Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/18018
Title: Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques
Authors: Ojeniyi, Joseph Adebayo
Adedayo, B. O.
Ismaila, I
Shafii, A. M.
Keywords: Copy-move image forgery DCT block-based method keypoint-based method SURF
Issue Date: 2018
Publisher: International Journal of Image, Graphics and Signal Processing (IJIGSP)
Series/Report no.: 10(4), PP.22-30;
Abstract: As the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing tools have become easily available on the internet, which has made people who are a novice in the field of image editing, to be capable of tampering with an image easily without leaving any visible clue or trace behind, which has led to increase in digital images losing authenticity. This has led to developing various techniques for tackling authenticity and integrity of forged images. In this paper, a robust and enhanced algorithm is been developed in detecting copy-move forgery, which is done by hybridizing block-based DCT (Discrete Cosine Transform) technique and a keypoint-based SURF (Speeded-Up Robust Feature)technique using the MATLAB platform. The performance of the above technique has been compared with DCT and SURF techniques as well as other hybridized techniques in terms of precision, recall, FPR and accuracy metrics using MICC-F220 dataset. This technique works by applying DCT to the forged image, with the main goal of enhancing the detection rate of such image and then SURF is applied to the resulting image with the main goal of detecting those areas that are been tampered with on the image. It has been observed that this paper’s technique named HDS has an effective detection rate on the MICC-F220 dataset with multiple cloning attacks and other various attacks such as rotation, scaling, a combination of scaling plus rotation, blur, compression, and noise.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/18018
ISSN: 2074-9082
Appears in Collections:Cyber Security Science



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.