Perceptual Hash Based Detection Algorithm for Image Copy-Paste Tampering

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Passive copy – paste Tampering Detection Technique for Digital Images

Digital images are powerful and widely used communication medium in many fields like medical imaging, digital forensics, surveillance, journalism, etc. The availability of sophisticated digital image technology has given rise to image forgery. The forgeries are very difficult for a human eye to detect. Passive tampering detection method aims to detect the tampering areas in the digital images w...

متن کامل

Blind Identification of Image Copy-paste Tampering Based on Logarithm Polar Coordinate Transformation

To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for each located couple of doubtful blocks, use logarithm polar coordinate transformation to translate the rotation and scaling in Cartesian coordinate system into translation in logarith...

متن کامل

A Novel Perceptual Hash Algorithm for Multispectral Image Authentication

The perceptual hash algorithm is a technique to authenticate the integrity of images. While a few scholars have worked on mono-spectral image perceptual hashing, there is limited research on multispectral image perceptual hashing. In this paper, we propose a perceptual hash algorithm for the content authentication of a multispectral remote sensing image based on the synthetic characteristics of...

متن کامل

A Secure Perceptual Hash Algorithm for Image Content Authentication

Perceptual hashing is a promising solution to image content authentication. However, conventional image hash algorithms only offer a limited authentication level for the protection of overall content. In this work, we propose an image hash algorithm with block level content protection. It extracts features from DFT coefficients of image blocks. Experiments show that the hash has strong robustne...

متن کامل

Clone Detection Beyond Copy&Paste

We argument three positions: 1) independently developed semantically similar code is unlikely to be representationally similar, 2) existing clone detection approaches are ill-suited for detecting such similarities and 3) dynamic clone detection is a promising approach to detect semantically similar yet representationally different code. Numerous clone detection approaches have been proposed [4]...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Computer Science and Engineering

سال: 2018

ISSN: 2475-8841

DOI: 10.12783/dtcse/ccnt2018/24681