This document provides a review of various techniques for detecting digital image forgeries. It begins by discussing the importance of authenticating digital images and the rise of image manipulation. The main types of forgeries are described as copy-move, image splicing, and image retouching. Techniques for forgery detection are classified as active/intrusive or passive/non-intrusive. Key passive techniques discussed include pixel-based analysis of statistical anomalies, format-based analysis exploiting properties of file formats like JPEG, and camera-based analysis of camera-related features. The document then focuses on copy-move forgery detection, outlining the general workflow and reviewing block-based and key-point based matching approaches. Specific algorithms
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics IJECEIAES
Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered regions using different forms of research methodologies. However, it is still an open-end question about the effectiveness of existing image forgery detection techniques as there is no reported benchmarked outcome till date about it. Therefore, the present manuscript discusses about the most frequently addressed image attacks e.g. image splicing and copy-move attack and elaborates the existing techniques presented by research community to resist it. The paper also contributes to explore the direction of present research trend with respect to tool adoption, database adoption, and technique adoption, and frequently used attack scenario. Finally, significant open research gap are explored after reviewing effectiveness of existing techniques.
Analysis and Detection of Image Forgery Methodologiesijsrd.com
"Forgery" is a subjective word. An image can become a forgery based upon the context in which it is used. An image altered for fun or someone who has taken a bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture. The other side of forgery are those who perpetuate a forgery for gain and prestige. They create an image in which to dupe the recipient into believing the image is real and from this they are able to gain payment and fame. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. Now these marks of tampering can be done by various operations such as rotation, scaling, JPEG compression, Gaussian noise etc. called as attacks. There are various methods proposed in this field in recent years to detect above mentioned attacks. This paper provides a detailed analysis of different approaches and methodologies used to detect image forgery. It is also analysed that block-based features methods are robust to Gaussian noise and JPEG compression and the key point-based feature methods are robust to rotation and scaling.
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics IJECEIAES
Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered regions using different forms of research methodologies. However, it is still an open-end question about the effectiveness of existing image forgery detection techniques as there is no reported benchmarked outcome till date about it. Therefore, the present manuscript discusses about the most frequently addressed image attacks e.g. image splicing and copy-move attack and elaborates the existing techniques presented by research community to resist it. The paper also contributes to explore the direction of present research trend with respect to tool adoption, database adoption, and technique adoption, and frequently used attack scenario. Finally, significant open research gap are explored after reviewing effectiveness of existing techniques.
Analysis and Detection of Image Forgery Methodologiesijsrd.com
"Forgery" is a subjective word. An image can become a forgery based upon the context in which it is used. An image altered for fun or someone who has taken a bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture. The other side of forgery are those who perpetuate a forgery for gain and prestige. They create an image in which to dupe the recipient into believing the image is real and from this they are able to gain payment and fame. Detecting these types of forgeries has become serious problem at present. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. Now these marks of tampering can be done by various operations such as rotation, scaling, JPEG compression, Gaussian noise etc. called as attacks. There are various methods proposed in this field in recent years to detect above mentioned attacks. This paper provides a detailed analysis of different approaches and methodologies used to detect image forgery. It is also analysed that block-based features methods are robust to Gaussian noise and JPEG compression and the key point-based feature methods are robust to rotation and scaling.
AHP validated literature review of forgery type dependent passive image forge...IJECEIAES
Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to create, modify the images and videos, are significant concerns. A lot of earlier work of forgery detection was focused on traditional methods to solve the forgery detection. Recently, Deep learning algorithms have accomplished high-performance accuracies in the image processing domain, such as image classification and face recognition. Experts have applied deep learning techniques to detect a forgery in the image too. However, there is a real need to explain why the image is categorized under forged to understand the algorithm’s validity; this explanation helps in mission-critical applications like forensic. Explainable AI (XAI) algorithms have been used to interpret a black box’s decision in various cases. This paper contributes a survey on image forgery detection with deep learning approaches. It also focuses on the survey of explainable AI for images.
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...journalBEEI
With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
Elucidating Digital deception: Spot counterfeit fragmentVIT-AP University
An ordinary person always has confidence in the integrity of visual imagery and believes it without any doubt. But today's digital technology has eroded this trust. A relatively new method called image forgery is extensively being used everywhere. This paper proposes a method to depict forged regions in the digital image. The results for the proposed work are obtained using the MATLAB version 7.10.0.499(R2010a). The projected design is such that it extracts the regions that are forged. The proposed scheme is composed for uncompressed still images. Experimental outcome reveals well the validity of the proposed approach.
