SlideShare a Scribd company logo
1
Digital Image Forgery
Detection
2
Presentation Division
Introduction
Forgery
Detection
Region
Duplication
Conclusion
 Digital Image
Forgery
Detection
 Types of
Forgery
 Forgery
Detection
Mechanisms
 High Precision
Rotation Angle
Estimation For
Copy Move.
 Explaination
 Rotation Angle
Calculation
 Variance
Estimation
 Algorithm
 Discrete
Cosine
Transform
 Walsh
Transform
 Hybrid
Wavelet
Transform
 Results
 Future Works
 References
3
Digital Image Forgery Detection
 Alteration of the semantic components of a digital
image.
 Removing Contents from the image
 Adding Data to the image
 Types of Forgery
 Image Retouching
 Image Splicing (Copy-Paste)
 Image Cloning (Copy-Move)
4
Image Retouching
 One of the oldest types of image forgery
 Image features are tampered with.
 Used to enhance or reduce digital image features.
 Considered less dangerous type of image forgery.
5
Image Splicing (Copy-Paste)
 Fragments of 2 or more images are combined to form an image.
 This operation is fundamental in digital photo montaging and in turn is a
mechanism for image forgery creation.
 Image splicing technique may change the visual message of digital images
more aggressively than image retouching.
6
Image Cloning (Copy-Move)
 Considered as a special case of image splicing, where the tampering occurs
within a single image and no need for multiple images.
 Part of the image is copied and then pasted in a desired location within the
same image.
 The purpose of such tampering is to duplicate or conceal a certain object in
that image.
7
Image Cloning
 Blurring is usually used to reduce the expected irregularity along the border
of the pasted regions.
 The similarity of texture, color, noise and other information inside the image
make it very difficult to detect this kind of tampering via visual inspection.
 Moreover, performing of post-processing operations such as blurring, adding
noise and JPEG compression or geometric operations such as scaling, shifting
and rotation increase the hardness of detection task.
8
Forgery Detection Mechanisms
 Can be Classified into Two Types
 Active Methods
 Passive Methods
 Active Methods
 Hidden Information inside the Digital Image.
 Done at the time of Data Acquisition or before disseminated
to the public.
 Embedded information can be used to identify the source of
such image or to detect possible modification to that image.
9
Forgery Detection Mechanisms
(Active Methods)
 Two Major Types
 Digital Signature
 Digital Watermarking
10
Forgery Detection Mechanisms
(Passive Methods)
 Use traces left by the processing steps in different phases of acquisition and
storage of digital images.
 These traces can be treated as a fingerprint of the image source device.
 Passive methods work in the absence of protecting techniques.
 They do not use any pre-image distribution information inserted into digital
image.
 They work by analyzing the binary information of digital image in order to
detect forgery traces, if any
 Limitation is the number of false positives.
11
High Precision Rotation Angle Estimation for
Rotated Images
 Paper addresses the detection of “copy-move”(cloning) technique
 As discussed before cloning detection becomes harder when the forger uses
geometric alterations like scaling, rotation & shifting.
 Particularly addresses the Rotation transformation.
 This paper proposes a novel blind image rotation detection algorithm with
high precision rotation angle estimation
