Patrick Niyishaka

Patrick Niyishaka
University of Hyderabad | UoH · Department of Computer & Information Sciences

About

5
Publications
2,301
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
61
Citations
Citations since 2017
5 Research Items
61 Citations
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
2017201820192020202120222023051015202530
Additional affiliations
May 2004 - July 2008
MFI office solutions
Position
  • Technician
Description
  • Imagigng technician.
Education
August 2008 - May 2013
Annamalai University
Field of study
  • Software Engineering

Publications

Publications (5)
Article
Full-text available
A copy-move forgery is a passive tampering wherein one or more regions have been copied and pasted within the same image. Often, geometric transformations, including scale, rotation, and rotation+scale are applied to the forged areas to conceal the counterfeits to the copy-move forgery detection methods. Recently, copy-move forgery detection using...
Article
Full-text available
A Copy-create digital image forgery is image tampering that merges two or more areas of images from different sources into one composite image; it is also known as image splicing. Excellent forgeries are so tricky that they are not noticeable to the naked eye and don't reveal traces of tampering to traditional image tamper detection techniques. To...
Article
Full-text available
One of the most frequently used types of digital image forgery is copying one area in the image and pasting it into another area of the same image; this is known as the copy-move forgery. To overcome the limitations of the existing Block-based and Keypoint-based copy-move forgery detection methods, in this paper, we present an effective technique f...
Chapter
Full-text available
Copy–Move forgery or Cloning is image tampering or alteration by copying one area in an image and pasting it into another area of the same image. Due to the availability of powerful image editing software, the process of malicious manipulation, editing and creating fake images has been tremendously simple. Thus, there is a need of robust PBIF (Pass...

Network

Cited By

Projects

Project (1)