SlideShare a Scribd company logo
1 of 17
Region Duplication Forgery Detection in Digital
Images
By
Rupesh Ambatwad
Presentation
on
1
Outline
 Introduction
 Literature Survey
 Algorithms & Techniques
 Comparisons
 Applications
 References
2
Introduction(1/3)
What is image Forgery
 Image forgery is process of counterfeiting image
visual content using the various different image
editing tools.
Region Duplication Forgery
 In copy-move forgery one or more part of image is
copied & pasted over another part in similar image
3
Introduction(2/3)
Example
4Figure-1 . Region Duplication Forgery
Introduction(3/3)
Figure 2.-Image Authentication Techniques[6]
5
Literature survey
Year Paper Name Authors Published At
January
2017
Region duplication detection
using color histogram and
moments in digital image
Ashwini V.
Malviya,
Siddharth
Ladhake
ICICT(IEEE)
January
2017
Copy-Move Forgery Detection
Using Segmentation
Bhavya Bhanu
,Dr. Arun Kumar
ISCO(IEEE)
April
2016
A New Block-based Copy-Move
Forgery Detection Method in
Digital Images
Hajar Moradi-
Gharghani and
Mehdi Nasri
ICCSP(IEEE)
April
2015
Region Duplication Forgery
Detection in Digital Images
Using 2D-DWT and SVD
Varsha
Sanap,Vanita
Mane
iCATccT(IEEE)
27 Feb
2013
Efficient image duplicated region
detection model using sequential
block clustering
Mohammad
Akbarpour,
Mohd. Aizaini
ELSEVIER
6
Paper 1: Region duplication detection using color
histogram and moments in digital image[1]
Figure3. Proposed Algorithm
7
Image Segmentation
Input image
Matching Stage
Displaying Detected
CMF Regions
Inliers Estimation
Patch Matching
Feature Extraction
Detection Result
Figure-4. Flowchart of proposed method 8
Paper 2:Copy-Move Forgery Detection Using
Segmentation[2]
Final Stage
Divide into
overlapping
block
Threshold
Parameters
Input image
Applying 2-D
DCT &
Quantization
Extracting
feature(SVD)
Remove
Distributed
Matching
Output image
Figure-5 . Forgery detection process 9
Lexicographicall
y ordering
Paper 3: A New Block-based Copy-Move Forgery
Detection Method in Digital Images[3]
10
Forgery Org.
Image
Performance
Measurement
Hit Rate
Extract R,G,B
Channel
Apply 2D-DWT
Apply Block
Processing
Candidate Block
Selection
Apply SVD on Each
block
Forged Block
Detection
FDRMiss Rate
Figure-6 . Proposed Algorithm
Paper 4: Region Duplication Forgery detection in
Digital Images Using 2D-DWT and SVD[4]
Figure-7 . Flowchart
11
Paper 5:Efficient image duplicated region detection
model using sequential block clustering[5]
Comparisons
Papers Paper 1 Paper 2 Paper 3 Paper 4 Paper 5
Algorithm &
Techniques Used
HSV
Histogram
SLIC,KNN DCT, SVD 2D-DWT,
SVD
Euclidean
Distance
Dataset Used CoMoFoD ,
MICC-F
MICC-F600
Unknown
MICC-F220
MICC-F200 MICC-F220
Detection Basis Color
Moments &
Histogram
Segmentation. New Block
Based
2D-DWT
and SVD
based
Sequential
block
clustering
Accuracy
(0.6-1)
Correctly
Detected.
0.0024,
0.9976
0.4 Improved
26.7% for
227*191 img.
Performance Less intricate High DAR
Improves
Accurate Improved
time
complexity
Future Scope Region
Duplicate
with Splicing
Unknown Zernike
Moments
can be used
Selecting
Threshold
value varies
to image
Multilayer
Block
Matching
Applications
 Medical Imaging
13
•Banking
 Legal processing Documents
 News/Journalism
14
Applications
15
Applications
• Crime Investigation
References
[1] Ashwini V. Malviya, Siddharth Ladhake ,”Region duplication detection using
color histogram and moments in digital image”,in ICICT(IEEE) ,January 2017.
[2] Bhavya Bhanu , Dr. Arun Kumar.”Copy-Move Forgery Detection Using
Segmentation”,in IEEE Tran. January 2017.
[3] Hajar Moradi-Gharghani and Mehdi Nasri ,”A New Block-based Copy-Move
Forgery Detection Method in Digital Images” in IEEE Tran.,April 2016.
[4]Vanita Manikrao Mane, Varsha Karbhari Sanap , ”Region Duplication Forgery
Detection in Digital Images Using 2D-DWT and SVD”, IEEE Trans. April 2015.
[5] Mohammad Akbarpour, Mohd. Aizaini ,”Efficient image duplicated region
detection model using sequential block clustering”, in ELSEVIER, Feb 2013
[6] Saba Mushtaq and Ajaz Hussain Mir,”Digital Image Forgeries and Passive Image
Authentication Techniques: A Survey”IEEE Tranct.2010.
16
Thank You..!
rupeshambatwad@gmail.com
17