12
 S, t=pixel coordinates in the rotated image I.
 𝜑 = weighted value.
𝑖′
= 𝑖𝑐𝑜𝑠 𝜃 − 𝑗𝑠𝑖𝑛 𝜃
𝑗′
= 𝑖𝑠𝑖𝑛𝜃 + 𝑗𝑐𝑜𝑠 𝜃
I= Original image
I’=Intermediate Image
I”= Rotated Image
𝐼𝑠,𝑡
"
=
𝑛=−𝑁
𝑁
𝑚=−𝑁
𝑁
𝜑(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚 )𝑰′(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚
High Precision Rotation Angle Estimation for
Rotated Images
13
 α = horizontal distance rotated image I′′ & intermediate image I′
 β = vertical distance.
𝛼2
= (pcosθ − 𝑓𝑙𝑜𝑜𝑟(𝑝𝑐𝑜𝑠𝜃) + 𝑅)2
𝛽2
= (𝑞𝑠𝑖𝑛θ − 𝑓𝑙𝑜𝑜𝑟(𝑞𝑠𝑖𝑛𝜃) + 𝑆)2
R and S are constant(translation)
High Precision Rotation Angle Estimation for
Rotated Images
14
𝑉𝑎𝑟 𝑋 = 𝐸[ 𝑋 − 𝜇 2
]
𝑉𝑎𝑟 𝑎𝑋 + 𝑏𝑌 = 𝑎2 𝑉𝑎𝑟 𝑋 + 𝑏2 𝑉𝑎𝑟(𝑌)
𝐼𝑠,𝑡
"
=
𝑛=−𝑁
𝑁
𝑚=−𝑁
𝑁
𝜑(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚 )𝑰′(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚
For a single pixel, we have:
𝐼𝑠,𝑡
"
≈
𝑛=0
1
𝑚=0
1
𝜑(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚 )𝑰′(𝑖 𝑠,𝑡
′
+ 𝑛, 𝑗𝑠,𝑡
′
+ 𝑚
High Precision Rotation Angle Estimation for
Rotated Images
15
 Plot of horizontal distance vector and
its spectrum at 𝜃 = 300.
 Plot of peak frequency of distance vector
𝛼2
against all 𝜃 𝜖 [00
− 450
]. Frequency is
normalized to [0,1].
High Precision Rotation Angle Estimation for
Rotated Images
16
 Algorithm of the approach
High Precision Rotation Angle Estimation for
Rotated Images
17
Resolution Total Images Correct Images Correct Rate
10
500 486 97.2%
0.80
500 480 96.0%
0.60 500 471 94.2%
0.40 500 459 91.8%
0.20
500 438 87.6%
High Precision Rotation Angle Estimation for
Rotated Images
18
 Experiment results. 1st column: three images rotated at 50
, 250
, 450
respectively;
2nd column: theoretical pixel variance spectrum for the rotated images; 3rd
column: actual pixel variance spectrum for the rotated images.
High Precision Rotation Angle Estimation for
Rotated Images
19
 Conclusion
 In this paper, propose a blind image rotation angle estimation
method is proposed by exploring the periodicity of pixel variance
of rotated images.
 Experiment results show that this method works well for rotation
angles larger than 50
, but not as good for smaller rotation angles.
 The method can be used in areas like copy-paste image forgery
detection. In the future, the author plans to modify the algorithm
to improve the correct rate of small rotation angle estimation.
High Precision Rotation Angle Estimation for
Rotated Images
20
Region Duplication Forgery Detection
using Hybrid Wavelet Transforms
21
Region Duplication Forgery Detection using
Hybrid Wavelet Transforms
 Starts by dividing the M×N suspicious image into small overlapping blocks.
 This step is achieved by sliding a window of size B×B from the upper left
corner to the lower right corner one pixel each time.
 The quantized DCT coefficients are extracted from each block and used to
represent the features of these blocks.
 The quantized DCT coefficients are stored as one row in a matrix A of (M-B+1)
× (N-B+1) rows and B× B columns, where B× B is the block size.
 Two identical rows in the matrix A, correspond to two identical blocks in the
suspicious image.
Discrete Cosine Transforms
22
Region Duplication Forgery Detection
using Hybrid Wavelet Transforms
Hadamard Walsh Transforms
The Product of a Boolean Function and a Walsh Matrix is a Walsh Spectrum
23
Region Duplication Forgery Detection
using Hybrid Wavelet Transforms
 Example of Copy-Move Forgery, (a) Original Image (b) Forged Image
24
Thank you
25