Broadcasting Forensics Using Machine Learning Approachesijtsrd
Broadcasting forensic is the practice of using scientific methods and techniques to analyse and authenticate Multimedia content. Over the past decade, consumer grade imaging sensors have become increasingly prevalent, generating vast quantities of images and videos that are used for various public and private communication purposes. Such applications include publicity, advocacy, disinformation, and deception, among others. This paper aims to develop tools that can extract knowledge from these visuals and comprehend their provenance. However, many images and videos undergo modification and manipulation before public release, which can misrepresent the facts and deceive viewers. To address this issue, we propose a set of forensics and counter forensic techniques that can help establish the authenticity and integrity of Multimedia content. Additionally, we suggest ways to modify the content intentionally to mislead potential adversaries. Our proposed tools are evaluated using publicly available datasets and independently organized challenges. Our results show that the forensics and counter forensic techniques can accurately identify manipulated content and can help restore the original image or video. Furthermore, in this paper demonstrate that the modified content can successfully deceive potential adversaries while remaining undetected by state of the art forensic methods. Amit Kapoor | Prof. Vinod Mahor "Broadcasting Forensics Using Machine Learning Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57545.pdf Paper URL: https://www.ijtsrd.com.com/engineering/computer-engineering/57545/broadcasting-forensics-using-machine-learning-approaches/amit-kapoor
Image processing is the process of transforming an image into a digital form and performing certain operations to get some useful information from it. The image processing system usually treats all images as 2D signals when applying certain predetermined signal processing methods.There are five main types of image processing Visualization Find objects that are not visible in the imageRecognition Distinguish or detect objects in the imageSharpening and restoration Create an enhanced image from the original imagePattern recognition Measure the various patterns around the objects in the imageRetrieval Browse and search images from a large database of digital images that are similar to the original image Supriya Kumari "Image Processing in the Current Scenario" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-5 , August 2022, URL: https://www.ijtsrd.com/papers/ijtsrd51728.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/51728/image-processing-in-the-current-scenario/supriya-kumari
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
A Review on Overview of Image Processing Techniquesijtsrd
Image processing is actually among the fast growing innovations across various areas of a business with applications. Image processing frequently forms key scientific areas within the areas of electronics and computer science. Image processing is a tool for refining raw photographs obtained in our everyday lives from rockets, ships, space samples or military identification flights. Thanks to technologically powerful personal computers, broad databases of current devices and the Graphic Technology and the accessible resources for such software and apps, this area is strong and common. The provided input is an image and its output an enhanced high quality image according to the techniques used in the image processing procedure. Image processing is typically called digital image processing, although it is often possible to optically process and analogy photograph. An overview of image processing methods is given in this article. This article focuses mainly on identifying specific methods utilized in various image processing phases. Hirdesh Chack | Vijay Kumar Kalakar | Syed Tariq Ali "A Review on Overview of Image Processing Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31819.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31819/a-review-on-overview-of-image-processing-techniques/hirdesh-chack
In imaging science, the photo editing software packages can alter the original images without any
detecting traces of tampering. Hence, the image forgery detection technique plays an important role in
verifying the integrity of digital image forensics for authentication. The techniques such as
watermarking are used for authentication but it can be modified through third parties attack through
extraction. Malicious and digital imaging (digital products) tamper detection is the subject of this
article. In particular, we focus on a special type of digital forgery detection - copy attack campaign, in
which part of the image is copied and pasted into the image and the cover features a large image of
intentions another. In this paper, we investigate the dynamic forged copy detection problem, and
describes a highly efficient and reliable detection method that based on image source ANN
identification.. Even when the region is enhanced copy / retouching and background merger, and the
method can successfully identify counterfeit forgery when images are saved in a lossy format (such as
JPEG). The performance of the method's performance several forged images.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Fast discrimination of fake video manipulationIJECEIAES
Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian group operators, as a value, may be lower or higher in the fake video than its value in the real video, depending on the quality of the fake video, so we cannot use them for deepfake detection and ii) the gradient-based measure (GRA7) decreases its value in the fake video in all cases, whether the fake video is of high or low quality and can help detect deepfake.
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in ImagesSoumyaShaw4
We attempt to mystify the metadata that includes the location coordinates to address the privacy concern. We put forward an algorithm that performs randomized location hopping to compromise the algorithms targeted to extract sensitive data. The idea is to hide sensitive information that might be used otherwise without user knowledge.
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
More Related Content
Similar to A Review on Various Forgery Detection Techniques
AHP validated literature review of forgery type dependent passive image forge...IJECEIAES
Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to create, modify the images and videos, are significant concerns. A lot of earlier work of forgery detection was focused on traditional methods to solve the forgery detection. Recently, Deep learning algorithms have accomplished high-performance accuracies in the image processing domain, such as image classification and face recognition. Experts have applied deep learning techniques to detect a forgery in the image too. However, there is a real need to explain why the image is categorized under forged to understand the algorithm’s validity; this explanation helps in mission-critical applications like forensic. Explainable AI (XAI) algorithms have been used to interpret a black box’s decision in various cases. This paper contributes a survey on image forgery detection with deep learning approaches. It also focuses on the survey of explainable AI for images.
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...journalBEEI
With the development of Image processing editing tools and software, an image can be easily manipulated. The image manipulation detection is vital for the reason that an image can be used as legal evidence, in the field of forensics investigations, and also in numerous various other fields. The image forgery detection based on pixels aims to validate the digital image authenticity with no aforementioned information of the main image. There are several means intended for tampering a digital image, for example, copy-move or splicing, resampling a digital image (stretch, rotate, resize), removal as well as the addition of an object from your image. Copy move image forgery detection is utilized to figure out the replicated regions as well as the pasted parts, however forgery detection may possibly vary dependant on whether or not there is virtually any post-processing on the replicated part before inserting the item completely to another party. Typically, forgers utilize many operations like rotation, filtering, JPEG compression, resizing as well as the addition of noise to the main image before pasting, that make this thing challenging to recognize the copy move image forgery. Hence, forgery detector needs to be robust to any or all manipulations and also the latest editing software tools. This research paper illustrates recent issues in the techniques of forgery detection and proposes a advanced copy–move forgery detection scheme using adaptive over-segmentation and feature point matching. The proposed scheme integrates both block-based and key point-based forgery detection methods.
Elucidating Digital deception: Spot counterfeit fragmentVIT-AP University
An ordinary person always has confidence in the integrity of visual imagery and believes it without any doubt. But today's digital technology has eroded this trust. A relatively new method called image forgery is extensively being used everywhere. This paper proposes a method to depict forged regions in the digital image. The results for the proposed work are obtained using the MATLAB version 7.10.0.499(R2010a). The projected design is such that it extracts the regions that are forged. The proposed scheme is composed for uncompressed still images. Experimental outcome reveals well the validity of the proposed approach.
