Skip to main content

Enhancement of Image Forgery and Improvement of Image Parameters Using DWT Algorithm

  • Conference paper
  • First Online:
Data Engineering and Intelligent Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 446))

  • 251 Accesses

Abstract

Choosing a reliable and effective fraudulent method of determining counterfeit coefficients is the key to image fraud. This document sets out a new algorithm based on discrete wavelet transform (DWT) and Eigen operators from the point of view of the acquisition. First, create many sculptural images using DWT and PCA, then get detailed, vertical and diagonal edge details by finding the edges of the lower parts and the higher frequency. Thereafter, comparing the pixel strength of each pixel and the confirmation of consistency to accurately determine the points of the edge and ensure the clarity of the forgery image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Daniya T, Copy-move forgery detection in videos using machine learning algorithm. 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC). 978-1-6654-3368-6. https://doi.org/10.1109/ICOSEC51865.2021.9591881

  2. Koshy L Video forgery detection using CNN. 2021 Smart Technologies, Communication and Robotics (STCR). 978-1-6654-1806-5. https://doi.org/10.1109/STCR51658.2021.9588860

  3. Chandra Sekhar PNRL, An object-based detection of splicing forgery using color illumination inconsistencies. 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), 978-1-7281-8595.https://doi.org/10.1109/ICCCNT51525.2021.9580044

  4. Gupta M, An image forensic technique based on SIFT descriptors and FLANN based matching. 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). 978-1-7281-8595-8. https://doi.org/10.1109/ICCCNT51525.2021.9579701

  5. Zhu X, “Face Forgery Detection by 3D Decomposition”, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 78-1-6654-4509-2. https://doi.org/10.1109/CVPR46437.2021.00295

  6. Honggu L, Spatial-phase shallow learning: rethinking face forgery detection in frequency domain. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 978-1-6654-4509-2. https://doi.org/10.1109/CVPR46437.2021.00083

  7. He Y, ForgeryNet: A versatile benchmark for comprehensive forgery analysis. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 978-1-6654-4509-2. https://doi.org/10.1109/CVPR46437.2021.00434

  8. Luo Y, Generalizing face forgery detection with high-frequency features. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 978-1-6654-4509-2. https://doi.org/10.1109/CVPR46437.2021.01605

  9. Abir NAM, An evaluation of patch match-based copy-move forgery detection (CMFD) on social media images. 2021 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), 978-1-6654-2899-6. https://doi.org/10.1109/IICAIET51634.2021.9573571

  10. Zhang Y, Multi-task SE-network for image splicing localization. IEEE Transactions on Circuits and Systems for Video Technology, 1051–8215. https://doi.org/10.1109/TCSVT.2021.3123829

  11. Le-Tien T, A combination of super-resolution and deep learning approaches applied to image forgery detection. 2020 International Signal Processing, Communications and Engineering Management Conference (ISPCEM), 978-1-6654-1920-8. https://doi.org/10.1109/ISPCEM52197.2020.00056

  12. Lin Y, Exploring generalization capability for video forgery and detection based on generative adversarial network. 2020 International Conference on Computational Science and Computational Intelligence (CSCI), 978-1-7281-7624-6. https://doi.org/10.1109/CSCI51800.2020.00291

  13. Mahfoudi G, Object-removal forgery detection through reflectance analysis. 2020 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 978-1-6654-1589-7. https://doi.org/10.1109/ISSPIT51521.2020.9408870

  14. Tripathi P, Identifying video forgery using object trajectory and optical flow. 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 978-1-7281-8337-4. https://doi.org/10.1109/ICACCCN51052.2020.9362926

  15. Parnak A, A novel forgery detection algorithm based on mantissa distribution in digital images. 2020 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), 978-1-7281-8629-0. https://doi.org/10.1109/ICSPIS51611.2020.9349611

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajni Soni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Soni, R., Amhia, H. (2022). Enhancement of Image Forgery and Improvement of Image Parameters Using DWT Algorithm. In: Bhateja, V., Khin Wee, L., Lin, J.CW., Satapathy, S.C., Rajesh, T.M. (eds) Data Engineering and Intelligent Computing. Lecture Notes in Networks and Systems, vol 446. Springer, Singapore. https://doi.org/10.1007/978-981-19-1559-8_1

Download citation

Publish with us

Policies and ethics