More Related Content

PPT
Digital Image Forgery
PDF
Image Forgery Detection
PPTX
Camera model ‫‬
PPT
Image pre processing - local processing
PPTX
Digital image processing
PPT
Image Processing
PPT
morphological image processing
PPT
Chapter 13. Trends and Research Frontiers in Data Mining.ppt
Digital Image Forgery
Image Forgery Detection
Camera model ‫‬
Image pre processing - local processing
Digital image processing
Image Processing
morphological image processing
Chapter 13. Trends and Research Frontiers in Data Mining.ppt

What's hot (20)

PPTX
Image compression models
PDF
Region Splitting and Merging Technique For Image segmentation.
PPTX
Point processing
PDF
Image Restoration (Digital Image Processing)
PPTX
Image compression
PPTX
Simultaneous Smoothing and Sharpening of Color Images
PPTX
Region based segmentation
PPTX
Handwritten digit recognition using image processing
PPTX
Attendance Management System using Face Recognition
PPTX
Brain tumor detection using convolutional neural network
PPTX
Digital watermarking
PPTX
Brain Tumour Detection.pptx
PPTX
Smoothing Filters in Spatial Domain
PPTX
Brain tumor detection using image segmentation ppt
PPTX
Lossless predictive coding in Digital Image Processing
PPT
Image segmentation ppt
PPTX
Image Enhancement in Spatial Domain
PPTX
Object Detection & Tracking
PPTX
digital image processing
PPTX
Digital Image Processing
Image compression models
Region Splitting and Merging Technique For Image segmentation.
Point processing
Image Restoration (Digital Image Processing)
Image compression
Simultaneous Smoothing and Sharpening of Color Images
Region based segmentation
Handwritten digit recognition using image processing
Attendance Management System using Face Recognition
Brain tumor detection using convolutional neural network
Digital watermarking
Brain Tumour Detection.pptx
Smoothing Filters in Spatial Domain
Brain tumor detection using image segmentation ppt
Lossless predictive coding in Digital Image Processing
Image segmentation ppt
Image Enhancement in Spatial Domain
Object Detection & Tracking
digital image processing
Digital Image Processing
Ad

Viewers also liked (20)

PPTX
Image forgery and security
PDF
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
PPTX
A proposed accelerated image copy-move forgery detection-vcip2014
PPTX
Passive techniques for detection of tampering in images by Surbhi Arora and S...
PPTX
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
PDF
Analysis and Detection of Image Forgery Methodologies
PPTX
Forgery by Shukun Karthika
PDF
Video Forgery Detection: Literature review
PPTX
Learning by Shukun Karthika
PPTX
Introduction image features
DOCX
Image forgery detection using adaptive over segmentation and feature point ma...
PDF
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
PPTX
Fraud Detection Using Signature Recognition
PPTX
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
PPT
Sign verification
PDF
Digital Image Forgery Detection Using Improved Illumination Detection Model
PDF
Malaysian Penal Code - Act 574
PDF
COMP8045 - Project Report v.1.3
PDF
Video Inpainting detection using inconsistencies in optical Flow
DOCX
main project doument
Image forgery and security
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
A proposed accelerated image copy-move forgery detection-vcip2014
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Analysis and Detection of Image Forgery Methodologies
Forgery by Shukun Karthika
Video Forgery Detection: Literature review
Learning by Shukun Karthika
Introduction image features
Image forgery detection using adaptive over segmentation and feature point ma...
BRADLEY DEHAVEN v. JP Morgan Chase Bank CA3
Fraud Detection Using Signature Recognition
Quantitative Image Feature Analysis of Multiphase Liver CT for Hepatocellular...
Sign verification
Digital Image Forgery Detection Using Improved Illumination Detection Model
Malaysian Penal Code - Act 574
COMP8045 - Project Report v.1.3
Video Inpainting detection using inconsistencies in optical Flow
main project doument
Ad

Similar to Digital image forgery detection (20)

PPTX
Naveen 9911103606 major ppt
PDF
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
PDF
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
PDF
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
PDF
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
PDF
Digital Image Sham Detection Using Deep Learning
PPTX
FAN search for image copy-move forgery-amalta 2014
PDF
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
PDF
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
PDF
Review of Digital Image Forgery Detection
PDF
Copy Move Forgery Detection Using GLCM Based Statistical Features
PDF
H017416670
PPTX
researchconclavenitish-220715141929-be03069b (1).pptx
PDF
Image Counterfeiting Detection and Localization Using Deep Learning Algorithms
PDF
IRJET - A Research on Video Forgery Detection using Machine Learning
PDF
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
PDF
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
PDF
A Review Paper On Image Forgery Detection In Image Processing
PDF
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
Naveen 9911103606 major ppt
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
An Enhanced Method to Detect Copy Move Forgey in Digital Image Processing usi...
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
Digital Image Sham Detection Using Deep Learning
FAN search for image copy-move forgery-amalta 2014
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
Review of Digital Image Forgery Detection
Copy Move Forgery Detection Using GLCM Based Statistical Features
H017416670
researchconclavenitish-220715141929-be03069b (1).pptx
Image Counterfeiting Detection and Localization Using Deep Learning Algorithms
IRJET - A Research on Video Forgery Detection using Machine Learning
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
A Review Paper On Image Forgery Detection In Image Processing
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...

