An Approach for Detection of Copy-Move Forgery of Images Using Histogram of Orientated Gradients and Prewitt Filter

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 449

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICTCK03_013

تاریخ نمایه سازی: 10 تیر 1396

چکیده مقاله:

With the emergence of power image editing tools, it is now simply possible to manipulate the image, change the content, and edit or remove important features of an image. The operation of identifying manipulated images is of high importance since several millions of images are sent to the internet every day. The most common method of tampering with a digital image is copy-move forgery, in which a part of an image is duplicated and used to substitute another part of the same image at a different location. In this research, The input image is segmented into blocks, then a histogram of orientated gradients is applied to each block. HOG provides a grouping of gradient information and histograms related to gradient orientations. Statistical features are extracted and reduced to facilitate the measurement of similarity. Finally, duplicated image blocks are detected by identifying similar block pairs. The results of the experiment show that the proposed method is an effective and useful scheme with a degree of detection accuracy of 77% for images obtained from the comofod database and the ability to detect forged images using copy-move method, even when the image is distorted via transformations such as changes in brightness, color reduction , blurring or JPEG compression.

کلیدواژه ها:

Digital image forgery detection ، Histogram of orientated gradients ، Copy-move image forgery ، Feature extraction

نویسندگان

Motahare bakhtiar pakzad

Department of electrical engineering bojnord branch,Islamic azad university bojnord, iran

Aliakbar khazaie

Department of electrical engineering Mashhad branch,Islamic azad universityMashhad, iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • .1753-ر1750 Conference on, pp. ...
  • _ _ _ matrix in double compressed jpeg images, " ...
  • part of background copies and moves to repeat that area ...
  • C ommunications, Volume 70, Issue 8, August 2016, Pages 1076-1087 ...
  • _ _ _ China C ommunicatios , Volume: 13, Issue: ...
  • _ _ _ Computational Science pp. 281-288. ...
  • _ _ _ Detector "IEEE Transactions on Information Forensics and ...
  • G. Li, Q. Wu, D. Tu, and S. Sun, (2007)"A ...
  • _ _ _ _ [13] _ _ _ _ 51-65. ...
  • _ _ _ _ _ _ _ on Internet ...
  • _ _ _ _ Content Technology and its Applications, vol. ...
  • _ _ _ _ _ Content Techolog and its ...
  • L. Li, S. Li, H. Zhu, S.-C. Chu, J. F. ...
  • R. Davarzani, K. Yaghmaie, S. Mozaffari, and M. Tapak, _ ...
  • نمایش کامل مراجع