Learn More
Copy-move is a common manipulation of digital image tampering. Block matching after feature extraction is mostly applied method to detect this kind of forgery. In this paper, we propose an efficient copy-move detecting scheme with the capacity of some post-processing resistances. The image is divided into fixed-size overlapped blocks, and then non-negative(More)
A robust hashing method is developed for detecting image forgery including removal, insertion, and replacement of objects, and abnormal color modification, and for locating the forged area. Both global and local features are used in forming the hash sequence. The global features are based on Zernike moments representing luminance and chrominance(More)
In visual perception, distant objects appear smaller than those close to the observer. To insert an object into an image, properly size a foreign object is difficult, especially when there is no reference object in the same distance. To detect this type of image forgery, we present a perspective-constraint based method, with which the height ratio of two(More)
The bending movement of the pulvinus of Mimosa pudica is caused by a rapid change in volume of the abaxial motor cells, in response to various environmental stimuli. We investigated the relationship between the actin cytoskeleton and changes in the level of calcium during rapid contractile movement of the motor cells that was induced by electrical(More)
In a spliced image, areas from different origins contain different noise features, which may be exploited as evidence for forgery detection. In this paper, we propose a noise level evaluation method for digital photos, and use the method to detect image splicing. Unlike most noise-based forensic techniques in which an AWGN model is assumed, the noise(More)
It is well known that Maximum Likelihood(ML) criteria results in the best BER performance for multiple-input multiple-output (MIMO) systems, but exhaustive search is unacceptable in practical systems mapped by large QAM constellations. Sphere detector is promising by setting constraints on the points to lie in a hypersphere. Generally, the constraints are(More)
  • 1