Broadcasting Forensics Using Machine Learning Approachesijtsrd
Broadcasting forensic is the practice of using scientific methods and techniques to analyse and authenticate Multimedia content. Over the past decade, consumer grade imaging sensors have become increasingly prevalent, generating vast quantities of images and videos that are used for various public and private communication purposes. Such applications include publicity, advocacy, disinformation, and deception, among others. This paper aims to develop tools that can extract knowledge from these visuals and comprehend their provenance. However, many images and videos undergo modification and manipulation before public release, which can misrepresent the facts and deceive viewers. To address this issue, we propose a set of forensics and counter forensic techniques that can help establish the authenticity and integrity of Multimedia content. Additionally, we suggest ways to modify the content intentionally to mislead potential adversaries. Our proposed tools are evaluated using publicly available datasets and independently organized challenges. Our results show that the forensics and counter forensic techniques can accurately identify manipulated content and can help restore the original image or video. Furthermore, in this paper demonstrate that the modified content can successfully deceive potential adversaries while remaining undetected by state of the art forensic methods. Amit Kapoor | Prof. Vinod Mahor "Broadcasting Forensics Using Machine Learning Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57545.pdf Paper URL: https://www.ijtsrd.com.com/engineering/computer-engineering/57545/broadcasting-forensics-using-machine-learning-approaches/amit-kapoor
Image processing is the process of transforming an image into a digital form and performing certain operations to get some useful information from it. The image processing system usually treats all images as 2D signals when applying certain predetermined signal processing methods.There are five main types of image processing Visualization Find objects that are not visible in the imageRecognition Distinguish or detect objects in the imageSharpening and restoration Create an enhanced image from the original imagePattern recognition Measure the various patterns around the objects in the imageRetrieval Browse and search images from a large database of digital images that are similar to the original image Supriya Kumari "Image Processing in the Current Scenario" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-5 , August 2022, URL: https://www.ijtsrd.com/papers/ijtsrd51728.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/51728/image-processing-in-the-current-scenario/supriya-kumari
For Image Authentication Problem using Encryption Technique and LDPC Source Coding is necessary in Content
Delivery via unsecure medium, Like Peer-To-Peer (P2P) File Sharing. These transferring Digital Files from one Computer to
another. Images are the Most Important Utility of our life. They are used in many applications. There are Two Main Goals of
Image Security: Image Encryption and Authentication. More different encoded versions of the original image available.In
addition, unsecure medium might tamper with the contents.. We propose an efficient, accurate, reliable process using
encryption and LDPC source coding for the image authentication problem. The key idea is to provide a Slepian-Wolf encoded
as authentication data which is encrypted using cryptography key before ready to send. The key used for encryption is usually
independent of the Plain-Image. This can be decoded with side information of an authentic image.
A Review on Overview of Image Processing Techniquesijtsrd
Image processing is actually among the fast growing innovations across various areas of a business with applications. Image processing frequently forms key scientific areas within the areas of electronics and computer science. Image processing is a tool for refining raw photographs obtained in our everyday lives from rockets, ships, space samples or military identification flights. Thanks to technologically powerful personal computers, broad databases of current devices and the Graphic Technology and the accessible resources for such software and apps, this area is strong and common. The provided input is an image and its output an enhanced high quality image according to the techniques used in the image processing procedure. Image processing is typically called digital image processing, although it is often possible to optically process and analogy photograph. An overview of image processing methods is given in this article. This article focuses mainly on identifying specific methods utilized in various image processing phases. Hirdesh Chack | Vijay Kumar Kalakar | Syed Tariq Ali "A Review on Overview of Image Processing Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31819.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31819/a-review-on-overview-of-image-processing-techniques/hirdesh-chack
In imaging science, the photo editing software packages can alter the original images without any
detecting traces of tampering. Hence, the image forgery detection technique plays an important role in
verifying the integrity of digital image forensics for authentication. The techniques such as
watermarking are used for authentication but it can be modified through third parties attack through
extraction. Malicious and digital imaging (digital products) tamper detection is the subject of this
article. In particular, we focus on a special type of digital forgery detection - copy attack campaign, in
which part of the image is copied and pasted into the image and the cover features a large image of
intentions another. In this paper, we investigate the dynamic forged copy detection problem, and
describes a highly efficient and reliable detection method that based on image source ANN
identification.. Even when the region is enhanced copy / retouching and background merger, and the
method can successfully identify counterfeit forgery when images are saved in a lossy format (such as
JPEG). The performance of the method's performance several forged images.
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
Fast discrimination of fake video manipulationIJECEIAES
Deepfakes have become possible using artificial intelligence techniques, replacing one person’s face with another person’s face (primarily a public figure), making the latter do or say things he would not have done. Therefore, contributing to a solution for video credibility has become a critical goal that we will address in this paper. Our work exploits the visible artifacts (blur inconsistencies) which are generated by the manipulation process. We analyze focus quality and its ability to detect these artifacts. Focus measure operators in this paper include image Laplacian and image gradient groups, which are very fast to compute and do not need a large dataset for training. The results showed that i) the Laplacian group operators, as a value, may be lower or higher in the fake video than its value in the real video, depending on the quality of the fake video, so we cannot use them for deepfake detection and ii) the gradient-based measure (GRA7) decreases its value in the fake video in all cases, whether the fake video is of high or low quality and can help detect deepfake.
Encry-Pixel: A Novel Approach Towards Locational Privacy Enhancement in ImagesSoumyaShaw4
We attempt to mystify the metadata that includes the location coordinates to address the privacy concern. We put forward an algorithm that performs randomized location hopping to compromise the algorithms targeted to extract sensitive data. The idea is to hide sensitive information that might be used otherwise without user knowledge.
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2120
Devising effective and real-time detection and
localization methods is currently important as these
forgery attacks are increasing with time [4].
Figure 1: Photomontage of kiwi fruit and lemons
digitally manipulated using GIMP
III. IMAGE FORGERY AND TYPES OF
DIGITAL IMAGE FORGERY
Image forgery refers to the deliberate manipulation of
a digital image, for the only purpose of amending the
semantic of the visual message comprised in that
image. There have been different techniques utilized
for forging an image. Digital image forgery can be
classified into three primary methods: Copy-Move
forgery, Image splicing, and Image resampling.
IV. COPY-MOVE (CLONING) FORGERY
Copy-move is the popular and most common kind of
image tampering technique [5]. Copying from one
part and pasting the same in some other part in the
same image with an intention to hide certain content
in the original image.
An example of copy-move attack is shown in figure 2 where left side shows original image which contains three
rockets and right side shows forged imaged with four rockets.
Figure 2: Copy-move Image Forgery
V. IMAGE SPLICING
Image splicing is a commonly used forgery technique in image tampering [6]. Splicing is a form of photographic
manipulation in which the fragments of same or different images are combined to produce a single composite
image (forged image) without further post processing such as smoothening of boundaries among different
fragments.
