I am working on a image tampering project, and I am having trouble understanding
ID: 3605016 • Letter: I
Question
I am working on a image tampering project, and I am having trouble understanding how it works. The code comes with clean and tampered images with a specific camera but how can I make it to work that catches iPhone taken pictures and able to detect if it is tampered or not? Also, how does this program generate the mask? The black mask as shown in the screenshot. Can someone please help me, I am so lost. NEED CORRECT EXPLANATION PLEASE, IF YOU DON'T KNOW THE ANSWER DON'T ANSWER. Thank youu!!
Here is the codes link, feel free to try it this program is FREE for research purposes: http://www.grip.unina.it/research/83-image-forensics/91-prnu-mrf.html
Here is the working program:
Figure 1 Compare Go To Comment Run and Time Breakpoints Run Run and Advance ndent Print Find Advance File Edit View Insert Tools Desktop Window Help NAVIGAT D: Users sshazad Documents MATLAB Editor . D:UserssshazadDesktopprnuCodeldemo-forgery ocalization.m demo estimateFingerprint.m X+ demo forgerylocalization.m + 25o 26 27 28o 29opt _mrf .pO 30 31 32- 33x_pristineimread (fullfile (directory, 'photos', caera, 'pristine, [photor opt mrf.dilate = 20; % N.3, the following parameters are camera-dependent opt mrf.beta = 120; Original Tampered Output (FM-88.01 %) -0.5 load image [tmp,photoname] fileparts (photo); = Picture Tools masks Home Sh Vieww Manage -> pmuCode photos > CanonEOS10D masks ick access esktop ownloads Documents img01.mask img03.mask img04.mask Pictures CanonEOS 100 Details- OneDrive This PC PersistentDataDisk (D SystemDisposableDis Network 2 usages cExplanation / Answer
The term image tempering generally deals with to maintain the security and privacy of the data to be hidden as in form of that image which is being used ti hide the data or the input .Watermarking which is the hidind tecgnique is also or can be used ih this technique.It can done by using the images as well as the videos.In this initially we seperate all the frames and then after the LSB(least significant bit method) can be used as a technique in it for embedding the data in it.In this ,the bit portion is used in LSB.It can be even or odd bit which is at the right most position in the bit form.After performing all the process in this, we then use inverse transform method to recognise the original image.The sliding block is also used in it which match the image in ie using as the form in exact match or the robust match in which each has the seperate techniques to be used in it.The pixels block intensity is also matched or used to seperate in the different blocks. In video tempering ,initiallythe quantize technique is used by the transformer..Encoding and decoding is used in it to generate the bits required in it which is ultimately used to generate the frames.Inverse transform is used to reduce image in the original form.SURF features are recognized in it.Various techniques are used in it to perform this task and these may be copy move ,copy paste,cutor cut paste.Image tempering technique is such a great technique to hide the data or information in a secured manner.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.