Recently uploaded (20)

PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPT
Total quality management ppt for engineering students
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
Current and future trends in Computer Vision.pptx
PPT
introduction to datamining and warehousing
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Total quality management ppt for engineering students
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Fundamentals of Mechanical Engineering.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
R24 SURVEYING LAB MANUAL for civil enggi
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Current and future trends in Computer Vision.pptx
introduction to datamining and warehousing
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
Automation-in-Manufacturing-Chapter-Introduction.pdf
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks

Digital image forgery detection

  • 1. 1
  • 3. Presentation Division Introduction Forgery Detection Region Duplication Conclusion  Digital Image Forgery Detection  Types of Forgery  Forgery Detection Mechanisms  High Precision Rotation Angle Estimation For Copy Move.  Explaination  Rotation Angle Calculation  Variance Estimation  Algorithm  Discrete Cosine Transform  Walsh Transform  Hybrid Wavelet Transform  Results  Future Works  References 3
  • 4. Digital Image Forgery Detection  Alteration of the semantic components of a digital image.  Removing Contents from the image  Adding Data to the image  Types of Forgery  Image Retouching  Image Splicing (Copy-Paste)  Image Cloning (Copy-Move) 4
  • 5. Image Retouching  One of the oldest types of image forgery  Image features are tampered with.  Used to enhance or reduce digital image features.  Considered less dangerous type of image forgery. 5
  • 6. Image Splicing (Copy-Paste)  Fragments of 2 or more images are combined to form an image.  This operation is fundamental in digital photo montaging and in turn is a mechanism for image forgery creation.  Image splicing technique may change the visual message of digital images more aggressively than image retouching. 6
  • 7. Image Cloning (Copy-Move)  Considered as a special case of image splicing, where the tampering occurs within a single image and no need for multiple images.  Part of the image is copied and then pasted in a desired location within the same image.  The purpose of such tampering is to duplicate or conceal a certain object in that image. 7
  • 8. Image Cloning  Blurring is usually used to reduce the expected irregularity along the border of the pasted regions.  The similarity of texture, color, noise and other information inside the image make it very difficult to detect this kind of tampering via visual inspection.  Moreover, performing of post-processing operations such as blurring, adding noise and JPEG compression or geometric operations such as scaling, shifting and rotation increase the hardness of detection task. 8
  • 9. Forgery Detection Mechanisms  Can be Classified into Two Types  Active Methods  Passive Methods  Active Methods  Hidden Information inside the Digital Image.  Done at the time of Data Acquisition or before disseminated to the public.  Embedded information can be used to identify the source of such image or to detect possible modification to that image. 9
  • 10. Forgery Detection Mechanisms (Active Methods)  Two Major Types  Digital Signature  Digital Watermarking 10
  • 11. Forgery Detection Mechanisms (Passive Methods)  Use traces left by the processing steps in different phases of acquisition and storage of digital images.  These traces can be treated as a fingerprint of the image source device.  Passive methods work in the absence of protecting techniques.  They do not use any pre-image distribution information inserted into digital image.  They work by analyzing the binary information of digital image in order to detect forgery traces, if any  Limitation is the number of false positives. 11
