Bolaji O. Adedayo

Work place: Department of Cyber Security Science, Federal University of Technology, Minna, Niger State, Nigeria

E-mail: bj4lastb@gmail.com

Website:

Research Interests: Image Processing, Image Manipulation, Image Compression

Biography

Bolaji O. Adedayo, he is pursuing the master of technology from the Federal University of Technology, Minna, Niger State, Nigeria. He received his Bachelor of Engineering in Electrical/Computer Engineering from FUT Minna, Niger State, Nigeria in 2007. His area of interest is digital image forensic.

Author Articles
Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques

By Joseph A. Ojeniyi Bolaji O. Adedayo Idris Ismaila Shafii M. Abdulhamid

DOI: https://doi.org/10.5815/ijigsp.2018.04.03, Pub. Date: 8 Apr. 2018

As the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing tools have become easily available on the internet, which has made people who are a novice in the field of image editing, to be capable of tampering with an image easily without leaving any visible clue or trace behind, which has led to increase in digital images losing authenticity. This has led to developing various techniques for tackling authenticity and integrity of forged images. In this paper, a robust and enhanced algorithm is been developed in detecting copy-move forgery, which is done by hybridizing block-based DCT (Discrete Cosine Transform) technique and a keypoint-based SURF (Speeded-Up Robust Feature)technique using the MATLAB platform. The performance of the above technique has been compared with DCT and SURF techniques as well as other hybridized techniques in terms of precision, recall, FPR and accuracy metrics using MICC-F220 dataset. This technique works by applying DCT to the forged image, with the main goal of enhancing the detection rate of such image and then SURF is applied to the resulting image with the main goal of detecting those areas that are been tampered with on the image.  It has been observed that this paper’s technique named HDS has an effective detection rate on the MICC-F220 dataset with multiple cloning attacks and other various attacks such as rotation, scaling, a combination of scaling plus rotation, blur, compression, and noise.

[...] Read more.
Other Articles