VI. IMAGE RETOUCHING
Retouching involves a lot of treatments like basic colour correction, glamour retouching, skin retouching, photo
restoration, photo cartooning etc. Example is shown below in figure 3, where real face is on the left and right
shows the retouched version of it.
Figure 3: Image Retouching
VII. CLASSIFICATION OF DETECTION TECHNIQUES
Researchers have proposed various techniques to detect the forgery in an image. Digital Image forgery can be
broadly classified into two major domain categories: Active and passive approaches.
3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2121
VIII. ACTIVE/ INTRUSIVE/NON-BLIND METHOD
It is concerned with data hiding where certain information inserted inside the digital image by the imaging
device during image acquisition or before the distribution of the image to the public. The embedded data in the
image is used to detect the source of such an image or to perceive an alteration in that image.
A. Digital signature:
Digital signature is one among the active method used for detecting image forgery or tampering. Demonstrating
the authenticity of digital document using a sort of mathematical scheme is called as digital signature. In digital
signature robust bits are extracted from the original image. Image Signing process contain following steps:
1. Decompose the image using parameterized wavelet feature.
2. Extract the SDS.
3. Cryptographically hash the extracted SDS, generate the crypto signature by the image senders private key.
4. Send the image and its associated crypto signature to the recipient.
5. Digital signature is simple and basic approach for digital image authentication.
B. Digital watermarking: Watermarking is also used for image forgery detection. Several watermarking
techniques have been proposed. One uses a checksum schema in that it can add data into last most significant
bit of pixels [8].
C. Passive / non-intrusive/ blind method
In disparity with active methods, passive or blind methods [9,10] of forgery detection take advantage of the
traces left by the image processing operations performed in various phases while acquiring and storing the
digital images. Such traces can be considered as a thumbprint of the image source device. Passive methods work
in the absence of prior knowledge about the image, such as watermarks or signatures. There is nothing inserted
in the image before its distribution. Passive methods make use of the available image only and a certainty that
the manipulation operations alter the statistics of the image, which can help in its detection when the image is
tampered with. Original images are supposed to have consistent characteristics, such as noise variation, lighting,
shadows, and so on. Manipulating the contents of the image results in altering these characteristics, which make
them inconsistent. Such inconsistencies in the statistics of the image can then be calculated in order to detect
forgery. Passive methods are the only solution to decide the trustworthiness of a digital image when digital
watermarks or signatures are not available. Instead, we doubt the integrity of that image, hence we need further
analysis.
Figure 4: Types of digital image forgery techniques
A. Pixel based techniques focus on the digital image pixels which are the basic building blocks. These
techniques work on different statistical anomalies which are introduced at the pixel level [11]. The working
of these techniques is based on the alterations underlying statistics of the image.
B. Format based techniques works on the image format [12]. The most commonly used image format is JPEG
and the format based forgery detection works mainly for the JPEG format. The blocking effect introduced by
JPEG can be used to detect tampering in JPEG format. Manipulation of images causes the alteration of block
artifact grids, especially in copy-move processing. There are three major categories JPEG Quantization,
JPEG blocking and double JPEG which can detect image forgery even for compressed images.
C. Camera based techniques: Digital camera is the major device to take digital images. When a picture is
taken, it involves a series of processing steps on the path from sensor to memory. White balancing, gamma
correction, filtering and JPEG compression are the primary operations for the image to undergo [13].
D. Physical environment based techniques: The anomalies in the three dimensional interaction between the
camera, light and the physical objects can be modelled through image forgery techniques based on physical
4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2122
environment [14]. Such a picture may be made by grafting together individual pictures of each movie star. In
this manner, it is frequently hard to exactly match the lighting effects under which each individual was
initially captured. Here the background lighting difference can be used as the tampering evidence. The
algorithms work on the basis of difference in the lighting environment.
E. Geometry based techniques: These techniques measure the world objects and their camera relative
position. The two main geometry based techniques includes principal point and metric measurement [1]. The
principle point for an image is located near the centre of the image. When the image object is transformed,
the principle point also changes proportionally. Obtaining metric measurement from a single image is very
useful in forensic settings where real-world measurements are required.
IX. GENERAL FRAMEWORK FOR FORGERY DETECTION
Figure 5: Framework for Image Forgery Detection
X. LITERATURE SURVEY OF COPY-MOVE TECHNIQUE
Detection algorithm for copy-move technique
Various algorithms are efficient in term of detecting forgery with less execution time but not robust in term of
various attacks such as rotation, scaling, blurring, multiple copy-paste attack etc. The workflow used for finding
forgery is shown in Figure 5.
Figure 6: General block diagram of copy-move image forgery detection system.
Pre-processing: The purpose of pre-processing is
enhancement in image data. Colour conversion is
performed if there is requirement to convert colour
image in gray scale image. Different pre-processing
functions are applied like resizing input image,
dimension reduction, filtering image with low-pass
filter. In both block-based and key point based
techniques, pre-processing can be applied.
Feature Extraction: In this step, feature vectors are
extracted. If block based method is used, then image
is divided in overlapping or non-overlapping blocks
of fixed size. These blocks can be square or circular.
In case of key point based methods, feature
corresponding to key points are extracted.
Matching: After feature extraction, matching
between feature vectors is performed for finding
similar regions present in an image. Best-Bin-First
searching procedure is used for identifying
approximate nearest neighbour which helps in feature
matching for key point based methods.
Filtering: Filtering procedures are used for reducing
number of false matches.
Post-processing: The tampered regions are marked
by colouring or mapping the region of matching
blocks. Key-point based approach is displayed by line
transformation between each matching point.
Morphological operations refine the visualizations by
using shapes such as contours, skeletons, convex hills
5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2123
to connect matched pairs (fill the holes in marked
regions) and remove outliers (isolated regions).
Block based Approaches
In block-based methods, input image is divided into
fixed size overlapping or non overlapping blocks.
Generally, Square blocks are used but some
researchers also used circular blocks. Features are
extracted from each block using several methods such
as intensity-based, moment-based, dimensionality
reduction-based, frequency-based etc. Feature vectors
are obtained from feature extraction algorithms and
are matched using block-based matching algorithms.