  • 12. High Precision Rotation Angle Estimation for Rotated Images  Paper addresses the detection of “copy-move”(cloning) technique  As discussed before cloning detection becomes harder when the forger uses geometric alterations like scaling, rotation & shifting.  Particularly addresses the Rotation transformation.  This paper proposes a novel blind image rotation detection algorithm with high precision rotation angle estimation 12
  • 13.  S, t=pixel coordinates in the rotated image I.  𝜑 = weighted value. 𝑖′ = 𝑖𝑐𝑜𝑠 𝜃 − 𝑗𝑠𝑖𝑛 𝜃 𝑗′ = 𝑖𝑠𝑖𝑛𝜃 + 𝑗𝑐𝑜𝑠 𝜃 I= Original image I’=Intermediate Image I”= Rotated Image 𝐼𝑠,𝑡 " = 𝑛=−𝑁 𝑁 𝑚=−𝑁 𝑁 𝜑(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 )𝑰′(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 High Precision Rotation Angle Estimation for Rotated Images 13
  • 14.  α = horizontal distance rotated image I′′ & intermediate image I′  β = vertical distance. 𝛼2 = (pcosθ − 𝑓𝑙𝑜𝑜𝑟(𝑝𝑐𝑜𝑠𝜃) + 𝑅)2 𝛽2 = (𝑞𝑠𝑖𝑛θ − 𝑓𝑙𝑜𝑜𝑟(𝑞𝑠𝑖𝑛𝜃) + 𝑆)2 R and S are constant(translation) High Precision Rotation Angle Estimation for Rotated Images 14
  • 15. 𝑉𝑎𝑟 𝑋 = 𝐸[ 𝑋 − 𝜇 2 ] 𝑉𝑎𝑟 𝑎𝑋 + 𝑏𝑌 = 𝑎2 𝑉𝑎𝑟 𝑋 + 𝑏2 𝑉𝑎𝑟(𝑌) 𝐼𝑠,𝑡 " = 𝑛=−𝑁 𝑁 𝑚=−𝑁 𝑁 𝜑(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 )𝑰′(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 For a single pixel, we have: 𝐼𝑠,𝑡 " ≈ 𝑛=0 1 𝑚=0 1 𝜑(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 )𝑰′(𝑖 𝑠,𝑡 ′ + 𝑛, 𝑗𝑠,𝑡 ′ + 𝑚 High Precision Rotation Angle Estimation for Rotated Images 15
  • 16.  Plot of horizontal distance vector and its spectrum at 𝜃 = 300.  Plot of peak frequency of distance vector 𝛼2 against all 𝜃 𝜖 [00 − 450 ]. Frequency is normalized to [0,1]. High Precision Rotation Angle Estimation for Rotated Images 16
  • 17.  Algorithm of the approach High Precision Rotation Angle Estimation for Rotated Images 17
  • 18. Resolution Total Images Correct Images Correct Rate 10 500 486 97.2% 0.80 500 480 96.0% 0.60 500 471 94.2% 0.40 500 459 91.8% 0.20 500 438 87.6% High Precision Rotation Angle Estimation for Rotated Images 18
  • 19.  Experiment results. 1st column: three images rotated at 50 , 250 , 450 respectively; 2nd column: theoretical pixel variance spectrum for the rotated images; 3rd column: actual pixel variance spectrum for the rotated images. High Precision Rotation Angle Estimation for Rotated Images 19
  • 20.  Conclusion  In this paper, propose a blind image rotation angle estimation method is proposed by exploring the periodicity of pixel variance of rotated images.  Experiment results show that this method works well for rotation angles larger than 50 , but not as good for smaller rotation angles.  The method can be used in areas like copy-paste image forgery detection. In the future, the author plans to modify the algorithm to improve the correct rate of small rotation angle estimation. High Precision Rotation Angle Estimation for Rotated Images 20
  • 21. Region Duplication Forgery Detection using Hybrid Wavelet Transforms 21
  • 22. Region Duplication Forgery Detection using Hybrid Wavelet Transforms  Starts by dividing the M×N suspicious image into small overlapping blocks.  This step is achieved by sliding a window of size B×B from the upper left corner to the lower right corner one pixel each time.  The quantized DCT coefficients are extracted from each block and used to represent the features of these blocks.  The quantized DCT coefficients are stored as one row in a matrix A of (M-B+1) × (N-B+1) rows and B× B columns, where B× B is the block size.  Two identical rows in the matrix A, correspond to two identical blocks in the suspicious image. Discrete Cosine Transforms 22
  • 23. Region Duplication Forgery Detection using Hybrid Wavelet Transforms Hadamard Walsh Transforms The Product of a Boolean Function and a Walsh Matrix is a Walsh Spectrum 23
  • 24. Region Duplication Forgery Detection using Hybrid Wavelet Transforms  Example of Copy-Move Forgery, (a) Original Image (b) Forged Image 24

Editor's Notes

  • #5: Semantics is the subfield that is devoted to the study of meaning, as inherent at the levels of words, phrases, sentences, and larger units of discourse (termed texts, or narratives).
  • #7: Montage (/mɒnˈtɑːʒ/) is a technique in film editing in which a series of short shots are edited into a sequence to condense space, time, and information. The term has been used in various contexts.