An Effective Halftoning Based Image Forgery And Morphing Detection

International Journal of Mobile Computing and Application
© 2021 by SSRG - IJMCA Journal
Volume 8 Issue 1
Year of Publication : 2021
Authors : S.Jagatheeswari, M. Malini, M.Nagapushpam, M.Vigneshwari , Mrs.V. Krishnameera
pdf
How to Cite?

S.Jagatheeswari, M. Malini, M.Nagapushpam, M.Vigneshwari , Mrs.V. Krishnameera, "An Effective Halftoning Based Image Forgery And Morphing Detection," SSRG International Journal of Mobile Computing and Application, vol. 8,  no. 1, pp. 11-16, 2021. Crossref, https://doi.org/10.14445/23939141/IJMCA-V8I1P103

Abstract:

Because of progress in PC-based correspondence and wellbeing administrations in the course of recent years, the need for image security turns out to be speedier to address the necessities of both security and non-wellbeing in all applications. Strategy for confirming and self-recuperation of altered work in computerized images have been in steady expanding during the previous few years. This paper tells about another LU decomposed half toning strategy for image validation and self-recuperation for clinical application . The proposed conspire finds image tampering just as concentrate the first image. The given image is broken into 4*4 squares, and LU is utilized to discover the change in the concentrated image .at that point produces the validation watermarks, which depend on XOR Operation on non-overlapping blocks, also by half toning procedure, the removed water is delivered. To assess the personality of the removed image , the target rule of pinnacle sign to commotion ratio(PSNR) and tampering proportion is

Keywords:

Morphing Detection, Image

References:

[1] Dadkhah et al ., An effective svd-based image tampering detection and self-recovery using active watermarking, Signal Process Image Commun, 29(10) (2014)1197–1210. https://doi.org/10.1016/j.image.2014. 09.001.
[2] Hsu et al ., Probability-based tampering detection scheme for digital images. Optics Commun, 283(9) (2010) 1737–1743. https://doi.org/10.1016/j.optcom.2009.12.073.
[3] Lee T-Y et al., Dual watermark for image tamper detection and recovery. Pattern Recogn, 41(11) (2008) 3497–3506. https://doi.org/10.1016/j.patcog.2008.05.003.
[4] Matthew Holliman et al., Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, 9(3) (2000) 432–441.
[5] Ninghui Li, Wenliang Du, and Dan Boneh., Oblivious signature-based envelope, Distributed Computing, 17(4) (2005) 293–302.
[6] Ping Wah et al., Secret and public key image water-marking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, 10(10) (2001) 1593–1601.
[7] Qian Z et al., Image self-embedding with high-quality restoration capability, Digital Signal Process. 21(2) (2011) 278–286. https://doi.org/10.1016/j.dsp.2010.04.006
[8] Shah Suthaharan., Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, 25(16) (2004)1893–1903.
[9] Shao-Hui et al., An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, 185(2) (2007) 869–882.
[10] Toshihiko Matsuo et al., On parallel hash functions based on block-ciphers, IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, 87(1) (2004) 67–74.
[11] Zhang J, Zhang Q, Lv H., A novel image tamper localization and recovery algorithm based on watermarking technology. Optik - International Journal for Light and Electron Optics, 124(23) (2013) 6367–6371. https://doi.org/10.1016/j.ijleo.2013.05. 040.
[12] Zhang X et al., Self-embedding fragile watermarking based on DCT and fast fractal coding, Multimed Tools Appl, 74(15) (2015) 5767–5786.