Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/5435
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yadav, Neetu | - |
dc.contributor.author | Kapdi, Rupal | - |
dc.date.accessioned | 2015-06-19T07:16:59Z | - |
dc.date.available | 2015-06-19T07:16:59Z | - |
dc.date.issued | 2015-02-06 | - |
dc.identifier.citation | National Conference - "Ahmedabad University Conference of Management" , Amrut Modi School of Management, February 6 – 7, 2015 | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/5435 | - |
dc.description.abstract | With the range of photo manipulation tools now available nearly anyone can modify and change an image's interpretation by vast degree. An image can be called as a chronicle of visual perception. Copying and pasting a patch of an image on to other part in the same image is the main essence of a copy- move forgery and can be employed for many malicious purposes. Malicious image manipulations are inimical as they can lead to serious changes to the information that is perceived by the human mind. Many techniques to detect copy-move image forgery using feature descriptors have been used in the past. SIFT features are considered as a robust scale, rotation, translation and affine invariant feature. We have used the approach of clustering similar SIFT feature descriptors and propose to extend the copy move region detection by introduction of segmentation mechanism for precise detection of the forged region. | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | ITFCE029-1; | - |
dc.subject | Copy-Move | en_US |
dc.subject | Image Forgery | en_US |
dc.subject | Image Forensics | en_US |
dc.subject | SIFT Features | en_US |
dc.subject | Statistical Methods | en_US |
dc.subject | PCA | en_US |
dc.subject | SVD | en_US |
dc.subject | Eigen Vectors | en_US |
dc.subject | Computer Faculty Paper | en_US |
dc.subject | Faculty Paper | en_US |
dc.subject | ITFCE029 | en_US |
dc.title | Statistical Approach for Copy Move Forgery Detection | en_US |
dc.type | Faculty Papers | en_US |
Appears in Collections: | Faculty Papers, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFCE029-1.pdf | ITFCE029-1 | 359.31 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.