SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
ISSN: 2277 – 9043
                    International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                   Volume 1, Issue 5, July 2012


                 DWT Based Copy-Move Image Forgery
                             Detection
                                             Preeti Yadav ,Yogesh Rathore ,Aarti Yadu


 
                                                                                         II. LITERATURE REVIEW
 Abstract— In an age with digital media, it is no longer true that
 seeing is believing.In addition, digital forgeries, can be                    Since the key characteristics of Copy-Move forgery is
 indistinguishable from authentic photographs. In a copy-move           that the copied part and the pasted part are in the same image,
 image forgery, a part of an image is copied and then pasted on a       one method to detect this forgery is exhaustive search, but it
 different location within the same image .In this paper an             is computationally complex and more time is needed for
 improved algorithm based on Discrete Wavelet Transform                 detection. A. C. Popescu and H. Farid proposed a similar
 (DWT)is used to detect such cloning forgery. In this technique
                                                                        detection method [2], in which the image blocks are reduced
 DWT (Discrete Wavelet Transform) is applied to the input
 image to yield a reduced dimensional representation.After that         in dimension by using Principal Component Analysis (PCA).
 compressed image is divided into overlapping blocks. These             But the efficiency of detection algorithm was not good,
 blocks are then sorted and duplicated blocks are identified. Due       because, blocks are directly extracted from the original
 to DWT usage, detection is first carried out on lowest level           image, resulting in a large number of blocks. D. Soukal,
 image representation so this Copy-Move detection process               proposes DCT based copy-move forgery detection in a single
 increases accuracy of detection process.                               image, In which The image blocks are represented by
                                                                        quantized DCT (Discrete Cosine Transform) coefficients,
 Keywords- Digital Tempering,DWT Copy-Move forgery.                     and a lexicographic sort is adopted to detect the duplicated
                                                                        image blocks [3]. B.L.Shivakumar and Dr. S.Santhosh
                            I INTRODUCTION
                                                                        Baboo have proposed copy-move forgery detection method
   Copy-Move forgery is performed with the intention to                 based on SURF, which detects duplication region with
make an object ―disappear‖ from the image by covering it with           different size. Experimental result shows that the proposed
a small block copied from another part of the same image[1].            method can detect copy-move forgery with minimum false
                                                                        match for images with high resolution[4] . To increase the
Usually, such an image tampering is done with the aim of                speed of operation process many researchers use blocking
either hiding some image details, in which case a background            approaches [5]. G.Li, Q.Wu, D.Tu developed a sorted
is duplicated, or adding more details. Whichever the case,              neighborhood method based on DWT (Discrete Wavelet
image integrity is lost.Because the copied segments come                Transform) and SVD (Singular Value Decomposition) [6].In
from the same image, the color palette, noise components,               this method the computation of SVD takes lot of time and it
dynamic range and the other properties will be compatible               is computationally complex.
with the rest of the image, thus it is very difficult for a human
eye to detect. Sometimes, even it makes harder for technology                            III. PROPOSED METHOD
to detect the forgery, if the image is retouched with the tools
                                                                               In this proposed method an image is scanned from the
that are available.
                                                                        upper left corner to the lower right corner while sliding a B×B
                                                                        block. The DWT transform is calculated For each block, the
                                                                        DWT coefficients are stored as one row in the matrix A. The
                                                                        matrix will have (M+B+1)(N–B+1) rows and B×B
                                                                        columns.The rows of A are lexicographically sorted . The
                                                                        DWT coefficients for each block are now being compared
                                                                        instead of the pixel representation, if two successive rows of
                                                                        the sorted matrix A are found, the algorithm stores the
                                                                        positions of the matching blocks in a separate list B,and
                                                                        increments a shift-vector counter C. For all normalized shift
 Figure 1. Example of Copy-Move forgery (a) original image
                                                                        vectors, the matching blocks that contributed to that specific
 (b) tampered image                                                     shift vector are colored with the same color and thus
                                                                        identified as segments that might have been copied and
                                                                        moved.
                                                                           The Proposed method of copy-move forgery detection has
                                                                        following main parts.
    Manuscript received July, 2012
                                                                        1. Discrete Wavelet Transform
     Preeti Yadav:, Final year M-Tech CSE, CSVTU Bhilai,RITEE Raipur,   2. Lexicographic Sorting
 (e-mail:preetiyadu@yahoo.co.in).Raipur, India,Mobile-9827974272        3. Shift Vector Calculation
    Yogesh Rathore:, :, Department of CSE, CSVTU Bhilai,RITEE Raipur,   4. Neighbor block matching
 (e-mail:yogeshrathore23@gmail.com).Raipur, India,le-Mobi9301058533.
    Aarti Yadu, Department of IT, CSVTU Bhilai,RITEE Raipur,
 (e-mail:artiyadu@gmail.com).Raipur, India.                             3.1 Discrete Wavelet Transform
                                                                                                                                    56
                                                    All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                  International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                 Volume 1, Issue 5, July 2012

