International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 129 - Number 14 |
Year of Publication: 2015 |
Authors: Chhaya Saini, Priya Singh, Pramod Kr. Sethy, Raj Kumar Saini |
10.5120/ijca2015907090 |
Chhaya Saini, Priya Singh, Pramod Kr. Sethy, Raj Kumar Saini . Digital Image Forgery Detection using Correlation Coeficients. International Journal of Computer Applications. 129, 14 ( November 2015), 17-23. DOI=10.5120/ijca2015907090
In digital era, it has become easy to modify any image. Due to this the trust and validation of it is going to lose. Now it has become major problem of digital world to regain the lost trust. The background behind the modification and any changes in an image is easy availability of software tools on internet. Images can be transformed from one image format to another and any part of image can be altered pixel by pixel. Before the digital age, it was literally easy to detect the altered photographs. But now with the advent in the commercial software like various image photo editing software like Adobe Photoshop, XnView; ProShow Gold etc. make image forgery simple, the tampering of the photographs have become very easy, can be carried out without any noticeable signs of tampering and it is becoming harder to expose and mark the authentic ones. With the increased dependency over the digital images for exchanging the information, the need to keep their authenticity increases and digital images also use as authenticated facts for an offence. If it will not contain the authenticity then a problem will arise. An image forgery is made either by summing some templates, or hiding some kind of information in an image, in which the consistency is lost. This paper identifies the key methods for detecting forgery in the digital images. To identify and detect the forged areas, the image is divided into overlapped patches of some fixed size. In our paper we will discuss the correlation method, that how it find outs the forged part in an image. Firstly, the digital image tampering process is discussed. After that, it shows that different algorithms have different approaches to detect the forgery.