dc.contributor.author |
Gaharwar, G. K. S. |
|
dc.contributor.author |
Nath, V. V. |
|
dc.contributor.author |
Gaharwar, R. D. |
|
dc.date.accessioned |
2016-03-15T06:23:46Z |
|
dc.date.available |
2016-03-15T06:23:46Z |
|
dc.date.issued |
2015-08 |
|
dc.identifier.issn |
0975-9646 |
|
dc.identifier.uri |
http://27.109.7.66:8080/xmlui/handle/123456789/199 |
|
dc.description |
Comprehensive Study of Contemporary Image Forgeries Identification Techniques” published in “International Journal of Computer Science and Information Technology (IJCSIT), ISSN: 0975-9646, Vol.6, Iss.6, Dec, 2015, IF.3.24, p5413-5416 |
en_US |
dc.description.abstract |
Image forgery means manipulating digital image to hide some important and key information from the image. Many times the forgery is done so meticulously that it is very difficult to identify the edited region from the original image. This papers surveys different types of active forgery techniques viz digital signature and digital watermarking and also different passive image forgeries viz copy-move forgery, image splicing, image retouching, and lighting condition. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IJSTM |
en_US |
dc.subject |
Digital Image Forgery |
en_US |
dc.subject |
Active Authentication |
en_US |
dc.subject |
Passive Authentication |
en_US |
dc.subject |
Copy-Move Forgery |
en_US |
dc.subject |
Image Splicing |
en_US |
dc.subject |
Image Retouching |
en_US |
dc.subject |
Lightning Condition |
en_US |
dc.title |
Comprehensive study of different types image forgeries |
en_US |
dc.type |
Article |
en_US |