   Wavelet decomposition of the images is used due to its            s = (s1, s2) = (x1 – y1, x2 –y2).
inherent multiresolution characteristics. The basic idea of
using Discrete Wavelet Transform is to reduce the size of the        Because the shift vectors –s and s correspond to the same
image at each level, e.g., a square image of size 2j ×2j pixels at   shift, the shift vectors s are normalized[9].
level L reduces to size 2j/2 × 2j/2 pixels at level L+1. At each
level, the image is decomposed into four sub images. The sub         The normalized shift vectors s(1),s(2), …, s(K), are those
images are labeled LL,LH, HL and HH, The notation LH, HL             whose occurrence exceeds a user-specified threshold T:
and HH correspond to the vertical, horizontal and diagonal           C(s(g)) > T for all g = 1, …, K.
components of the image respectively. LL corresponds to the
coarse level coefficients or the approximation image. This           3.4 Neighbor Shift Matching
image(LL) is used for further decomposition.. These sub
                                                                        For a suspected pair of blocks, the system compares
images can be combined together to restore the previous
                                                                     features of nearby blocks of both of the blocks of a pair which
image which was decomposed.
                                                                     are at the same vector distance from the corresponding
 Below figure shows the image pyramid[7].Level-0 image is            block.Neighbor Shift value is calculated by subtracting two
used for matching of blocks and then these matched blocks            equivalent feature vectors. Shift vector of the entire suspected
are carried to the next higher level. Final match is performed       duplicate region will be same. Two copied and then moved
on the original image itself.                                        areas will yield some pair of identical features. The same shift
                                                                     vector will be formed by this. For a particular number of
                                                                     neighbors this shift vector will be checked . Same shift vector
                                                                     will be showing the duplicated region.
                                                                                        IV. EXPERIMENTAL RESULT




                                                                               (a)                   (b)                       (c)

                                                                      Figure 3. Forgery detection result (16*16)(a) original image(b) tampered
                                                                                             image (c) detection result




                   Figure 2. Image pyramid

3.2 Lexicographic Sort
The lexicographic or lexicographical order, (also known
                                                                               (a)                  (b)                 (c)
as lexical order, dictionary order, alphabetical order or
lexicographic(al) product), is a generalization of the way the
                                                                     Figure 4 Copy-Move Forgery detection result(48*48) (a) original image(b)
alphabetical order of words is based on the alphabetical order       tampered image (c) detection result
of letters.
                                                                     TABLE I. COMPARISIONWITH DIFFERENT SIZED COPY-MOVE
 An important property of the lexicographical order is that it       IMAGE REGION
preserves well-orders, that is, if I and J are well-ordered sets,                Copy-Move Region Matched
then the product set I ×J with the lexicographical order is also     Image Size                   Region     Accuracy
well-ordered[8].                                                                 Size     No of   No of      in %
                                                                                          Pixels  Pixels
In this step lexicographic sorting is performed on the rows of       256×256     16×16    256     256        100%
matrix A. if two consecutive rows of the sorted matrix A are         256×256     48×48    2304    2208       96%
found, the algorithm stores the positions of the identical
blocks in a separate list B and increments a shift-vector
counter C.                                                                                    V. CONCLUSION

