Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016
A Survey on Copy Move Forgery Detection in Images
Rameeza M Ashraf, Veena K Viswam
Abstract: Nowadays, the use of digital images are increasing day to day. With the advancement in technology, newer and newer softwares like Adobe Photoshop, GIMP etc. are emerging. With these tools even a normal person can change the content from an original image. This leads to image tampering. Image tampering are of various types and one of the most common type is the copy-move forgery. Copy-move forgery is the process in which a portion of the image is copied and pasted into another portion in the same image. To make the detection difficult, a forger can apply some preprocessing operations also. By doing this, the forged region might not be visible at a glance. Since, the images are an important source of information, and is used in some legal investigations, medical fields etc. it is necessary to ensure the integrity and authenticity of an image. Therefore, an efficient detection method should be adopted to detect the forged areas.
Keywords: Active method, Passive method, Copy Move Forgery, Copy Rotate Move, Scale Invariant Feature Transform
Edition: Volume 5 Issue 8, August 2016,
Pages: 1325 - 1328
How to Cite this Article?
Rameeza M Ashraf, Veena K Viswam, "A Survey on Copy Move Forgery Detection in Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20161175, Volume 5 Issue 8, August 2016, 1325 - 1328
How to Share this Article?
Similar Articles with Keyword 'Active method'
Image Forgery Localization via CFA Based Feature Extraction and Poisson Matting
HSR: A New Lightweight Hybrid Source Routing Protocol for Mobile Ad Hoc Networks
Varun Pandey, Somesh Dewangan
Similar Articles with Keyword 'Scale Invariant Feature Transform'
Plant Species Identification using SIFT and SURF Technique
Dr. Sandeep Kumar, Samrity
A Novel Approach in Extraction of 3D Point using Scale Invariant Feature Transform for Underwater Objects
Mukundappa B L, Dr. Krishna M
Similar Articles with Keyword 'Active'
Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
A Survey of Generating Multi-Document Summarizations
Patil Ajita S., P. M. Mane
Similar Articles with Keyword 'method'
Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Similar Articles with Keyword 'Passive'
Implementation of a Secure and Smart Lab with Wireless Sensor Network
Mary Cherian, Hitesh Kumar P
Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET
Pallavi P Puri, Nitin R. Chopde
Similar Articles with Keyword 'Copy'
Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform
A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features
Chengcheng Yan, Yanping Hu
Similar Articles with Keyword 'Move'
Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Similar Articles with Keyword 'Forgery'
Designing of Secure Privacy Preserving Algorithm for Detecting Packet Loss and Provenance Verification in Wireless Ad-Hoc Networks
K. Anil Kumar, Sumithra R
Survey of Various Techniques for Signature Recognition and Verification
Sharayu S. Sangekar, D. C. Dhanwani
Similar Articles with Keyword 'Rotate'
Real Time Object Detection and 3D Modeling Using Fuzzy Logic
Prerna Dahiya, Kamal Kumar Ranga
Image Registration Using MAC RANSAC
Krishma, Navpreet Kaur Walia