canberk şahin - Academia.edu (original) (raw)
Related Authors
International Journal of Engineering Research and Applications (IJERA)
Uploads
Papers by canberk şahin
International Conference on Applied Engineering and Natural Sciences
With the development of computer technologies, manipulations are made on digital images without l... more With the development of computer technologies, manipulations are made on digital images without leaving a clear trace thanks to image processing software. There is a great need for applications to detect forgered images made with malicious intent in many fields such as politics, law, medicine and military. Many studies have been carried out and various algorithms have been developed to detect forgered regions by detecting forgered images. Today, superior methods are developed by combining traditional image forgery techniques with deep learning techniques. In this study, the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) were used together with Convolutional Neural Networks (CNN) to locate the forgered regions of the forgered images. Three different methods were made to locate the forgered region. In the first method, DWT and CNN were used together. In the second method, DCT and CNN were used together. In the last method, DCT and DWT were combined in parallel an...
International Conference on Applied Engineering and Natural Sciences
With the development of computer technologies, manipulations are made on digital images without l... more With the development of computer technologies, manipulations are made on digital images without leaving a clear trace thanks to image processing software. There is a great need for applications to detect forgered images made with malicious intent in many fields such as politics, law, medicine and military. Many studies have been carried out and various algorithms have been developed to detect forgered regions by detecting forgered images. Today, superior methods are developed by combining traditional image forgery techniques with deep learning techniques. In this study, the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) were used together with Convolutional Neural Networks (CNN) to locate the forgered regions of the forgered images. Three different methods were made to locate the forgered region. In the first method, DWT and CNN were used together. In the second method, DCT and CNN were used together. In the last method, DCT and DWT were combined in parallel an...