More Related Content

What's hot

Naveen 9911103606 major ppt
Naveen 9911103606 major pptNaveen 9911103606 major ppt
Naveen 9911103606 major pptNaveen Rajgariya
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
 
Andrey Kuznetsov and Vladislav Myasnikov - Using Efficient Linear Local Feat...
Andrey Kuznetsov and  Vladislav Myasnikov - Using Efficient Linear Local Feat...Andrey Kuznetsov and  Vladislav Myasnikov - Using Efficient Linear Local Feat...
Andrey Kuznetsov and Vladislav Myasnikov - Using Efficient Linear Local Feat...AIST
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature reviewTharindu Rusira
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsCSCJournals
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Review of Digital Image Forgery Detection
Review of Digital Image Forgery DetectionReview of Digital Image Forgery Detection
Review of Digital Image Forgery Detectionrahulmonikasharma
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator cscpconf
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...IJMER
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
 
Fuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast EnhancementFuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast EnhancementSamrudh Keshava Kumar
 

What's hot (20)

Naveen 9911103606 major ppt
Naveen 9911103606 major pptNaveen 9911103606 major ppt
Naveen 9911103606 major ppt
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Andrey Kuznetsov and Vladislav Myasnikov - Using Efficient Linear Local Feat...
Andrey Kuznetsov and  Vladislav Myasnikov - Using Efficient Linear Local Feat...Andrey Kuznetsov and  Vladislav Myasnikov - Using Efficient Linear Local Feat...
Andrey Kuznetsov and Vladislav Myasnikov - Using Efficient Linear Local Feat...
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Review of Digital Image Forgery Detection
Review of Digital Image Forgery DetectionReview of Digital Image Forgery Detection
Review of Digital Image Forgery Detection
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
Image mosaicing
Image mosaicingImage mosaicing
Image mosaicing
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Fuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast EnhancementFuzzy Logic based Contrast Enhancement
Fuzzy Logic based Contrast Enhancement
 

Similar to Region duplication forgery detection in digital images

8. 10179 13825-1-ed edit iqbal
8. 10179 13825-1-ed edit iqbal8. 10179 13825-1-ed edit iqbal
8. 10179 13825-1-ed edit iqbalIAESIJEECS
 
Gadljicsct955398
Gadljicsct955398Gadljicsct955398
Gadljicsct955398editorgadl
 
Salient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdfSalient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdfSravaniSanapala2
 
IRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET Journal
 
Improving the Accuracy of Object Based Supervised Image Classification using ...
Improving the Accuracy of Object Based Supervised Image Classification using ...Improving the Accuracy of Object Based Supervised Image Classification using ...
Improving the Accuracy of Object Based Supervised Image Classification using ...CSCJournals
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmIJARIIT
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...IRJET Journal
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...IRJET Journal
 
Unsupervised region of interest
Unsupervised region of interestUnsupervised region of interest
Unsupervised region of interestcsandit
 
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET -  	  Underwater Image Enhancement using PCNN and NSCT FusionIRJET -  	  Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT FusionIRJET Journal
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformIJERA Editor
 
Web Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual DictionaryWeb Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual Dictionaryijwscjournal
 
Web Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual DictionaryWeb Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual Dictionaryijwscjournal
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationIIRindia
 
RADAR Image Fusion Using Wavelet Transform
RADAR Image Fusion Using Wavelet TransformRADAR Image Fusion Using Wavelet Transform
RADAR Image Fusion Using Wavelet TransformINFOGAIN PUBLICATION
 

Similar to Region duplication forgery detection in digital images (20)

8. 10179 13825-1-ed edit iqbal
8. 10179 13825-1-ed edit iqbal8. 10179 13825-1-ed edit iqbal
8. 10179 13825-1-ed edit iqbal
 
P045058186
P045058186P045058186
P045058186
 
Gadljicsct955398
Gadljicsct955398Gadljicsct955398
Gadljicsct955398
 
Salient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdfSalient keypoint-based copy move image forgery detection.pdf
Salient keypoint-based copy move image forgery detection.pdf
 
IRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion Methods
 
Improving the Accuracy of Object Based Supervised Image Classification using ...
Improving the Accuracy of Object Based Supervised Image Classification using ...Improving the Accuracy of Object Based Supervised Image Classification using ...
Improving the Accuracy of Object Based Supervised Image Classification using ...
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 
Image Forgery Detection
Image Forgery DetectionImage Forgery Detection
Image Forgery Detection
 
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
 
Unsupervised region of interest
Unsupervised region of interestUnsupervised region of interest
Unsupervised region of interest
 
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET -  	  Underwater Image Enhancement using PCNN and NSCT FusionIRJET -  	  Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet Transform
 
Web Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual DictionaryWeb Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual Dictionary
 