                                                                     In this paper an algorithm for detecting copy move forgery
3.3 Shift Vector Calculation                                         using Discrete Wavelet Transform (DWT) is proposed,.Our
                                                                     algorithm has lower computational complexity, since
  Let (x1, x2) and (y1, y2) be the positions of the two              exhaustive search for identical blocks is performed only on
matching blocks. The shift vector s between the two                  the image at the lowest resolution. In future , I would like to
matching blocks is calculated as                                     apply Principal Component Analysis, PCA, to the feature

                                                                                                                                            57
                                               All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                    International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                   Volume 1, Issue 5, July 2012
vector to reduce its dimension, so time complexity will be
reduced. The algorithm gave best performance for detection
of small size copy move forgery.

                                                                                              Ms Arti Yadu has done B.E. in Information
                           REFERENCES                                         Technology from Chhatisgarh Swami Vivekanand University
                                                                              Bhilai,C.G..Her area of Interest is Artificial Intelligence and Network
[1] B.L.Shivakumar,Lt. Dr. S.Santhosh Baboo ‖Detecting Copy-ove Forgery       Security.
in Digital Images: A Survey and Analysis of Current ethods ―Global Journal
of Computer Science and Technology Vol. 10 Issue 7 Ver. 1.0 September
2010

[2] A.C.Popescu and H.Farid, ―Exposing digital forgeries by detecting
duplicated image regions,‖ Dartmouth College, Hanover, New Hampshire,
USA: TR2004-515, 2004.

[3] J. Fridrich, D. Soukal, and J. Lukas, ―Detection of copymove forgery in
digital images,‖ Proceedings of the Digital Forensic Research Workshop.
Cleveland OH, USA, 2003

[4] B.L.Shivakumar and Lt. Dr. S.Santhosh Baboo ―Detection of Region
Duplication Forgery in Digital Images Using SURF‖ IJCSI International
Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011

[5]Sarah A. Summers, Sarah C. Wahl ―Multimedia Security and Forensics
Authentication of Digital images‖http: // cs.uccs.edu /~cs525/ studentproj
/proj52006 / sasummer/doc/cs525projsummersWahl.doc

[6] G.Li, Q.Wu, D.Tu, and Shaojie Sun, ―A sorted neighborhood approach
for detecting duplicated regions in image forgeries based on DWT and
SVD,‖ IEEE International Conference on Multimedia & Expo, 2007.

 [7] Saiqa khan,Arun kulkarni“Reduced Time Complexity for Detection of
Copy-Move Forgery Using Discrete Wavelet Transform‖International
Journal of Computer Applications Volume 6– No.7, September 2010

[8] Vivek Kumar Singh and R.C. Tripathi‖ Fast and Efficient Region
Duplication Detection in Digital Images Using Sub-Blocking Method
―International Journal of Advanced Science and Technology Vol. 35,
October, 2011.

[9] Rafael C. Gonzalez, Richard E. Woods, Steven L.Eddins,―Digital Image
Processing using MATLAB‖,Second Edition, Pearson Publications, 2004.

[10] Preeti Yadav,Yogesh Rathore‖Detection of Copy-M ove Forgery of
Images Using DWT‖ International Journal on Computer Science and
Engineering (IJCSE) Vol 4 April 2012.



                         AUTHORS PROFILE




                     Mrs Preeti Yadav is Assistant Professor           in
Department of Computer Science and Engineering at MM ollege of
Technology, Raipur, C.G. ,India.she is Pursuing Master's degree(M-Tech 4th
semester) in Computer Science From Chhattisgarh swami vivekanand
University C.G.,India. Currently. Her research interest includes: Image
Processing and Cryptography,Information Systems Security.




