompkin Many slides thanks to James Hays old CS 29 course, along with all of its acknowledgements. Things I forgot on Thursday Grads are not required
More informationAccurate Delay Measurement of Coded Speech Signals with Subsample Resolution
PAGE 433 Accurate Delay Measurement of Coded Speech Signals with Subsample Resolution Wenliang Lu, D. Sen, and Shuai Wang School of Electrical Engineering & Telecommunications University of New South Wales,
More informationImplementation of Image Restoration Techniques in MATLAB
Implementation of Image Restoration Techniques in MATLAB Jitendra Suthar 1, Rajendra Purohit 2 Research Scholar 1,Associate Professor 2 Department of Computer Science, JIET, Jodhpur Abstract:- Processing
More information