Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Image Forensic For Digital Image Copy Move Forgery

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

IMAGE FORENSIC FOR DIGITAL

IMAGE COPY MOVE FORGERY


DETECTION
GUIDE NAME: BY:
B.YADAGIRI K.SONI 16D31A0418
(ASST.PROF) K.MOUNIKA 16D31A0419
B.SRINIVAS 16D31A0403
CONTENTS:

• ABSTRACT
• INTRODUCTION
• OBJECTIVE
• SOFTWARE REQUIRED
• HARDWARE REQUIRED
• EXISTING SYSTEM
• PROPOSED SYSTEM
• FLOW CHART
• FUTURE SCOPE
• CONCLUSION
• APPLICATIONS
ABSTRACT:

• In recent years ,digital image forgery detection as become an


active research area due to advancement of photo editing
software.
• This project focuses on passive forgery detection on images
tampered using copy moved technique better known as
“COPY MOVE FORGERY DETECTION(CMFD)”.
• Forgery detection achieved true positive rate of more than
91% for tampered images with object translation , different
degree of rotation and enlargement.
INTRODUCTION:

• Digital image forensics is a young and emerging branch of


image processing.
• Tampering literally means to interface with something in
order to cause damage or make unauthorized alterations
• Image tampering is defined as intentional manipulation of
images for malicious purposes
• Image tampering can be done with a single image or with
multiple images
OBJECTIVE:

• Forgery detection aims to verify the


authenticity of digital images with out any
prior knowledge of the original image
SOFTWARE REQUIRED:

• MATLAB R2013b
HARDWARE REQUIRED:

• PC with 4GB RAM & having window 7,8,10


EXISTING SYSTEM :
Gray scale image forgery detection :
•In gray scale image forgery detection we can
manipulate only the block and white images
• In gray scale image tampering first To calculate
minimum to maximum pixel then after finding the
fore ground and back ground detection ,finally
detect the forgery part.
DISADVANTAGES :

• High complexity algorithm design.


• Accurate below 60%.
• Error rate high compared to proposed methodology.
• Applicable only binary and gray scale images.
PROPOSED SYSTEM :
• Copy move forgery detection is a non intrusive detection
technique where a portion of images content is copied and
moved to another region of the same image.
• In general tampered regions in copy move forgery can be in
the form of an object texture or wording.
a) ORIGINAL IMAGE b)FORGED IMAGE
FLOW CHART:
EXPLANATION:
PRE-PROCESSING: The main aim of pre-processing
is an improvement of the image data that
suppresses unwanted distortions
• Copy move forgery detection technics can be
classified into 2 methods
1. Block based method :It divides an image into
non overlapping blocks of specified size and a
feature vector will be computed for these
blocks.
2. Then after finding the similar feature vectors are
then matched to find the forged regions
2 .Key point based method
• In key point based method feature vectors are computed
for regions with high entropy
• There is no subdivision into blocks
• The feature vectors are matched to find the copied blocks
• Feature extraction:It describes the relevant shape of
information and dimensionality reduction
• Matching:In this process we can match the corresponding
features from two similar images
• FORGERY DETECTION:In forgery detection we can find the
absolute value of each pixel
• POST PROCESSING :In post processing to show the copy
and move part
ADVANTAGES :
• Applicable color images .
• Low complexity algorithm design.
• Accuracy up to 91% .
• Low error rate.
FUTURE SCOPE :

• Today ‘s technology allows digital media to altered


and manipulated in ways that were simply
impossible 20 years ago.
• Tomorrow’s technology will almost certainly allow us
to manipulate digital media in ways that today seem
unimaginable. And as this technology to evolve, it
will become increasingly important for the science of
digital forensics to try to keep peace.’
APPLICATIONS:
• Manipulation explanation
• Suspicious area localization
• Thesis scope
• Image level binary authenticity decision
• Tampering operation identification
CONCLUSION:

• Evaluation of the proposed CMFD technique


is performed on images which suffers from
various geometrical attacks.
• Copy move forgery become one of the most
common and easy to carry techniques to
manipulate images.
THANK YOU

You might also like