                   Mr. Yogesh Rathore is a Sr. Lecturer in Department of
Computer Science and Engineering, Raipur Institute of Technology, Raipur
(c.g.) . He is M-Tech in Computer Science .His area of interest include
Digital image processing & Computer Graphics.




                                                                                                                                                        58
                                                     All Rights Reserved © 2012 IJARCSEE

Más contenido relacionado

La actualidad más candente

Image Resolution Enhancement Using Undecimated Double Density Wavelet Transform
Image Resolution Enhancement Using Undecimated Double Density Wavelet TransformImage Resolution Enhancement Using Undecimated Double Density Wavelet Transform
Image Resolution Enhancement Using Undecimated Double Density Wavelet TransformCSCJournals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Impulse noise removal in digital images
Impulse noise removal in digital imagesImpulse noise removal in digital images
Impulse noise removal in digital imagesMohan Raj
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodEditor IJCATR
 
IT6005 digital image processing question bank
IT6005   digital image processing question bankIT6005   digital image processing question bank
IT6005 digital image processing question bankGayathri Krishnamoorthy
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)ijceronline
 
Gray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity MeasuresGray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity MeasuresDrNoura Semary
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
A Novel Method for Image Enhancement
A Novel Method for Image EnhancementA Novel Method for Image Enhancement
A Novel Method for Image EnhancementIDES Editor
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
 

La actualidad más candente (19)

Image Resolution Enhancement Using Undecimated Double Density Wavelet Transform
Image Resolution Enhancement Using Undecimated Double Density Wavelet TransformImage Resolution Enhancement Using Undecimated Double Density Wavelet Transform
Image Resolution Enhancement Using Undecimated Double Density Wavelet Transform
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Impulse noise removal in digital images
Impulse noise removal in digital imagesImpulse noise removal in digital images
Impulse noise removal in digital images
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation Method
 
IT6005 digital image processing question bank
IT6005   digital image processing question bankIT6005   digital image processing question bank
IT6005 digital image processing question bank
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
 
42 128-1-pb
42 128-1-pb42 128-1-pb
42 128-1-pb
 
H0545156
H0545156H0545156
H0545156
 
Ct31628631
Ct31628631Ct31628631
Ct31628631
 
E017263040
E017263040E017263040
E017263040
 
Gray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity MeasuresGray Image Coloring Using Texture Similarity Measures
Gray Image Coloring Using Texture Similarity Measures
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
It 603
It 603It 603
It 603
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
A Novel Method for Image Enhancement
A Novel Method for Image EnhancementA Novel Method for Image Enhancement
A Novel Method for Image Enhancement
 
Hh3114071412
Hh3114071412Hh3114071412
Hh3114071412
 
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. pptImage segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
 
F0533134
F0533134F0533134
F0533134
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 

Similar a 56 58

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Different Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewDifferent Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewIJMER
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space IJEEE
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Gadljicsct955398
Gadljicsct955398Gadljicsct955398
Gadljicsct955398editorgadl
 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...IJSRD
 
A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...ijceronline
 
Quality assessment of image fusion
Quality assessment of image fusionQuality assessment of image fusion
Quality assessment of image fusionijitjournal
 
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSIONINFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSIONIJCI JOURNAL
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
 
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...CSCJournals
 
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESA HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESijcsit
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classificationijeei-iaes
 
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...CSCJournals
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALsipij
 

Similar a 56 58 (20)

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Different Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewDifferent Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical Review
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Dd25624627
Dd25624627Dd25624627
Dd25624627
 
Gadljicsct955398
Gadljicsct955398Gadljicsct955398
Gadljicsct955398
 
Ijetr011837
Ijetr011837Ijetr011837
Ijetr011837
 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...
 
