Image Forensics Techniques for Robust Image Security: A Brief Survey

Authors(2) :-Harsh Mathur, Dr. S. Vinadhari

The rising of Cyber Crime has drawn attention toward Digital Forensics and cyber security. it is a branch of forensic science which deals with cyber crime. It essentially includes the detection, recovery and investigation of material found in digital hardware. Digital images and recordings expect most basic part in digital crime scene investigation. They are the prime affirmations of any cyber-crime scene. So the commitment of the image is basic. Digital Photography is having a fast and constantly developing scattering as of late, since it licenses anyone to take a subjective number of good quality images, rapidly and at no cost, and to store them effortlessly on a significant number of digital support, or share them on the Internet. At the same time, with the wide availability of advanced tools for editing image like (e.g. Adobe Photoshop, Gimp), modifying a digital photo, with little or no obvious signs of tamper¬ing have become also very easy and widespread. A digitally modified image can be vague from a bona fide image. The altering, be that as it may, may bother some fundamental factual properties of the image. Under this assumption there are many different techniques are proposed that quantify and detect statistical perturbations found in different forms of tampered images. In these literature a comparative analysis and performance of some of them has evaluated.

Authors and Affiliations

Harsh Mathur
AISECT UNIVERSITY, Bhojpur, Bhopal, Madhya Pradesh, India
Dr. S. Vinadhari
AISECT UNIVERSITY, Bhojpur, Bhopal, Madhya Pradesh, India

Digital Image Tampering, Digital Image Forensic, Image Forgery, Image Authentication, Multimedia Forensics.

  1. A. Dada Warbhe, R. V. Dharaskar and V. M. Thakare, "Digital image forensics: An affine transform robust copy-paste tampering detection," 2016 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, 2016, pp. 1-5.
  2. Meenakshi Sundaram A and C. Nandini, "CBFD: Coherence Based Forgery Detection technique in image forensics analysis," 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, 2015, pp. 192-197.
  3. E. Mohebbian and M. Hariri, "Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images," 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, 2015, pp. 436-440.
  4. F. Zeng, W. Wang, M. Tang and Z. Cao, "Exposing Blurred Image Forgeries through Blind Image Restoration," 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, 2015, pp. 466-469.
  5. D. M. Uliyan, H. A. Jalab and A. W. A. Wahab, "Copy move image forgery detection using Hessian and center symmetric local binary pattern," 2015 IEEE Conference on Open Systems (ICOS), Melaka, 2015, pp. 7-11.
  6. [6] B. Üstübi̇oğlu, S. Ayas, H. Doğan and G. Ulutaş, "Image forgery detection based on Colour SIFT," 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, 2015, pp. 1741-1744.
  7. D. Cozzolino, G. Poggi and L. Verdoliva, "Copy-move forgery detection based on PatchMatch," 2014 IEEE International Conference on Image Processing (ICIP), Paris, 2014, pp. 5312-5316.
  8. M. Zandi, A. Mahmoudi-Aznaveh and A. Mansouri, "Adaptive matching for copy-move Forgery detection," 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 119-124.
  9. Fridrich, A. Jessica, B. David Soukal, and A. Jan Lukas. "Detection of copy-move forgery in digital images." in Proceedings of Digital Forensic Research Workshop. 2003.
  10. Prints & Photographs Division Library of Congress. Photo tampering throughout history. URL http://www.fourandsix.com/photo-tampering-history/.
  11. H. Farid. Creating and detecting doctored and virtual images: Implications to the child pornography prevention act. Technical Report TR2004-518, Dartmouth College, September 2004.
  12. I.J. Cox, M. L. Miller, and J. A. Bloom. Digital Watermarking. Morgan Kaufmann Publishers, 2002.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 248-254
Manuscript Number : CSEIT172557
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Harsh Mathur, Dr. S. Vinadhari, "Image Forensics Techniques for Robust Image Security: A Brief Survey ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.248-254, September-October-2017. |          | BibTeX | RIS | CSV

Article Preview