Академический Документы
Профессиональный Документы
Культура Документы
Presented By
Bh. Abinay Varma
(309506402001)
1
Abstract
There are various types of digital forgeries out of which Copy-Move
attack is one. In Copy- Move Attack a part of the image is copied
and pasted on another part generally to conceal unwanted portions of
the image.
This method successfully detects the forged part when Copy Move
regions are same and when the forged image is saved in a major
graphic file format, such as JPEG or PNG.
2
Existing System
The Existing system uses active techniques such as watermarking or
digital signatures to solve the authentication problem in images and
to make it free from tampering.
3
Problems with Existing system
This system have limitations because they require human attention or
specially equipped cameras such as Digital cameras with watermarking
technology in it.
This system also requires the information of the original image to detect
forgery in a image.
4
Challenges
Sophisticated tools
3D Max, Photoshop
Automated lighting, and processing that conceal forgery
5
Proposed System
Copy-Move forgery detection system can detect copy-move type
forgery in digital images without any data about the original image
and without any watermarks in the image
6
Proposed system Advantages
Improved version of copy-move forgery detection algorithm has the
following advantages
7
Phases
Getting the image and forming it into blocks.
8
Perfect match algorithm
To eliminate the details of the image, the whole image is first
blurred.
Then the image is converted into degraded palette where the whole
picture is converted into small pixels of colors palette.
11
Functional Requirements
The system Should detect forgeries done in multiple
regions in an image
12
System Requirements
Hardware Requirements
Processor : Pentium 4 or more
Clock Speed : 1.8 GHz
Ram : 512 MB or more
Disk Space : 20 GB or more
Software Requirements:
Operating system : Windows XP or more.
Language : Python 2.6, MATLAB 2009b or more.
13
Use-Case Diagram
14
Class Diagram
15
Sequence Diagram
16
Activity Diagram
17
Collaboration Diagram
18
State Chart Diagram
19
Welcome Screen
20
After Clicking on Upload Image
21
Select Input Image
22
After selecting test image
23
Selecting level of Analyzing
24
After Clicking on Analyze Image Button
25
After Analyzing the image
26
Test Cases
Detecting Tampering done on big size
27
Test Case (cont)
Working on Small regions
28
Test Case (Cont)
Working for Multiple Copy Move Regions
29
Test case ()
Will not detect Textured areas
30
Applications of CMFD
In courtrooms the trustworthiness of photographs has an essential
role as they are used as evidences thus CMFD can be used to know
its trustworthiness.
31
Conclusion
A new methodology is proposed by which the user can detect copy
move type forgeries done with the intention to conceal certain details
or to duplicate certain aspects of an image.
Contributions :
Outperforms contemporary algorithms in speed of detection
32
Future Work
The future enhancements that are required for this system
are to improve the detecting process, the system needs to be
expanded for detecting all types of forgery such as
retouching and tampering in textured regions.
33
References
J. Fridrich, “Methods for "Methods for Tamper Detection in Digital
Images", Proc. ACM Workshop on Multimedia and Security, Orlando, FL,
October 30−31, 2009, pp. 19−23.
34
THANK YOU
35