The block based feature extraction methods involve:
Quantized Discrete Cosine Transform (DCT)
coefficients of blocks matched to detect the
tampered regions.
Principal Component Analysis (PCA) to reduce
the block feature dimensions.
RGB colour components and direction
information as block features.
Calculation of 24 blur invariant moments as block
features.
Fourier-Mellin Transform (FMT) for block
feature calculation.
Gray average results of each block and sub-blocks
used as block features.
Zernike moments for block feature.
Information entropy used as block feature.
Various block-based matching algorithms used in
literature are:
Sorting: lexicographic sorting, KD-tree, radix sort
Hash: counting bloom filters, locality-sensitive
hashing
Phase correlation
Euclidean distance
Others: sum of difference between DCT
coefficients and sequential clustering
Key-point based Approaches
The key point based approaches are mainly reckoning
on the extracting local interest points. These points
are also known as key-points. Further, extracting the
local points with high entropy without any image sub-
blocking. The best key-points are able to identify
distinct locations in an image areas are considered as
efficient key points. Key-point based methods are
computationally less complex but they do suffer from
issues. Key-point based matching algorithms are
divided into following categories:
• Nearest neighbour
• Clustering
To overcome the drawbacks of block-based and key-
point based methods, both are fused together to make
a hybrid method. The hybrid method helps in
reducing the overall complexity of the method, which
was due to the block matching step. In key-point
based methods, segmentation can be performed
before extracting key-points in order to extract key-
points from the whole image.
XI. A SURVEY OF COPY-MOVE
DETECTION TECHNIQUES:
Fridrich et al.[15] introduced a first method for
identifying copy-move image forgery in 2003 and
discussed several major requirements of the copy-
move detection algorithm, including: allowing for an
approximate match of small image segments; and
having few false alarms and an acceptable processing
time or complexity. They then proposed a detection
algorithm based on block matching. In this method,
the image is divided into overlapping blocks (16 x16),
and DCT coefficients are used for feature extraction
of these blocks. This method is taking too much
computational time and not able to detect tampered
region if attacks are applied on image like rotation
and scaling.
Popescu et al.[16] initiated a technique for
identifying duplicate image regions in 2004. In this
method, authors applied PCA on fixed-size image of
block size (16 x 16, 32 x 32), then computed the
Eigen values and eigenvectors of each block. The
duplicate regions are automatically detected by using
lexicographical sorting. This algorithm is an efficient
and robust technique for image forgerydetection even
if the image is compressed or noisy.
To combat computational complexity Langille and
Gong [17] proposed use of k-dimensional tree which
uses a method that searches for blocks with similar
intensity patterns using matching techniques. The
resulting algorithm has a complexity of O(NaNb)
where Na is neighbourhood search size and Nb is the
number of blocks. This method has reduced
complexity as compared to the earlier methods.
Li et al.[18] proposed a copy-move forgery detection
based on sorted neighborhood approach by using
DWT and SVD in 2007. In this paper, authors utilized
DWT and disintegrated into four sub-groups LL, HL,
LH, HH which contains the approximation band,
Horizontal component of image, Vertical component
of image, Diagonal component of image respectively.
Ghorbani et al.[19] proposed a method to detect
copy-move forgery based on DWT-DCT (QCD) in
2011. DCT is used for feature extraction from the
approximation band which is divided into overlapping
blocks of fixed size. DCT extracts feature vector from
6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2124
each block. These row feature vectors are sorted in a
matrix. After that DCT coefficients are decomposed
for this quantization is performed using quantized
table.
Zandi et al. [20] proposed an adaptive copy-move
forgery detection (CMFD) approach in 2014. This
approach can be employed for most of the block-
based copy-move forgery detection. Different
thresholds were adopted for various image contents.
As it is expressed, a higher threshold should be
selected for textured areas since less false matches
occurs in such regions. This is because more distinct
features make block matching more reliable. On the
contrary, a low threshold is more appropriate for
smooth regions. The standard deviation (SD)
estimates the energy of high frequency coefficients of
the blocks. The matching threshold can be adjusted
proportional to the SD of the pair block’s intensity.
This relationship is almost linear. Thus, the adaptive
threshold of a specific block was determined by its
SD; therefore, the corresponding CMFD can detect
duplications in both smooth and textured regions. In
addition to reducing the potential matches, this
method outperforms the LSH based methods in terms
of true positive and false positive rates.
Lee et al.[21] in 2015 proposed a block-based method
based on the histogram of oriented gradient in which
the image is divided into overlapping blocks. HOG
features are extracted from each block and Euclidean
distance matching is performed. The method detects
multiple instances of copy-move in a single image but
it is not rotation and scale invariant
Zhou et al. [22] in 2016 designed the CMFD
algorithm based on color information and its
histograms. Most of the forgery detection methods
convert a RGB image into a grey scale image, which
discards the colour information of the image. To
utilize the colour information, colour moments are
used to cluster the blocks according to their colour
similarity. While Neural Networks can have only a
certain type of sigmoidal or radial basis function,
CPPN can have a mixture of such functions. The
method is not rotation invariant.
Huang et al. [23] developed copy move forgery
detection using Scale Invariant Feature Transform
(SIFT) technique in 2009. Firstly, the authors have
used SIFT technique to find the duplicate region with
scale as well as rotation. Further, Best Bin First
search (BBF) techniques have been used for finding
possible duplicate key-points. Additionally, nearest
neighbour distance ratio(NNDR) is applied to
increase the detection rate or accuracy. This technique
is able to find key-points even if image is noisy or
compressed.
Christlein et al.[24] performed a comprehensive
evaluation of various kinds of CMFD approaches. An
image database containing 48 base images was
adopted, and the copy-move forgeries were carefully
produced without leaving visually noticeable traces.
Of all the features, Zernike features are the
recommended choice due to its relatively small
memory footprint.
Li J et al. [25] proposed one of the hybrid methods in
which the key-points are extracted using the SIFT
algorithm by first segmenting the test image into
semantically independent patches using SLIC (Simple
Linear Iterative Clustering) segmentation with no less
than 100 patches so as to cover all the possible forged
regions. K-nearest neighbour is used for matching the
patches. The (Expectation-Maximization) EM-based
algorithm is then used in order to refine the matching.
