The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the extensive use of sophisticated image editing software, it has become easy to manipulate digital images without any visually visible clue. Copy-move is a special type of image forgery performed by copying a part of the image and pasting anywhere else in the same image. We proposed a passive image authentication technique to determine the copy-move forgery. First, the method divides the image...
Digital images have easily been forged using different image processing tools. Copy-move is a traditional forgery which a region of an image is copied and pasted in other regions in the same image. Copy-Move Forgery Detection (CMFD) is challenging in some conditions such as blurring, adding noise, rotation and scaling attacks. In this paper an algorithm for CMFD based on blocking technique using Cross...
While seam carving has been widely used in computer vision and multimedia processing, it is also used for tampering illusions. Although several methods have been proposed to detect seam carving-based forgery, to this date, the detection of the seam carving forgery under recompression attacks in JPEG images has not been explored. To fill this gap, we proposed a hybrid large scale feature mining-based...
Digital images have an important function in several fields like journalism, film industry and forensic investigations. Several image editing softwares can change the content of an image very easily. Attackers use contrast enhancement for avoiding the traces left by image forgery. So it is necessary to perform contrast enhancement detection for detecting an image forgery. In the proposed system, there...
Image forgery has become common due to the availability of high-quality image editing softwares. For detecting image forgery there is a need to have important features of the image. For obtaining the image features we need a suitable transform. One of the important and commonly used transform is discrete wavelet transform that can provide spatial and frequency related information of a signal. However,...
Copy move attack, a special type of image forgery, is performed by copying a part of the image and pasting anywhere else in the same image. Besides block-based methods, keypoint-based methods like Scale Invariant Feature Transform (SIFT) are improved for detection of copy move attacks. In this method, firstly image keypoints are extracted and a 128 dimensional feature vector named as SIFT descriptor...
Image tampering detection is important due to many incidences of tampered images misuse. In this paper, we propose a hybrid approach for image tampering detection using range filter and texture descriptor. First we highlights important details of the image using range filtering. The range filter highlights the edges, contours and important details of the objects in an image. Further we apply texture...
Photography is an art. A digital image is a part of the real world formed after cycles of image generation process. From the initial days of photographic images itself, security and authenticity were major issues. With the era of digital images, the process of altering an image became so popular. The supersonic development in this particular field helps a layman to tamper the image effortlessly. Powerful...
It became very easy today to capture and create digital photographs. It's no more a costlier affair, as most of the handheld electronic gadgets such as mobile phones are equipped with digital cameras. Today, there are ample PC and mobile apps available which are developed to manipulate captured photographs. One can easily take a picture, manipulate it with the installed app and make it viral through...
Recently, image forgery has become one of the critical issue in today information security. With easy-to-find and easy-to-use photo editing software, the integrity of an image can be no longer trusted. In this paper, we proposed a novel technique using 2-dimensional cross product in combining two existing image forgery detection techniques: JPEG quantization noise and interpolation based techniques...
Digital images have a very significant role in various fields like medical imaging, journalism, criminal and forensic investigations. Because of the widespread availability of photo editing software and tools, it becomes problematic to use the digital images in applications where their genuineness is of prime importance. Therefore, it is necessary to create forensic techniques which are capable of...
JPEG images are most commonly used in a wide variety of applications. JPEG compression properties can be used for forgery detection in digital images. While performing an intended forgery, the image has to be recompressed. Therefore identifying the traces of recompression can be good clue for detecting manipulation. In this paper, a method to detect forgery in JPEG image is presented and an algorithm...
Splicing is a very common operation performed for image forgery. It involves merging of two or more different images to form a combined image that is significantly different from the original image. In this paper an image splicing detection method based on texture features of spliced image is proposed. The proposed approach calculates grey level run length matrix (GLRLM) texture features for the forged...
In this paper, a copy-move image forgery detection scheme is developed based on a block matching algorithm. Instead of considering spatial blocks, 2D-DWT is performed on the forged image and then DWT domain blocks are considered, where only approximate DWT coefficients are utilized. In order to reduce the computational burden, unlike conventional approaches, instead of performing block matching operation...
This paper proposes an automatic tampering detection algorithm to detect the region duplication forgery on a digital image. This algorithm uses dual spare features and structure similarity to enhance the detection performance of the region duplication. We also create a local outlier detector to recognize the intrinsic repeated elements to avoid the false positive detection. For a quantitative performance...
In this paper, we propose an effective method for detecting linear up-sampling in images. Our method includes three parts. First, we present an algorithm, Resampling Matrix Construction, that automatically derives the resampling matrix for any given resampling factor of fraction. Second, we show an algorithm, Zeroing Mask Derivation, that constructs a zeroing mask for the resampling produced by the...
The luminance of an image is the measurement of the perceived brightness levels. Intuitively, if two images are taken from different cameras with different lighting, some sort of discrepancy may occur in those areas, which were copied and pasted. In particular, analyzing areas in a forged image which are approximately the same distance away from the lens but have different luminance levels. This analysis...
In this paper, we propose a blind copy move image forgery detection method using dyadic wavelet transform (DyWT). DyWT is shift invariant and therefore more suitable than discrete wavelet transform (DWT) for data analysis. First we decompose the input image into approximation (LL1) and detail (HH1) subbands. Then we divide LL1 and HH1 subbands into overlapping blocks and measure the similarity between...
There is various forgeries possible on digital images such as image tampering, copy-move forgery and image compositing. Out of these, copy-move forgery is a type of image forgery, in which a part of original digital image is copied and pasted to another part in the same original image to make it, forged one. This paper describes blind image forensics approach for detecting copy-move forgery. In this...
With advances in image display technology, recapturing good-quality images from the high-fidelity artificial scenery on a LCD screen becomes possible. Such image recapturing posts a security threat, which allows the forgery images to bypass the current forensic systems. In this paper, we first recapture some good-quality photos on different LCD screens by properly setting up the recapturing environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.