Professional Documents
Culture Documents
This method successfully detects the forged part when Copy Move
regions are same and when the forged image is saved in a major
graphic file format, such as JPEG or PNG.
1
The Existing system uses active techniques such as watermarking
or digital signatures to solve the authentication problem in images
and to make it free from tampering.
2
This system have limitations because they require human attention or
specially equipped cameras such as Digital cameras with watermarking
technology in it.
This system also requires the information of the original image to detect
forgery in a image.
3
Sophisticated tools
3D Max, Photoshop
Automated lighting, and processing that conceal forgery
4
Copy-Move forgery detection system can detect copy-move type
forgery in digital images without any data about the original image
and without any watermarks in the image
5
Getting the image and forming it into blocks.
6
To eliminate the details of the image, the whole image is first
blurred.
Then the image is converted into degraded palette where the whole
picture is converted into small pixels of colors palette.
10
Hardware Requirements
Processor : Pentium 4 or more
Clock Speed : 1.8 GHz
Ram : 512 MB or more
Disk Space : 20 GB or more
Software Requirements:
Operating system : Windows XP or more.
Language : Python 2.6, MATLAB 2009b or more.
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Detecting Tampering done on big size
25
Working on Small regions
26
Working for Multiple Copy Move Regions
27
Will not detect Textured areas
28
In courtrooms the trustworthiness of photographs has an essential
role as they are used as evidences thus CMFD can be used to know
its trustworthiness.
29
A new methodology is proposed by which the user can detect copy
move type forgeries done with the intention to conceal certain
details or to duplicate certain aspects of an image.
Contributions :
Outperforms contemporary algorithms in speed of detection
30
The future enhancements that are required for this system
are to improve the detecting process, the system needs to
be expanded for detecting all types of forgery such as
retouching and tampering in textured regions.
31
J. Fridrich, “Methods for "Methods for Tamper Detection in Digital
Images", Proc. ACM Workshop on Multimedia and Security, Orlando,
FL, October 30−31, 2009, pp. 19−23.
33