ARCHIVES
Research Article
Performance Analysis of Scattered Record Utilizing Block chain for Identifying Visual Substance Imitation
Sivakumar Nagarajan1
Technical Architect, I & I Software Inc, 2571 Baglyos Circle, Suite B-32, Bethlehem, PA-18020, USA.
Published Online: May-August 2024
Pages: 225-229
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20240302032References
1. Oommen, R. S., Jayamohan, M., & Sruthy, S. (2015). A survey of copy moves forgery detection techniques for digital images. International
Journal of Innovations in Engineering and Technology (IJIET), 5(2), 419–426
2. Jaseela, S., & Nishadha, S. G. (2016). Survey on copy move image forgery detection techniques. International Journal of Computer Science
Trends and Technology (IJCST), 4(1), 87–91.
3. Ansari, M. D., Ghrera, S. P., & Tyagi, V. (2014). Pixel-based image forgery detection: A review. IETE Journal of Education, 55(1), 40–
46.
4. Singh, R., & Thakkar, M. (2016). Copy move image forgery detection techniques: Survey. International Journal of Modern Trends in
Engineering and Research, 3(4), 654–657
5. Singh, R. D., & Aggarwal, N. (2018). Video content authentication techniques: A comprehensive survey. Multimedia Systems, 24(2), 211–
240.
6. Hany, F. (2008). Digital image forensics. Scientific American, 298(6), 66–71.
7. Redi, J. A., Taktak, W., & Dugelay, J. L. (2011). Digital image forensics: a booklet for beginners. Multimedia Tools Application, 51(1),
133–162.
8. Parveen, A., Tayal, A. (2016) An algorithm to detect the forged part in an image. In Proceedings of 2nd international conference on
communication and signal processing (pp. 1486–1490).
Journal of Innovations in Engineering and Technology (IJIET), 5(2), 419–426
2. Jaseela, S., & Nishadha, S. G. (2016). Survey on copy move image forgery detection techniques. International Journal of Computer Science
Trends and Technology (IJCST), 4(1), 87–91.
3. Ansari, M. D., Ghrera, S. P., & Tyagi, V. (2014). Pixel-based image forgery detection: A review. IETE Journal of Education, 55(1), 40–
46.
4. Singh, R., & Thakkar, M. (2016). Copy move image forgery detection techniques: Survey. International Journal of Modern Trends in
Engineering and Research, 3(4), 654–657
5. Singh, R. D., & Aggarwal, N. (2018). Video content authentication techniques: A comprehensive survey. Multimedia Systems, 24(2), 211–
240.
6. Hany, F. (2008). Digital image forensics. Scientific American, 298(6), 66–71.
7. Redi, J. A., Taktak, W., & Dugelay, J. L. (2011). Digital image forensics: a booklet for beginners. Multimedia Tools Application, 51(1),
133–162.
8. Parveen, A., Tayal, A. (2016) An algorithm to detect the forged part in an image. In Proceedings of 2nd international conference on
communication and signal processing (pp. 1486–1490).
Related Articles
2024
Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development
2024
Website Development in Computer Science: Unveiling the Digital World
2024
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
2024
Stock Price Prediction Using LSTM
2024
Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler
2024