Skip to main content

Showing 1–5 of 5 results for author: Chennamma, H R

Searching in archive cs. Search in all archives.
.
  1. arXiv:1503.00843  [pdf

    cs.MM cs.CV

    A Survey On Video Forgery Detection

    Authors: Sowmya K. N., H. R. Chennamma

    Abstract: The Digital Forgeries though not visibly identifiable to human perception it may alter or meddle with underlying natural statistics of digital content. Tampering involves fiddling with video content in order to cause damage or make unauthorized alteration/modification. Tampering detection in video is cumbersome compared to image when considering the properties of the video. Tampering impacts need… ▽ More

    Submitted 3 March, 2015; originally announced March 2015.

    Comments: 11 pages, 3 figures, International Journal of Computer Engineering and Applications, Volume IX, Issue II, February 2015

    Journal ref: International Journal of Computer Engineering and Applications, Volume IX, Issue II, pp. 17-27, February 2015

  2. arXiv:1312.6410  [pdf

    cs.CV

    A Survey on Eye-Gaze Tracking Techniques

    Authors: H. R. Chennamma, Xiaohui Yuan

    Abstract: Study of eye-movement is being employed in Human Computer Interaction (HCI) research. Eye - gaze tracking is one of the most challenging problems in the area of computer vision. The goal of this paper is to present a review of latest research in this continued growth of remote eye-gaze tracking. This overview includes the basic definitions and terminologies, recent advances in the field and finall… ▽ More

    Submitted 22 December, 2013; originally announced December 2013.

    Comments: 6 pages, Journal

    Journal ref: Indian Journal of Computer Science and Engineering, ISSN : 0976-5166, Vol. 4, No. 5, Oct-Nov 2013, pp. 388-393

  3. arXiv:1210.8318  [pdf

    cs.CV cs.MM

    Mugshot Identification from Manipulated Facial Images

    Authors: H. R. Chennamma, Lalitha Rangarajan

    Abstract: Editing on digital images is ubiquitous. Identification of deliberately modified facial images is a new challenge for face identification system. In this paper, we address the problem of identification of a face or person from heavily altered facial images. In this face identification problem, the input to the system is a manipulated or transformed face image and the system reports back the determ… ▽ More

    Submitted 31 October, 2012; originally announced October 2012.

    Comments: 8 pages, 5 figures, 1 table, journal. arXiv admin note: substantial text overlap with arXiv:1106.4907

    Journal ref: International Journal of Machine Intelligence, Volume 4, Issue 1, pp. 407, 2012

  4. arXiv:1106.4907  [pdf

    cs.CV

    Face Identification from Manipulated Facial Images using SIFT

    Authors: H. R. Chennamma, Lalitha Rangarajan, Veerabhadrappa

    Abstract: Editing on digital images is ubiquitous. Identification of deliberately modified facial images is a new challenge for face identification system. In this paper, we address the problem of identification of a face or person from heavily altered facial images. In this face identification problem, the input to the system is a manipulated or transformed face image and the system reports back the determ… ▽ More

    Submitted 24 June, 2011; originally announced June 2011.

    Comments: 4 pages, 4 figures, IEEE 3rd International Conference on Emerging Trends in Engineering & Technology (ICETET'2010), Nov 19-21, 2010, Goa, India

  5. arXiv:1105.4712  [pdf

    cs.CV

    Image Splicing Detection Using Inherent Lens Radial Distortion

    Authors: H. R. Chennamma, Lalitha Rangarajan

    Abstract: Image splicing is a common form of image forgery. Such alterations may leave no visual clues of tampering. In recent works camera characteristics consistency across the image has been used to establish the authenticity and integrity of digital images. Such constant camera characteristic properties are inherent from camera manufacturing processes and are unique. The majority of digital cameras are… ▽ More

    Submitted 24 May, 2011; originally announced May 2011.

    Comments: 10 pages, 23 figures, 6 tables, Published in IJCSI

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 6, November 2010, pp. 149-158, ISSN (OnlinePrint): 1694-0814