Abstract

Increase on the availabilityUstubioglu, Beste of the imageUlutas, Mustafa editingUlutas, Guzin software makesNabiyev, Vasif the forgery of the digital imageUstubioglu, Arda easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery. First, the method divides the image into overlapping blocks. It uses LBP (Local Binary Pattern) to label each block. Labeled blocks are transformed into frequency domain using DCT (Discrete Cosine Transform). Sign values of the first fifteen coefficients of the zigzag scanned block plus average Y, Cb, Cr values constitutes the feature vector for the block. Finally, the feature vectors are lexicographically sorted and element-by-element similarity measurement is used to determine the forged blocks. Experimental results show that the method has higher accuracy ratios and lower false negative values under some post processing operation compared to other DCT based methods. Our method can also detect multiple copy move forgery.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.