Professional Documents
Culture Documents
Social Media
*Mahendra Bilagi
mahendra.bilagi@gmail.com
ABSTRACT
The images of celebrities are publicly
available in the internet. There are some cases
where celebritys photo is edited in and misused
for advertisement or some other purpose. It is the
challenging problem for detecting misused
celebrity image over billons of internet images. A
SURF & SIFT methods are used to detect images
over social networks. But it consumes more time
and an in efficient technique. Moreover SIFT do
not perform well for real time applications. This
paper proposes a model that uses a feature
descriptor method which takes an image and
output feature vectors. Feature descriptor
encoded interesting information into number
series that can be used to differentiate a feature
from another. Then it will enhance a performance
of SURF algorithm by paralleling using Parallel
MATLAB.
Keywords
Image descriptor; Feature vector; Cloud SURF
(Speeded Up Robust Feature); SIFT;Parallel
programming; Numerical finger print; Parallel
MATLAB; Shared resources;encoding; Number
series;celebrates; image descriptor;
Objectives:
To study several image descriptor
techniques.
To learn parallel computing using Parallel
MATLAB toolkit.
**Nikhil Jain
nikhiljain10008@gmail.com
1. INTRODUCTION
Today, the utilization of Digital pictures is
expanding quickly in just about each zone of
human life like in instruction, programming
organizations, TV, organizations, news-casting,
restorative
imaging,
furthermore,
online
networking. It is anything but difficult to learn
and comprehend anything outwardly as opposed
to just perusing or tuning in. Another perspective
is that by and large visual data is accepted to be
valid. Be that as it may as the innovation
advances and loads of modern picture preparing
instruments are accessible. it turns out to be
anything but difficult to alter visual data. Digital
picture fabrication is a developing issue in
criminal cases and out in the open course. As of
now there are no settled strategies to confirm the
credibility and respectability of Digital pictures
of celebrities over social media in a programmed
way. Distinguishing falsification in computerized
pictures is a rising examination field with
imperative ramifications for guaranteeing the
validity of Digital picture.
as
follows.
Input: image.
Output: detected duplicate regions with image.
(1) If RGB image, then converted into gray scale.
(2) Applying SURF method.
(a) Keypoints are detected from an image(1, 2,
3, . . . ,).
(b) From the above detected keypoints, features
areextracted (1, 2, 3, . . . ,).
(c) This matrix is stored in a variable = .
(3) For each = 1 to ,for = 1 to .
(a) If = then go to step (b); else: return.
(b) Dot products are calculated between each
feature descriptor.
End of For .
(c) Inverse cosine angle of dot products will be
computed.
(d) Sorting is applied on the result, and values are
stored
[Value, index] = sort (cos1(dot prods)).
(e) If (Value(1)/Value(2)) <0.6, then match exists,
and index will be stored.
Else: index = 0.
End of For .
(4) For each keypoint
(a) If match exists, then go to step (b);
else: return.
(b) If the matched points are far from 10 10
square region, then go to step (c);
else: return.
(c) Store the coordinates of matched points in
bydata matrix and set: flag = 1.
End of For.
(5) If flag >0, then
(a) euclidean distance computed between each
pair of objects of ;
I ( x , y )= I ( x , y ) ;
i=0 j=0
IMAGE FORGERY
ACTIVE METHOD
PASSIVE METHOD
TEMPERING
WATER MARKING
IMAGE
RETOUCHING
COPY MOVE
IMAGE
SPLICING
INPUT IMAGE
KEY POINT
DETECTION
FEATURE EXTRACTION
EUCLIDEAN DISTANCE
COMPUTED BETWEEN MATCHED
KEY POINTS
L xx ( x , ) Lxy ( x , )
L xy ( x , ) L yy ( x , )
Det ( H )=
Dxx D yy
( 0.9 Dxy )2
4 4 4 = 64.
V sub region= [
dx , dy , |dx| , dy
]
d(A,B) =
nA
1
nAn
nB
dist ( x Ai x Bj )
B
i=1 j=1
ESS(A) =
|x Ai x A|
i=1
4.2 Example 2
nA
~XA =
1
x Ai
nA
i=1
4. Results
4.1 Example 1
4.3 References and Citations
There are many examples where people use these
illegal techniques to modify the rivals images for
revenge. So, this method provide to detect these
are easily accessible (i.e. you can give the address to obtain the
report within your citation) and may be obtained by any reader.
Proprietary information may not be cited. Private communications
should be acknowledged, not referenced (e.g., [Robertson,
personal communication]).
5. FIGURES/CAPTIONS
Place Tables/Figures/Images in text as close to the reference as
possible (see Figure 1). It may extend across both columns to a
maximum width of 17.78 cm (7).
Captions should be Times New Roman 9-point bold. They should
be numbered (e.g., Table 1 or Figure 2), please note that the
word for Table and Figure are spelled out. Figures captions
should be centered beneath the image or picture, and Table
captions should be centered above the table body.
6. SECTIONS
The heading of a section should be in Times New Roman 12-point
bold in all-capitals flush left with an additional 6-points of white
space above the section head. Sections and subsequent subsections should be numbered and flush left. For a section head and
a subsection head together (such as Section 3 and subsection 3.1),
use no additional space above the subsection head.
6.1 Subsections
The heading of subsections should be in Times New Roman 12point bold with only the initial letters capitalized. (Note: For
subsections and subsubsections, a word like the ora is not
capitalized unless it is the first word of the header.)
6.1.1
Subsubsections
6.1.1.1 Subsubsections
The heading for subsubsections should be in Times New Roman
11-point italic with initial letters capitalized.
6.1.1.2 Subsubsections
The heading for subsubsections should be in Times New Roman
11-point italic with initial letters capitalized.
7. CONCLUSION
In this paper, a system was introduced for
recognizing the copy region based on SURF and
HAC. The essential picture utilized as a part of
SURF diminishes the time multifaceted nature.
SURF has less highlight descriptor dimensional