A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...
 
Quality assessment of image fusion
Quality assessment of image fusionQuality assessment of image fusion
Quality assessment of image fusion
 
H017416670
H017416670H017416670
H017416670
 
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSIONINFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
INFORMATION SATURATION IN MULTISPECTRAL PIXEL LEVEL IMAGE FUSION
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
Image Segmentation from RGBD Images by 3D Point Cloud Attributes and High-Lev...
 
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESA HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICES
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
 
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 

Más de Ijarcsee Journal (20)

130 133
130 133130 133
130 133
 
122 129
122 129122 129
122 129
 
116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
99 103
99 10399 103
99 103
 
93 98
93 9893 98
93 98
 
88 92
88 9288 92
88 92
 
82 87
82 8782 87
82 87
 
78 81
78 8178 81
78 81
 
73 77
73 7773 77
73 77
 
65 72
65 7265 72
65 72
 
58 64
58 6458 64
58 64
 
52 57
52 5752 57
52 57
 
46 51
46 5146 51
46 51
 
41 45
41 4541 45
41 45
 
36 40
36 4036 40
36 40
 
28 35
28 3528 35
28 35
 
24 27
24 2724 27
24 27
 
19 23
19 2319 23
19 23
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

56 58

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 DWT Based Copy-Move Image Forgery Detection Preeti Yadav ,Yogesh Rathore ,Aarti Yadu  II. LITERATURE REVIEW Abstract— In an age with digital media, it is no longer true that seeing is believing.In addition, digital forgeries, can be Since the key characteristics of Copy-Move forgery is indistinguishable from authentic photographs. In a copy-move that the copied part and the pasted part are in the same image, image forgery, a part of an image is copied and then pasted on a one method to detect this forgery is exhaustive search, but it different location within the same image .In this paper an is computationally complex and more time is needed for improved algorithm based on Discrete Wavelet Transform detection. A. C. Popescu and H. Farid proposed a similar (DWT)is used to detect such cloning forgery. In this technique detection method [2], in which the image blocks are reduced DWT (Discrete Wavelet Transform) is applied to the input image to yield a reduced dimensional representation.After that in dimension by using Principal Component Analysis (PCA). compressed image is divided into overlapping blocks. These But the efficiency of detection algorithm was not good, blocks are then sorted and duplicated blocks are identified. Due because, blocks are directly extracted from the original to DWT usage, detection is first carried out on lowest level image, resulting in a large number of blocks. D. Soukal, image representation so this Copy-Move detection process proposes DCT based copy-move forgery detection in a single increases accuracy of detection process. image, In which The image blocks are represented by quantized DCT (Discrete Cosine Transform) coefficients, Keywords- Digital Tempering,DWT Copy-Move forgery. and a lexicographic sort is adopted to detect the duplicated image blocks [3]. B.L.Shivakumar and Dr. S.Santhosh I INTRODUCTION Baboo have proposed copy-move forgery detection method Copy-Move forgery is performed with the intention to based on SURF, which detects duplication region with make an object ―disappear‖ from the image by covering it with different size. Experimental result shows that the proposed a small block copied from another part of the same image[1]. method can detect copy-move forgery with minimum false match for images with high resolution[4] . To increase the Usually, such an image tampering is done with the aim of speed of operation process many researchers use blocking either hiding some image details, in which case a background approaches [5]. G.Li, Q.Wu, D.Tu developed a sorted is duplicated, or adding more details. Whichever the case, neighborhood method based on DWT (Discrete Wavelet image integrity is lost.Because the copied segments come Transform) and SVD (Singular Value Decomposition) [6].In