Research Article

Proving Reliability of Image Processing Techniques in Digital Forensics Applications

Listing 6

Encoding binary image of Figure 2.
[B{0, 0, black}; B{0, 1, white}; B{0, 2, white; B0, 3, black};
B{1, 0, black}; B{1, 1, black}; B{1, 2, white}; B{1, 3, black}; B{2, 0, black}; B{2, 1, white}; B{2, 2, black}; B{2, 3, black};
B{3, 0, black}; B{3, 1, white}; B{3, 2, white}; B{3, 3, black}].
[B{0, 0, 1}; B{0, 1, 0}; B{0, 2, 0}; B{0, 3, 1};
B{1, 0, 1}; B{1, 1, 1}; B{1, 2, 0}; B{1, 3, 1};
B{2, 0, 1}; B{2, 1, 0}; B{2, 2, 1}; B{2, 3, 1};
B{3, 0, 1}; B{3, 1,0}; B{3, 2, 0}; B{3, 3, 1}].