Texture based Image Splicing Forgery Recognition using a Passive Approach

Author(s):  
Asif Hassan ◽  
◽  
V K Sharma ◽  

With the growing usage of the internet in daily life along with the usage of dominant picture editing software tools in creating forged pictures effortlessly, make us lose trust in the authenticity of the images. For more than a decade, extensive research is going on in the Image forensic area that aims at restoring trustworthiness in images by bringing various tampering detection techniques. In the proposed method, identification of image splicing technique is introduced which depends on the picture texture analysis which characterizes the picture areas by the content of the texture. In this method, an image is characterized by the regions of their texture content. The experimental outcomes describe that the proposed method is effective to identify spliced picture forgery with an accuracy of 79.5%.

Author(s):  
Aditi Shedge ◽  
Shaily Shah ◽  
Shubham Pandey ◽  
Mansi Pandey ◽  
Rupali Satpute

A human brain responds at a much faster rate to images and the information it contains. An image is considered as proof of past events that have occurred, but in today's world where editing tools are made available so easily tampering of images and hiding the original content has become too mainstream. The identification of these tampered images is very important as images are considered as vital sources of information in crime investigation and in various other fields. The image forgery detection techniques check the credibility of the image. Various research has been carried out in dealing with image forgery and tampering detection techniques, this paper highlights various the type of forgery and how they can be detected using various techniques. The fusion of various algorithms so that a complete reliable type of algorithm can be developed to deal mainly with copy-move and image splicing forgery. The copy-move and image splicing method are main focus of this paper.


2020 ◽  
Author(s):  
Doni Pratiwi ◽  
Hade Afriansyah
Keyword(s):  

The aim of this article is to increase the reader's knowledge about the administration of education, and that knowledge can be used in daily life. The methodology used in this article is find the material from books or articles on the internet, then from the material obtained, the authors make articles in their own language. The conclusion that author get is that administration is very important in the realm of education, and has a large function and scope in the realm of education.


2021 ◽  
Vol 2 (1) ◽  
pp. 14-18

This paper focuses on the application of forensic psychology tools in cyber investigation and tries to light on cyber forensic equipment. The internet helped us greater in communiqué and all similar trends. Except for those features, the digital global has extended its hands to unlawful activities. We can't blame technology for crimes, it is all about who is using it. Cybercrimes is likewise about the maladaptive behaviour of human and Disrupted existence. In cybercrime investigations analysing human behaviour is inevitable. Cyber psychology is interdisciplinary vicinity wherein behavioural science and cyber technology merge. Exceptional forensic tools are used in the cyber investigation are autopsy, O.S. forensic toolkit, RAM forensics, TrueCrypt, DFF, and Wireshark, etc. Cyber-crook behaviour may be analysed via the utility of forensic psychology strategies. Forensic psychology investigation tools are applicable in cybercrimes as well. Cyber-criminal behaviour can be analysed through the application of forensic psychology techniques. It can be utilized for the identification, and authentication of the perpetrator who has executed cybercrime or to show his innocence. Deception detection techniques are very beneficial to screen those criminals who've been committed cybercrimes. Criminal profiling and Geographical profiling will plot the personality picture of the cyber offender.


2021 ◽  
Vol XXV (1) ◽  
pp. 55-73
Author(s):  
Irena Bogoczová ◽  
Lukáš Maršík

The present article introduces the results of the analysis of texts by Czech (Catholic) Christian young adults published in 2019 and 2020 on the website signaly.cz. This page is intended to unite Christians and support them in their faith. The texts are diverse in genre, their content is purely religious or secular, but it at least remotely touches on the issues of the spiritual life of man or his/her religiosity (“soft spirituality”). Posting on the internet testifies to the need for young people not only to strengthen themselves and others in their faith in God, but also to share trivial content that relates to daily life and behind which (in the background) they see God’s will, the expression of God’s love and wisdom.


Data ◽  
2021 ◽  
Vol 6 (10) ◽  
pp. 102
Author(s):  
Kalyani Dhananjay Kadam ◽  
Swati Ahirrao ◽  
Ketan Kotecha

Image forgery has grown in popularity due to easy access to abundant image editing software. These forged images are so devious that it is impossible to predict with the naked eye. Such images are used to spread misleading information in society with the help of various social media platforms such as Facebook, Twitter, etc. Hence, there is an urgent need for effective forgery detection techniques. In order to validate the credibility of these techniques, publically available and more credible standard datasets are required. A few datasets are available for image splicing, such as Columbia, Carvalho, and CASIA V1.0. However, these datasets are employed for the detection of image splicing. There are also a few custom datasets available such as Modified CASIA, AbhAS, which are also employed for the detection of image splicing forgeries. A study of existing datasets used for the detection of image splicing reveals that they are limited to only image splicing and do not contain multiple spliced images. This research work presents a Multiple Image Splicing Dataset, which consists of a total of 300 multiple spliced images. We are the pioneer in developing the first publicly available Multiple Image Splicing Dataset containing high-quality, annotated, realistic multiple spliced images. In addition, we are providing a ground truth mask for these images. This dataset will open up opportunities for researchers working in this significant area.


Author(s):  
Varsha Sharma ◽  
Vivek Sharma ◽  
Nishchol Mishra

Recently, Internet of Things (IoT) has aroused great interest among the educational, scientific research, and industrial communities. Researchers affirm that IoT environments will make people's daily life easier and will lead to superior services, great savings as well as a nifty use of resources. Consequently, IoT merchandise and services will grow exponentially in the upcoming years. The basic idea of IoT is to connect physical objects to the Internet and use that connection to provide some kind of useful remote monitoring or control of those objects. The chapter presents the overall IoT vision, the technologies for achieving it, IoT challenges and its applications. This chapter also attempts to describe and analyze threat types for privacy, security and trust in IoT as well as shows how big data is an important factor in IoT. This chapter will expose the readers and researchers who are interested in exploring and implementing the IoT and related technologies to the progress towards the bright future of the Internet of Things


Author(s):  
Satoko Ezoe ◽  
Masahiro Toda

Smartphone use has rapidly developed in recent years and become an established part of daily life in many countries. As various applications have been developed as communication tools for use with smartphones, allowing the internet to become more accessible, patterns of dependence have been routinely reported particularly among adolescents. In this chapter, the authors reviewed the previous studies about the relationships of smartphone dependence to chronotype and gender among adolescents. Chronotype refers to preference for sleep-wake timing: for example, morning types go to bed, get up, and experience peak alertness and performance earlier in the day than do evening types. It was found that the light emitted from media screen in the evening before bedtime may delay the circadian rhythm. In addition, excessive smartphone use may lead to sleep disturbances. Recent studies suggested that evening types and females may be more prone to become smartphone dependent.


Author(s):  
Yunhua Xiao

With the progress of science and technology, the development and improvement of internet technology and smart phones are gradually popular in the daily life; this world has achieved a swift transition to the mobile internet era from the traditional internet era. Various tourist areas have established “Digital Scenic Spots” in recent years, making the internet combine tightly with tourism. The construction of scenic-spot marketing platforms based on internet is an important component of constructing “Digital scenic spot.” In this article, a tourism marketing platform on the mobile internet is established by analyzing the mobile internet mainstream technology and its application in tourism marketing. In this article, the architecture of the marketing system uses the MVC pattern with a three-tier distributed structure and the logic layer of the system uses a construction of JavaBean and EJB. The article also builds a WeChat marketing model based on MM-TIP. The result of research provides some reference for constructing tourism marketing platform based on mobile internet.


Sign in / Sign up

Export Citation Format

Share Document