Fast Legendre Moments in Securing Digital Image
K. Alice Suresh1, S. Thirunavukkarasu2, P. Kavitha3

1K. Alice Suresh, Assistant Professor, Department of Information Technology, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.

2S. Thirunavukkarasu, Department of Information Technology, Bharath Institute of Higher Education and Research, Tambaram (Tamil Nadu), India.

3P. Kavitha, Department of Information Technology, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.

Manuscript received on 11 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 26 December 2019 | PP: 1008-1011 | Volume-8 Issue-12S October 2019 | Retrieval Number: K127810812S19/2019©BEIESP | DOI: 10.35940/ijitee.K1278.10812S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Moments are set of values used to describe the information contained in the image. In this paper the content of the image is represented with the help of fast legendre moments. Legendre moments has the advantage that these moments are calculated exactly without any loss in information while other moments like geometric moments, zernike moments etc suffer from approximation errors and geometric error when applied to digital images. Legendre moments are also more suitable for image reconstruction. Experimental results show that the proposed system is very efficient in computing moments at much faster time than the Zernike moments since fast legendre moments calculates the moments as two ID function rather as a 2D function of a digital image and the results of reconstruction in case of tampering is also shown.

Keywords: Legendre Moments, Zernike Moments, Image Forgery, Image Reconstruction, Image Representation, Image Security.
Scope of the Article: Image Security