A novel method for detecting light source for digital images forensic

2011 ◽  
Vol 19 (2) ◽  
Author(s):  
A. Roy ◽  
S. Mitra ◽  
R. Agrawal

AbstractManipulation in image has been in practice since centuries. These manipulated images are intended to alter facts — facts of ethics, morality, politics, sex, celebrity or chaos. Image forensic science is used to detect these manipulations in a digital image. There are several standard ways to analyze an image for manipulation. Each one has some limitation. Also very rarely any method tried to capitalize on the way image was taken by the camera. We propose a new method that is based on light and its shade as light and shade are the fundamental input resources that may carry all the information of the image. The proposed method measures the direction of light source and uses the light based technique for identification of any intentional partial manipulation in the said digital image. The method is tested for known manipulated images to correctly identify the light sources. The light source of an image is measured in terms of angle. The experimental results show the robustness of the methodology.

Author(s):  
M. Z. I. Sajid ◽  
K. Hema Chandra Reddy ◽  
E. L Nagesh

A new and novel method to harness more wind energy has been designed Details of the experimental results and theoretical explanation is presented in the paper. The simplicity and economic viability of the method is expected to be a boon in converting poor windy sites to usable ones and to harness more energy at the existing windmill sites.


2020 ◽  
Vol 55 (2) ◽  
Author(s):  
Azal Habeeb

Information is always being transmitted through the internet. Securing that information is an important issue that programmers need to take into consideration. There are several ways to protect digital images, one of which is steganography, a method of encryption that encrypts information inside another type of information such as images. In this research, we propose a new technique to protect information from hacking. We have used the process of hiding. There are many techniques to secure the image such as hiding information inside other information as in steganography. In this paper, we introduce a new method to protect the information from theft. We used encryption to encrypt the text by using the password between the sender and the receiver. After that we used the least significant bit technique to hide the text in the image. Finally, we applied the proposed method in the MATLAB program.


Author(s):  
Minh Thanh Tạ

This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into $n$ shares by using the $k-out-of-n$ method, called $(k,n)$ visual secret sharing. One of share is employed in order to embed into the original image for copyright protection. Another $(n-1)$ of shares are registered with Vietnam Copyright Department. When the dispute happens, the verifier can extract the watermark information from the watermarked image, then, decode it with $(k-1)$ shares chosen from $(n-1)$ shares to achieve the copyright information. Our experimental results show that our proposed method works efficiently on the digital images.


2013 ◽  
Vol 718-720 ◽  
pp. 2270-2275
Author(s):  
Pang Da Dai ◽  
Yu Jun Zhang ◽  
Chang Hua Lu

Research on measuring night visibility using digital images mainly focused on low visibility conditions nowadays. Also, the long term observation leads to fluctuations of the single light source, which would undermine the measuring range and precision. In this context, this paper presents the dual light sources measurement method to eliminate the fluctuations of single source and to achieve both high measuring range and precision at night conditions. The source of visibility measuring error is firstly formulated through an error analysis. Then we propose a dual light sources framework that yields two identical beams to measure the visibility, which is advantageous over the single light source method and capable of measuring high visibility. In the experiments, the stability of the dual light sources is firstly tested by a 72-hour running. The average luminance ration of dual light sources is 0.9932 and the average relative error is 0.04%. The relative error of dual light sources luminance ration is only 0.2% when the fluctuations of single source is as high as 2.28%. Then the dual light sources is applied in the digital image night visibility measuring system to evaluate its validity. The result shows that the dual light sources method is capable of measuring the range of 390 times of baseline (40m baseline) with the error less than 15%, which fully meets the meteorological demands.


2013 ◽  
Vol 427-429 ◽  
pp. 1836-1840 ◽  
Author(s):  
Yong Zhuo Wu ◽  
Zhen Tu ◽  
Lei Liu

Iamge repair using the digital image processing technology has become a new research point in computer application. A novel method of local statistic enhancement based on genetic algorithm is proposed in this paper for the image enhancement. The modified amplified function are used as the jugement criterion, and the optimal paremeters are searched by the genetic algorithm. Experimental results show that the quality of images is improved dramatically by using this method.


Author(s):  
Prasad M Joshi ◽  
S V Kulkarni

This paper presents a novel method for deformation diagnostics of transformer windings using terminal measurements. The shortcomings of existing practices in locating deformation and determining its extent are discussed. The logical steps involved in devising the new method are elaborated. The effectiveness of Deformation Coefficient (DC) in locating the deformed winding section is demonstrated. Comparison of experimental results, on a model winding, with simulation studies is presented.


1982 ◽  
Vol 1 (4) ◽  
pp. 175-180
Author(s):  
J. D. Van Wyk ◽  
J. J. Schoeman

The contribution proposes a novel method for reduction of voltage drop across Darlington circuits when used as power switches and reports preliminary experimental results. The compensation leads to at least an effective doubling of the energy efficiency of the switch while no detrimental effects on current fall time have been found. The scheme is easily realisable in modern electronic technology.


An important measure of proof collection, storage, and authentication in forensic sciences, which decide the safety and security of any system documents, which can be either portable document formats or scanned images. To gather evidence, or plan a forensic investigation digital images are secured with different modern methodologies. Digital image analysis includes image recovery and surveillance for image information improvement. The goal of forgery detection is to maximize the extraction of information from manipulated images, particularly noisy and post-processed images. Because digital image processing is becoming popular with many advantages in scientific and engineering applications, the forgery techniques are also growing at a rapid rate. Therefore, the main focus is on different types of forgery detection in digital image processing with the help of all transform techniques and comparing their best results for further improvement in order to generate a new approach for a future forensic science investigation.


2020 ◽  
Vol 1001 ◽  
pp. 175-180
Author(s):  
Li Ping Tu ◽  
Xiang Yu ◽  
Guo Wei Xu

In this paper, a novel photoelectrochemical sensor based on doped quantum dots (QDs) under various bias voltages was designed, first, photoelectrochemical sensors were designed for detection of chemical solution concentration. Second, the fabrication processes of doped QDs based sensors were described, third, doped QDs based sensors were tested under different applied potentials and light sources to show different measurement characteristics. From the experimental results, it can be concluded that the doped QDs based sensors designed under-300mV applied potential and 365nm light source show the best performance.


Author(s):  
Jamil Al-Azzeh ◽  
Ziad Alqadi ◽  
Qazem Jaber

 The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.In this paper we will introduce a new method of digital image encryption-decryption, which will be very simple, highly secure and accurate and highly efficient.


Sign in / Sign up

Export Citation Format

Share Document