DESIGN AND IMPLEMENTATION OF PYTHON IMAGE FORGERY DETECTION USING MD5 AND OPENCV

ABSTRACT

Following the explosion of social networking services, there has been a monumental increase in the volume of image data. Moreover, the development in image processing software such as Adobe Photoshop has given a rise to doctored images. Such doctored images can be used for malicious purposes such as spreading false information and inciting violence. This image forgery detection project allows users to detect even the slightest signs of forgery in an image. This project is developed using the Django framework with Python as programming language.

 

TABLE OF CONTENT
Title Page- – – – – – – – – – – -i
Approval Page- – – – – – – – – – -ii
Certification Page- – – – – – – – – -iii
Dedication- – – – – – – – – – – -iv
Acknowledgement- – – – – – – – – -v
Abstract- – – – – – – – – – – -vi

CHAPTER ONE
1.1. Background of the Study- – – – – – – -1
1.2. Statement of the Problem- – – – – – – -3
1.3. Objectives of the Study- – – – – – – – -4
1.4. Scope of the Study- – – – – – – – -5
1.5. Limitations- – – – – – – – – – -5
1.6. Significance of the Study- – – – – – – -5
1.7. Definition of Terms- – – – – – – – -6

CHAPTER TWO
2.1. Literature review- – – – – – – -9
2.2.   Review of Related Literature – – -15
2.3.  Summary of Literature Review- – – – -18

CHAPTER THREE
3.1. Source of Data- – – – – – – – – -27
3.2. Methods of Data Collection- – – – – – – -28
3.2.1 Oral Interview- – – – – – – – – -28
3.2.2 Study of Manuals- – – – – – – – -28
3.2.3 Evaluation Forms- – – – – – – – -28
3.3 The Existing System- – – – – – – – -28
3.4. Input Analysis- – – – – – – – – -29
3.5. Process Analysis- – – – – – – – – -30
3.6. Output Analysis- – – – – – – – – -30
3.7. Weakness of the Existing System- – – – – – -31
3.8. Justification for the New System- – – – – – -32

CHAPTER FOUR
4.1. Output Specification and Design- – – – – – -33
4.2. Input Specification and Design- – – – – – – -33
4.3. File Design- – – – – – – – – – -34
4.5. Procedure Chart- – – – – – – – – -37
4.6. Program Flowchart- – – – – – – – -38
4.7. Choice of Programming Language- – – – – – -39
4.8. Hardware and Operating System Requirement- – – – -39

CHAPTER FIVE
5.1. Summary- – – – – – – – – – -41
5.2 Problems Encountered and Recommendations- – – – -42
5.3 Conclusion- – – – – – – – – -43
References- – – – – – – – – – -44

DESIGN AND IMPLEMENTATION OF PYTHON IMAGE FORGERY DETECTION USING MD5 AND OPENCV

Post a comment

Your email address will not be published.

Related Posts