This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* Source: | |
| https://www.kaggle.com/nasa/astronaut-yearbook | |
| */ | |
| CREATE TABLE astronauts( | |
| Name TEXT PRIMARY KEY, | |
| Year INTEGER, | |
| GroupNum INTEGER, | |
| Status TEXT, | |
| Birth_Date TEXT, | |
| Birth_Place TEXT, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Tampering is the act of altering something secretly or improperly. | |
| TODAY’S TECHNOLOGY ALLOWS DIGITAL MEDIA TO BE ALTERED AND MANIPULATED IN WAYS THAT WERE SIMPLY IMPOSSIBLE. | |
| With the increasing applications of digital imaging, different types of software tools are introduced for processing images and photographs. | |
| They are used to make forged images to make it look real or objects can be added or deleted. | |
| TYPES OF IMAGE FORGERY are Image Retouching,Image splicing or photomontage, Copy-Move Attack | |
| Image Retouching: In case of image retouching original image does not significantly changes, but there is enhancement or reduces certain feature of original image | |
| Image splicing or photomontage:This technique for making forgery images is more aggressive than image retouching. Image splicing is fundamentally simple process and can be done as crops and pastes regions from the same or separate sources. | |
| Copy-Move Attack:The copy move forgery is popular as one of the diffic |