scholarly journals Digital Image Manipulation

Radiographics ◽  
2003 ◽  
Vol 23 (5) ◽  
pp. 1338-1340
Author(s):  
Omar Lababede
Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2008 ◽  
Vol 16 (4) ◽  
pp. 62-63
Author(s):  
V.M. Dusevich ◽  
J.H. Purk ◽  
J.D. Eick

Coloring pictures is an educational exercise, which is fun, and helps develop important skills. Coloring SEM micrographs is especially suitable for electron microscopists. Color micrographs are not just great looking on a lab wall; they inspire both microscopists and students to exercise digital picture manipulation. Many microscopists enjoyed looking at the beautiful color micrographs by D. Scharf, but were frustrated to learn they needed a very particular scanning electron microscope equipped with multiple secondary electron detectors in order to color their own pictures. Fortunately, there are other ways to color SEM micrographs. Most SEMs are equipped with at least two detectors, for secondary and backscattered electrons.


Radiographics ◽  
2002 ◽  
Vol 22 (4) ◽  
pp. 981-992 ◽  
Author(s):  
Frank M. Corl ◽  
Melissa R. Garland ◽  
Leo P. Lawler ◽  
Elliot K. Fishman

Author(s):  
C. Richard Johnson Jr. ◽  
William Sethares ◽  
Margaret Holben Ellis

Identifying, comparing, and matching watermarks in pre-machine-made papers has occupied scholars of prints and drawings for some time. One popular but arduous approach is to overlay, either manually or digitally, an image of the watermark in question with its presumed match from a known source. For example, a newly discovered watermark in a Rembrandt print might be compared to a similar one reproduced in Erik Hinterding’s Rembrandt as an Etcher (2006). Such an overlay can confirm the pair as identical, i.e., as moldmates, or reveal their differences. But creating an accurate overlay for two images with different scales, orientations, or resolutions using standard image-manipulation tools can be time consuming and, ultimately, unsuccessful. Part One of this article describes advances in the emerging field of computational art history, specifically the development of digital image processing software, that can be used to semi-automatically create a reliable animated overlay of two watermarks, regardless of their relative “comparability.” Watermarks found in the prints of Rembrandt van Rijn (1606–1669) are used in three case studies to demonstrate the efficacy of user-generated overlay videos. Part Two discusses how searching for identical watermarks, i.e., moldmates, can be enhanced through the application of a new suite of software programs that exploit the data calculated during the creation of user-generated animated overlays. This novel watermark identification procedure allows for rapid, confident watermark searches with minimal user effort, given the existence of a pre-marked library of watermarks. Using a pre-marked library of Foolscap with Five-Pointed Collar watermarks, four case studies present different categories of previously undocumented matches 1) among Rembrandt’s prints; 2) between prints by Rembrandt and another artist, in this case Jan Gillisz van Vliet (1600/10–1668); and 3) between selected Rembrandt prints and contemporaneous Dutch historical documents.


2008 ◽  
Vol 14 (S2) ◽  
pp. 890-891
Author(s):  
VM Dusevich ◽  
JD Eick

Extended abstract of a paper presented at Microscopy and Microanalysis 2008 in Albuquerque, New Mexico, USA, August 3 – August 7, 2008


Sign in / Sign up

Export Citation Format

Share Document