ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Forbidden Twin Substantiate Consuming Hash Generation and SVM?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)

Publication Date:

Authors : ; ;

Page : 1162-1170

Keywords : Forbidden image detection; SIFT; PCA; image hash; SVM.S;

Source : Downloadexternal Find it from : Google Scholarexternal


Forbidden images are highly available in every field. To carryover many unauthorized job. It’s highly necessary to control over the forbidden image including removal, insertion, and replacement of objects, and abnormal color modification, and for fix the forbidden area. Thus the forbidden images can be identified through process center image processing. This includes pre-processing, feature extraction and classification. Noise removal of segmentation is obtained in preprocessing global and local features is extracted through PCA and SIFT. Secret keys are introduced for hash structure and feature extraction. While being robust against content-preserving image processing, the hash is superficial to wicked interfering and, therefore, applicable to image endorsement. The hash of an experiment image is matched with that of an allusion image. When the hash distance is greater than a threshold τ1 and less than τ2, the acknowledged image is umpired as a false. By decomposing the hashes, the type of image forbidden and location of forbidden areas can be determined.

Last modified: 2014-04-29 17:58:11