Ardizzone et al. [26] built the triangulation onto the
extracted key-points. In the regions where no key-
points are extracted, uniformly arbitrary points are
added onto the boundary of the image which helps in
subdividing the parts of the image into triangles that
have no keypoints. The triangles are matched using
two characteristics, the dominant and the angles and
the areas in the triangle. They are matched using a
Mean Vertex Descriptor (MVD). The method is two
orders of magnitude faster than block-based methods.
In the case of complex scenes, the high number of
triangles influences the matching process resulting in
worse performance.
Zhong J [27] explored the Radon odd radial
harmonic Fourier moments method (RORHFM) to
improve performance against various operations such
as rotation, scaling, translation etc. RORHFM is
applied with a circle template to extract the geometric
inherent features. Pearson Correlation Coefficient is
applied to analyse the geometric transform of cloned
forgeries to calculate and classify the statistical data.
The kernel representation is more complex in
RORHFM, which leads to computational complexity
because computational complexity and cost of the
method is mainly dependent on kernel function.
The drawback of combining block-based methods and
key-point based methods is that if the first one is
unsuccessful at identifying the forgery and the image
is too smooth to have enough key-points, then the
fusion approach cannot give accurate results.
XII. LITERATURE SURVEY OF SPLICING
DETECTION TECHNIQUES
Image splicing is another commonly used forgery
operation in images. It is therefore necessaryto detect
image splicing. For splicing, copy-move based
techniques cannot be used as those techniques are
7. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2125
based on finding a matching region in the image,
whereas, in splicing, the forged region is copied from
another image. Hence, the forged region will have
different characteristics as compared with the rest of
the image. The presence of abrupt changes between
different regions that are combined and their
backgrounds, provide valuable traces to detect
splicing in the image under consideration. Splicing-
based methods use a variety of features such as
Bicoherence features, camera response function, DCT
and DWT coefficients, invariant image moments,
Weber local descriptors, etc.
Ng and Chang [28] suggested an image-splicing
detection method based on the use of bicoherence
magnitude features and phase features. Detection
accuracy of 70% was obtained. Same authors later
developed a model for detection of discontinuity
caused by abrupt splicing using bi-coherence.
X. Wu and Z. Fang [29] proposed the image splicing
detection method which uses illuminantcolor
inconsistency to detect image splicing and to locate
spliced area. The author suggests that the irregularity
at the colour edge is significant evidence that the
image has been tampered. Given color image is
divided into many overlapping blocks. Based on the
content of blocks a classifier is used to adaptively
select illuminantcolor estimation algorithm.
Illuminantcolor is estimated for each block, and the
difference between the estimation and reference
illuminantcolor is measured. If the difference is larger
than a threshold, the corresponding block is labelled
as spliced block. Considering the impact of image
content on the illumination color estimation, a
maximum likelihood classifier is used to adaptively
select illuminant estimation algorithm.
Zhao, Wang, Li, and Li [30] model the adjacent
coefficient difference array in two different domains,
i.e. BDCT domain and DWT domain as an
observation for a 2-D Markov model.
Markov features are one of the most effective features
for splicing detection. The entire feature set is then
divided randomly into two sets: one for training and
other for testing. The training set finds the optimal
hyperplane and the testing set is used to test the
effectiveness of the method. The method has high
complexity but provides better robustness to JPEG
compression and median filtering as compared with
methods available in the literature.
Bahrami et al. [31] discussed that in order to hide the
traces of splicing, blurring is the commonly
performed operation. So, the authors proposed Local
blur-type features which are generated by partitioning
the image into blocks using a Generalized Gaussian
Distribution (GGD). Second, a classifier is formulated
to classify the image blocks into out-of-focus or
motion blur based on the proposed features. Then,
splicing localization is performed. The drawback of
this method is that a human decision is needed to
indicate the spliced region based on some
inconsistencies in the blur type and the semantics of
the image. Such detection is robust to image resizing
and spliced region boundary blurring and does not
need camera information. However, our method can
be applied to blurred images only.
Zhan et al. [32] in 2016 proposed the image splicing
detection method based on PCA minimum
eigenvalues. In this method, an image is segmented
into pixel-centred overlapping image blocks. Each
block is resampled by the self-similarity pixel
strategy (SSS). Then, the local minimum eigenvalues
(LME) of the sample matrix calculated by PCA are
analysed. A threshold is set to separate the LMEs into
two clusters. The threshold can be obtained by the
frequency histogram. In the literature, some methods
select a few reference blocks and approximate their
illuminant. The reference blocks are compared with a
suspicious block to find out the angular error between
them. If this value is more than the threshold value,
the corresponding block is said to be manipulated.
Such methods rely largely on user’s perception and
interaction capabilities to choose the correct reference
blocks. If the reference blocks are not chosen
correctly, the performance of the methods is strongly
compromised. This method is suitable for any input
splicing forgery images with inconsistent irrelevant
components. It can localize the tampered region on
the pixel level. What's more, the minimum eigenvalue
exists as a property that only relates to image itself. It
can be available by direct calculation without the
estimation procedure, which eliminates the estimation
errors affected by estimation methods and further
increases the detection precision.
Kaur M, Gupta S [33] proposed a method based on
wavelet transform by using DWT and LBP. A Sharp
transition is introduced by splicing operation in the
form of lines, corners, edges, etc. Such sharp
transitions are characterized by high frequency
components. To detect such transitions, wavelet
coefficients can be analysed in order to measure local
sharpness or smoothness. Low level coefficients are
obtained using Single level discrete wavelet
transform. Then, local binary patterns are used to
extract the texture of these [LL, LH, HL, HH]
components. A histogram of these texture images is
considered for effective training and testing of
features. The concatenation of LBP histograms is
performed and fed to the SVM classifier for training.
8. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2126
The method has low computational complexityand is
invariant to monotonic illumination changes. But the
performance of the method degrades when the size of
the image is too small.
