Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/18018
Full metadata record
DC FieldValueLanguage
dc.contributor.authorOjeniyi, Joseph Adebayo-
dc.contributor.authorAdedayo, B. O.-
dc.contributor.authorIsmaila, I-
dc.contributor.authorShafii, A. M.-
dc.date.accessioned2023-02-12T19:59:32Z-
dc.date.available2023-02-12T19:59:32Z-
dc.date.issued2018-
dc.identifier.issn2074-9082-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/18018-
dc.description.abstractAs the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing tools have become easily available on the internet, which has made people who are a novice in the field of image editing, to be capable of tampering with an image easily without leaving any visible clue or trace behind, which has led to increase in digital images losing authenticity. This has led to developing various techniques for tackling authenticity and integrity of forged images. In this paper, a robust and enhanced algorithm is been developed in detecting copy-move forgery, which is done by hybridizing block-based DCT (Discrete Cosine Transform) technique and a keypoint-based SURF (Speeded-Up Robust Feature)technique using the MATLAB platform. The performance of the above technique has been compared with DCT and SURF techniques as well as other hybridized techniques in terms of precision, recall, FPR and accuracy metrics using MICC-F220 dataset. This technique works by applying DCT to the forged image, with the main goal of enhancing the detection rate of such image and then SURF is applied to the resulting image with the main goal of detecting those areas that are been tampered with on the image. It has been observed that this paper’s technique named HDS has an effective detection rate on the MICC-F220 dataset with multiple cloning attacks and other various attacks such as rotation, scaling, a combination of scaling plus rotation, blur, compression, and noise.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Image, Graphics and Signal Processing (IJIGSP)en_US
dc.relation.ispartofseries10(4), PP.22-30;-
dc.subjectCopy-move image forgery DCT block-based method keypoint-based method SURFen_US
dc.titleHybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniquesen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.