from the same image, the color palette, noise components, this method the computation of SVD takes lot of time and it dynamic range and the other properties will be compatible is computationally complex. with the rest of the image, thus it is very difficult for a human eye to detect. Sometimes, even it makes harder for technology III. PROPOSED METHOD to detect the forgery, if the image is retouched with the tools In this proposed method an image is scanned from the that are available. upper left corner to the lower right corner while sliding a B×B block. The DWT transform is calculated For each block, the DWT coefficients are stored as one row in the matrix A. The matrix will have (M+B+1)(N–B+1) rows and B×B columns.The rows of A are lexicographically sorted . The DWT coefficients for each block are now being compared instead of the pixel representation, if two successive rows of the sorted matrix A are found, the algorithm stores the positions of the matching blocks in a separate list B,and increments a shift-vector counter C. For all normalized shift Figure 1. Example of Copy-Move forgery (a) original image vectors, the matching blocks that contributed to that specific (b) tampered image shift vector are colored with the same color and thus identified as segments that might have been copied and moved. The Proposed method of copy-move forgery detection has following main parts. Manuscript received July, 2012 1. Discrete Wavelet Transform Preeti Yadav:, Final year M-Tech CSE, CSVTU Bhilai,RITEE Raipur, 2. Lexicographic Sorting (e-mail:preetiyadu@yahoo.co.in).Raipur, India,Mobile-9827974272 3. Shift Vector Calculation Yogesh Rathore:, :, Department of CSE, CSVTU Bhilai,RITEE Raipur, 4. Neighbor block matching (e-mail:yogeshrathore23@gmail.com).Raipur, India,le-Mobi9301058533. Aarti Yadu, Department of IT, CSVTU Bhilai,RITEE Raipur, (e-mail:artiyadu@gmail.com).Raipur, India. 3.1 Discrete Wavelet Transform 56 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 Wavelet decomposition of the images is used due to its s = (s1, s2) = (x1 – y1, x2 –y2). inherent multiresolution characteristics. The basic idea of using Discrete Wavelet Transform is to reduce the size of the Because the shift vectors –s and s correspond to the same image at each level, e.g., a square image of size 2j ×2j pixels at shift, the shift vectors s are normalized[9]. level L reduces to size 2j/2 × 2j/2 pixels at level L+1. At each level, the image is decomposed into four sub images. The sub The normalized shift vectors s(1),s(2), …, s(K), are those images are labeled LL,LH, HL and HH, The notation LH, HL whose occurrence exceeds a user-specified threshold T: and HH correspond to the vertical, horizontal and diagonal C(s(g)) > T for all g = 1, …, K. components of the image respectively. LL corresponds to the coarse level coefficients or the approximation image. This 3.4 Neighbor Shift Matching image(LL) is used for further decomposition.. These sub For a suspected pair of blocks, the system compares images can be combined together to restore the previous features of nearby blocks of both of the blocks of a pair which image which was decomposed. are at the same vector distance from the corresponding Below figure shows the image pyramid[7].Level-0 image is block.Neighbor Shift value is calculated by subtracting two used for matching of blocks and then these matched blocks equivalent feature vectors. Shift vector of the entire suspected are carried to the next higher level. Final match is performed duplicate region will be same. Two copied and then moved on the original image itself. areas will yield some pair of identical features. The same shift vector will be formed by this. For a particular number of neighbors this shift vector will be checked . Same shift vector will be showing the duplicated region. IV. EXPERIMENTAL RESULT (a) (b) (c) Figure 3. Forgery detection result (16*16)(a) original image(b) tampered image (c) detection result Figure 2. Image pyramid 3.2 Lexicographic Sort The lexicographic or lexicographical order, (also known (a) (b) (c) as lexical order, dictionary order, alphabetical order or lexicographic(al) product), is a generalization of the