Li C [34] proposed another method in which the
colour components are utilized and information
pertaining to colour is obtained from blocks of images
to construct quaternion. Then quaternion discrete
cosine transform (QDCT) is applied and its
coefficients related to the blocks of images are
extracted. The expanded Markov features generated
from the transition probability matrices in QDCT
domain can capture inter-block correlation between
its coefficients along with the intra-block QDCT
coefficients. Finally, the distinction between authentic
and spliced images is made using the feature vector
obtained with Primal SVM as a classifier. The
algorithm not only make use of color information of
images, but also can yield but also can significantly
lead to improving the tampering detection rate, with
more than 92.38% accuracy compared with the state-
of-the-art splicing detection methods tested on the
same dataset. Because the tamper images are mostly
color in real life, this new idea for image tamper
detection research has a certain theoretical and more
practical significance.
XIII. LITERATURE SURVEY OF
RETOUCHING BASED DETECTION
TECHNIQUES
Image retouching detection is carried out by trying to
find the blurring, enhancements, colour changes and
illumination changes in the forged image. Detection is
easy if the original image is available however blind
detection is challenging task. For this type of forgery
two type of modification is done either global or
local. Local modification is done usually in copy-
move and in splicing forgery. Contrast enhancement
that is carried out in case of retouching is done at
global level and for detection of tampering these are
investigated. For illumination and changes in contrast
global modification is carried out.
M. C. Stamm and K. J. R. Liu [35] gave an algorithm
that describes a method that does not only detect
global enhancements but also suggests methods for
histogram equalization. A similar model based on the
probabilistic model of pixel values is detailed in [36]
that approximate the detection of contrast
enhancement. Histograms for entries that are most
likely to occur with corresponding artifacts due to
enhancement are identified. This technique provides
very accurate results in case the enhancement is not
standard.
Cao et al. [37] developed a method for detection of
gamma correction for image forgery detection. Then
technique is based on estimation of histogram
characteristics that are calculated by patterns of the
peak gap features. These features are discriminated by
the pre-computed histogram for the gamma correction
detection in images. Results propose that this
technique is very effective for both global and local
gamma correction modifications.
X. F. Li et al. [38] developed a technique for
detection of retouching which is based on the Bi-
Laplacian filtering. This technique looks for matching
blocks on the basis of a KD tree for each block of the
image. This technique works well on uncompressed
images and compressed high-resolution images.
Accuracy also depends on area of the tampered region
for high-level compressed images.
G. Cao et al. [39] developed two novel algorithms
were developed to detect the contrast enhancement
involved manipulations in digital images. It focuses
on the detection of global contrast enhancement
applied to JPEG-compressed images. The histogram
peak/gap artifacts incurred by the JPEG compression
and pixel value mappings are analysed theoretically,
and distinguished by identifying the zero-height gap
fingerprints. Another algorithm in same paper
proposes to identify the composite image created by
enforcing contrast adjustment on either one or both
source regions. The positions of detected block wise
peak/gap bins are clustered for recognizing the
contrast enhancement mappings applied to different
source regions. Both algorithms are very effective.
G. Chierchia [40] explored the techniques based on
the photo-response non-uniformity (PRNU) that
detect the absence of the camera PRNU. This
algorithm detects image forgeries using sensor pattern
noise. A Markov random field take decisions jointly
on the whole image rather than individually for each
pixel. This algorithm shows better performance and a
wider practical application.
Number of methods have been proposed and
discussed for retouching forgery. Limitation is that
most of the methods work well if the image is greatly
modified in comparison to the original image.
Moreover, the human intervention required to
interpret the result makes them non blind techniques.
XIV. PROPOSED METHODOLOGY
I will be taking two techniques of image forgery, one
is Gabor Filter and the other one is BRICH,
combining the algorithm of two and giving one
hybrid algorithm as a result.
9. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2127
REFERENCES
[1] Farid H. Image forgery detection. IEEE Signal
Process Mag. 2009; 26(2): 16–25.
[2] Reis G. Digital image integrity. San Jose, CA;
1999.
[3] Photo Tampering throughout history. Four and
six Technologies, Inc. [Online]. [cited 2017
Aug 18]. Available from: http://pth izitru.com/
[4] Mhiripiri NA, Chari T. Media law, ethics, and
policy in the digital age. United States of
America: IGI Global; 2017.
[5] Salam A Thajeel and GhazaliSulong, A Survey
of copy-move forgery detection techniques,
Journal of Theoretical and Applied Information
Technology, 2014, Vol. 70, No. 1, Pp. 25-35.
[6] Z. Zhang, Y. Ren, X. J. Ping, Z. Y. He and S.
Z. Zhang, “A survey on passive-blind image
forgery by doctor method detection”, Proc.
Seventh Int. Conf. on Machine Learning and
Cybernetics, (2008), pp. 3463–3467.
[7] NishthaParashar and Nirupama Tiwari, A
Survey of Digital Image Tampering
Techniques, International Journal of Signal
Processing, 2015 Vol. 8, No. 10, Pp. 91-96
[8] Doke KK, Patil SM. Digital signature scheme
for image. International Journal of Computer
Applications. 2012; 49(16): 1-6.
[9] Elwin JGR, Aditya TS, Shankar SM. Survey on
passive methods of image tampering detection.
Proceedings of the International Conference on
Communication and Computational
Intelligence; 2010 Dec 27–29; Perundurai,
Erode: Kongu Engineering College; 2003. p.
431– 436.
[10] Qazi T, Hayat K, Khan SU, Madani SA, Khan
IA, Kolodziej J, Li H, Lin W, Yow KC, et al.
Survey on blind image forgery detection. IET
Image Proc. 2013; 7(7): 660–670.
[11] Pradyumna Deshpande and PrashastiKanikar,
Pixel Based Digital Image Forgery Detection
10. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2128
Techniques, International Journal of
Engineering Research and Applications, 2012,
Vol. 2, Issue 3, Pp. 539-543.
[12] Harpreet Kaur, Kamalijit Kaur, A Brief Survey
of Different Techniques for Detecting Copy
Move Forgery, International Journal of
Advanced Research in Computer Science and
Software Engineering, 2015, Vol. 5, Issue. 4.
[13] Wei Wang et al, A Survey of Passive Image
Tampering Detection, Springer, 2009, Pp. 308
322.