Web Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual DictionaryWeb Image Retrieval Using Visual Dictionary
Web Image Retrieval Using Visual Dictionary
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image Segmentation
 
RADAR Image Fusion Using Wavelet Transform
RADAR Image Fusion Using Wavelet TransformRADAR Image Fusion Using Wavelet Transform
RADAR Image Fusion Using Wavelet Transform
 
Aw03402840286
Aw03402840286Aw03402840286
Aw03402840286
 
E1083237
E1083237E1083237
E1083237
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

Region duplication forgery detection in digital images

  • 1. Region Duplication Forgery Detection in Digital Images By Rupesh Ambatwad Presentation on 1
  • 2. Outline  Introduction  Literature Survey  Algorithms & Techniques  Comparisons  Applications  References 2
  • 3. Introduction(1/3) What is image Forgery  Image forgery is process of counterfeiting image visual content using the various different image editing tools. Region Duplication Forgery  In copy-move forgery one or more part of image is copied & pasted over another part in similar image 3
  • 6. Literature survey Year Paper Name Authors Published At January 2017 Region duplication detection using color histogram and moments in digital image Ashwini V. Malviya, Siddharth Ladhake ICICT(IEEE) January 2017 Copy-Move Forgery Detection Using Segmentation Bhavya Bhanu ,Dr. Arun Kumar ISCO(IEEE) April 2016 A New Block-based Copy-Move Forgery Detection Method in Digital Images Hajar Moradi- Gharghani and Mehdi Nasri ICCSP(IEEE) April 2015 Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD Varsha Sanap,Vanita Mane iCATccT(IEEE) 27 Feb 2013 Efficient image duplicated region detection model using sequential block clustering Mohammad Akbarpour, Mohd. Aizaini ELSEVIER 6
  • 7. Paper 1: Region duplication detection using color histogram and moments in digital image[1] Figure3. Proposed Algorithm 7
  • 8. Image Segmentation Input image Matching Stage Displaying Detected CMF Regions Inliers Estimation Patch Matching Feature Extraction Detection Result Figure-4. Flowchart of proposed method 8 Paper 2:Copy-Move Forgery Detection Using Segmentation[2] Final Stage
  • 9. Divide into overlapping block Threshold Parameters Input image Applying 2-D DCT & Quantization Extracting feature(SVD) Remove Distributed Matching Output image Figure-5 . Forgery detection process 9 Lexicographicall y ordering Paper 3: A New Block-based Copy-Move Forgery Detection Method in Digital Images[3]
  • 10. 10 Forgery Org. Image Performance Measurement Hit Rate Extract R,G,B Channel Apply 2D-DWT Apply Block Processing Candidate Block Selection Apply SVD on Each block Forged Block Detection FDRMiss Rate Figure-6 . Proposed Algorithm Paper 4: Region Duplication Forgery detection in Digital Images Using 2D-DWT and SVD[4]
  • 11. Figure-7 . Flowchart 11 Paper 5:Efficient image duplicated region detection model using sequential block clustering[5]
  • 12. Comparisons Papers Paper 1 Paper 2 Paper 3 Paper 4 Paper 5 Algorithm & Techniques Used HSV Histogram SLIC,KNN DCT, SVD 2D-DWT, SVD Euclidean Distance Dataset Used CoMoFoD , MICC-F MICC-F600 Unknown MICC-F220 MICC-F200 MICC-F220 Detection Basis Color Moments & Histogram Segmentation. New Block Based 2D-DWT and SVD based Sequential block clustering Accuracy (0.6-1) Correctly Detected. 0.0024, 0.9976 0.4 Improved 26.7% for 227*191 img. Performance Less intricate High DAR Improves Accurate Improved time complexity Future Scope Region Duplicate with Splicing Unknown Zernike Moments can be used Selecting Threshold value varies to image Multilayer Block Matching
  • 14.  Legal processing Documents  News/Journalism 14 Applications
  • 16. References [1] Ashwini V. Malviya, Siddharth Ladhake ,”Region duplication detection using color histogram and moments in digital image”,in ICICT(IEEE) ,January 2017. [2] Bhavya Bhanu , Dr. Arun Kumar.”Copy-Move Forgery Detection Using Segmentation”,in IEEE Tran. January 2017. [3] Hajar Moradi-Gharghani and Mehdi Nasri ,”A New Block-based Copy-Move Forgery Detection Method in Digital Images” in IEEE Tran.,April 2016. [4]Vanita Manikrao Mane, Varsha Karbhari Sanap , ”Region Duplication Forgery Detection in Digital Images Using 2D-DWT and SVD”, IEEE Trans. April 2015. [5] Mohammad Akbarpour, Mohd. Aizaini ,”Efficient image duplicated region detection model using sequential block clustering”, in ELSEVIER, Feb 2013 [6] Saba Mushtaq and Ajaz Hussain Mir,”Digital Image Forgeries and Passive Image Authentication Techniques: A Survey”IEEE Tranct.2010. 16