way the Figure 4 Copy-Move Forgery detection result(48*48) (a) original image(b) alphabetical order of words is based on the alphabetical order tampered image (c) detection result of letters. TABLE I. COMPARISIONWITH DIFFERENT SIZED COPY-MOVE An important property of the lexicographical order is that it IMAGE REGION preserves well-orders, that is, if I and J are well-ordered sets, Copy-Move Region Matched then the product set I ×J with the lexicographical order is also Image Size Region Accuracy well-ordered[8]. Size No of No of in % Pixels Pixels In this step lexicographic sorting is performed on the rows of 256×256 16×16 256 256 100% matrix A. if two consecutive rows of the sorted matrix A are 256×256 48×48 2304 2208 96% found, the algorithm stores the positions of the identical blocks in a separate list B and increments a shift-vector counter C. V. CONCLUSION In this paper an algorithm for detecting copy move forgery 3.3 Shift Vector Calculation using Discrete Wavelet Transform (DWT) is proposed,.Our algorithm has lower computational complexity, since Let (x1, x2) and (y1, y2) be the positions of the two exhaustive search for identical blocks is performed only on matching blocks. The shift vector s between the two the image at the lowest resolution. In future , I would like to matching blocks is calculated as apply Principal Component Analysis, PCA, to the feature 57 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 vector to reduce its dimension, so time complexity will be reduced. The algorithm gave best performance for detection of small size copy move forgery. Ms Arti Yadu has done B.E. in Information REFERENCES Technology from Chhatisgarh Swami Vivekanand University Bhilai,C.G..Her area of Interest is Artificial Intelligence and Network [1] B.L.Shivakumar,Lt. Dr. S.Santhosh Baboo ‖Detecting Copy-ove Forgery Security. in Digital Images: A Survey and Analysis of Current ethods ―Global Journal of Computer Science and Technology Vol. 10 Issue 7 Ver. 1.0 September 2010 [2] A.C.Popescu and H.Farid, ―Exposing digital forgeries by detecting duplicated image regions,‖ Dartmouth College, Hanover, New Hampshire, USA: TR2004-515, 2004. [3] J. Fridrich, D. Soukal, and J. Lukas, ―Detection of copymove forgery in digital images,‖ Proceedings of the Digital Forensic Research Workshop. Cleveland OH, USA, 2003 [4] B.L.Shivakumar and Lt. Dr. S.Santhosh Baboo ―Detection of Region Duplication Forgery in Digital Images Using SURF‖ IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011 [5]Sarah A. Summers, Sarah C. Wahl ―Multimedia Security and Forensics Authentication of Digital images‖http: // cs.uccs.edu /~cs525/ studentproj /proj52006 / sasummer/doc/cs525projsummersWahl.doc [6] G.Li, Q.Wu, D.Tu, and Shaojie Sun, ―A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD,‖ IEEE International Conference on Multimedia & Expo, 2007. [7] Saiqa khan,Arun kulkarni“Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform‖International Journal of Computer Applications Volume 6– No.7, September 2010 [8] Vivek Kumar Singh and R.C. Tripathi‖ Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method ―International Journal of Advanced Science and Technology Vol. 35, October, 2011. [9] Rafael C. Gonzalez, Richard E. Woods, Steven L.Eddins,―Digital Image Processing using MATLAB‖,Second Edition, Pearson Publications, 2004. [10] Preeti Yadav,Yogesh Rathore‖Detection of Copy-M ove Forgery of Images Using DWT‖ International Journal on Computer Science and Engineering (IJCSE) Vol 4 April 2012. AUTHORS PROFILE Mrs Preeti Yadav is Assistant Professor in Department of Computer Science and Engineering at MM ollege of Technology, Raipur, C.G. ,India.she is Pursuing Master's degree(M-Tech 4th semester) in Computer Science From Chhattisgarh swami vivekanand University C.G.,India. Currently. Her research interest includes: Image Processing and Cryptography,Information Systems Security. Mr. Yogesh Rathore is a Sr. Lecturer in Department of Computer Science and Engineering, Raipur Institute of Technology, Raipur (c.g.) . He is M-Tech in Computer Science .His area of interest include Digital image processing & Computer Graphics. 58 All Rights Reserved © 2012 IJARCSEE