[14] Akanksha Namdeo1and Anish Vishwakarma, A
Survey on Copy Move Image Forgery
Detection Using Wavelet Transform,
International Journal of Science and Research,
2013, Vol. 4, Issue 3, Pp. 876-878.
[15] J. Fridrich, D. Soukal, and J. Lukas, “Detection
of copy move forgery in digital images,”
Proceedings of the Digital Forensic Research
Workshop, pp. 5-8, Aug. 2003.
[16] A. C. Popescu, and H. Farid, “Exposing digital
forgeries by detecting duplicated image
regions,” Dept. Comput. Sci., Dartmouth
College, Tech. Rep., TR2004-515, 2004.
[17] A. Langille and M. Gong, “An efficient match-
based duplication detection algorithm”, Proc. of
the 3rd Canadian conference on computer and
robot vision, (2006), pp. 64.
[18] G. H. Li, Q. Wu, D. Tu, and S. J. Sun, “A
sorted neighbourhood approach for detecting
duplicated regions in image forgeries based on
DWT and SVD,” Proceedings of IEEE
International Conference on Multimedia and
Expo, Beijing, Jul. 2007, pp. 1750-1753.
[19] M. Ghorbani, M. Firouzmand, and A. Faraahi,
“DWT-DCT (QCD) based copy-move image
forgery detection,” 18th IEEE International
Conference on Systems, Signals and Image
Processing (IWSSIP), 2011, pp. 1-4.
[20] Zandi M, Mahmoudi-Aznaveh A, Mansouri A.
Adaptive matching for copy move Forgery
detection. In: Proceedings of 2014 IEEE
International Workshop on Information
Forensics and Security; 2014 Dec 3–5; Atlanta,
GA, USA. Piscataway: IEEE; 2014. p. 119–24.
[21] Lee J-C, Chang C-P, Chen W-K. Detection of
copy-move image forgery using histogram of
orientated gradients. InfSci (NY). 2015; 321:
250–262.
[22] Zhou H, Shen Y, Zhu X, Liu B, Fu Z, Fan N.
Digital image modification detection using
color information and its histograms. Forensic
Sci Int. 2016; 266: 379–388.
[23] H. Huang, W. Guo, and Y. Zhang, “Detection
of copy-move forgery in digital images using
SIFT algorithm,” Pacific-Asia Workshop on
Computational Intelligence and Industrial
Application, Vol. 2, pp. 272-6, Dec. 2009.
[24] Christlein V, Riess C, Jordan J, Riess C,
Angelopoulou E. An evaluation of popular
copymove forgery detection approaches. IEEE
Trans InfForen Sec 2012; 7(6): 1841–54.
[25] Li J, Li X, Yang B, Sun X. Segmentation-based
image copy-move forgery detection scheme.
IEEE Trans Inf Forensics Secur. 2015; 10(3):
507–518.
[26] Ardizzone E, Bruno A, Mazzola G. Copy-move
forgery detection by matching triangles of
keypoints. IEEE Trans Inf Forensics Secur.
2015; 10(10): 2084–2094.
[27] Zhong J, Gan Y, Xie S. Radon odd radial
harmonic Fourier moments in detecting cloned
forgery image. Chaos Solitons Fractals. 2016;
89: 115–129.
[28] T. Ng and S. Chang, “A model for image
splicing”, Proc. of IEEE International
conference on image processing (ICIP), (2004),
pp. 1169–72.
[29] X. Wu and Z. Fang, “Image Splicing Detection
Using Illuminant Color Inconsistency”,
International Conference on Multimedia
Information Networking and Security
(MINES), (2011), pp. 600-603.
[30] Zhao X, Wang S, Li S, Li J. Passive image
splicing detection by a 2-D Noncausal Markov
Model. IEEE Trans Circuits Syst Video
Technol. 2015; 25(2): 185–199.
[31] Bahrami K, Kot AC, Li L, Li H. Blurred image
splicing localization by exposing blur type
inconsistency. IEEE Trans Inf Forensics Secur.
2015; 10(5): 999–1009.
[32] Zhan L, Zhu Y, Mo Z. An image splicing
detection method based on PCA minimum
eigenvalues. J Inf Hiding Multimed Signal
Process. 2016; 7(3): 610–619.
[33] Kaur M, Gupta S. A passive blind approach for
image splicing detection based on DWT and
LBP histograms. Int
SympSecurComputCommun. 2016: 318–327.
11. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD49915 | Volume – 6 | Issue – 3 | Mar-Apr 2022 Page 2129
[34] Li C. Image splicing detection based on
Markov features in QDCT domain.
Neurocomputing. 2017; 228: 29–36.
[35] M. C. Stamm and K. J. R. Liu, “Blind forensics
of contrast enhancement in digital images”,
Proc. 15th IEEE Int. Conf. Image Processing
2008, (ICIP’2008), (2008), pp. 3112–3115.
[36] M. C. Stamm and K. J. R. Liu, “Forensic
estimation and reconstruction of a contrast.
Enhancement mapping”, Proc. IEEE Int. Conf.
Acoustics speech and signal processing
(ICASSP), (2010), pp. 1698-1701.
[37] G. Cao, Y. Zhao and R. Ni, “Forensic
estimation of gamma correction in digital
images”, Proc. 17th IEEE Int. Conf. on Image
Processing, (ICIP’2010), (2010), pp. 2097–
2100.
[38] X. F. Li, X. J. Shen and H. P. Chen, “Blind
identification algorithm for the retouched
images based on bi-Laplacian”, Comput. Appl.,
vol. 31, (2011), pp. 239–242.
[39] G. Cao, Y. Zhao, R. Ni and X. Li, “Contrast
Enhancement-Based Forensics in Digital
Images”, IEEE Transactions on Information
Forensics and Security, vol. 9, no. 3, (2014),
pp. 515-525.
[40] G. Chierchia, G. Poggi, C. Sansone and L.
Verdoliva, “A Bayesian-MRF Approach for
PRNU-Based Image Forgery Detection”,
Information Forensics and Security, IEEE
Transactions, vol. 9, no. 4, (2014), pp. 554-567.