Study and Investigation of Tampering Detection Methods Based on Image Hashing

Authors(2) :-V. Sumathi, Dr. V. Anuradha

Technology is growing at outstanding speed. There are numerous ways to be had to govern digital visible content material. This leads people to manipulate images quite simply and fast. When the image cannot be distinguished best by way of visible exam, some felony troubles may stand up. The image this is dispatched on the destination over the network need to be similar to at the supply facet. However it's far very difficult to trust at the received contents without any take a look at, particularly inside the areas where the source image is unknown and one has to use data that is available about the image best. images are considered to be the maximum powerful and sincere media of expression. For a long term, those were typical as proves of evidences in numerous fields which include journalism, forensic investigations, army intelligence, scientific research and guides, crime detection and criminal proceedings, investigation of coverage claims, medical imaging and so forth. As a result, images have almost misplaced their reliability and place as proves of evidences in all fields. This is why digital image tamper detection has emerged as important research vicinity to set up the authenticity of digital pix with the aid of separating the tampered lots from the authentic ones. On this paper, various methods of tampering the image are mentioned and the various detection techniques are surveyed. Subsequently, concluded the comparative take a look at with a few parameters.

Authors and Affiliations

V. Sumathi
Research Scholar, Department of Computer Science, Sree Saraswathi Thyagaraja College, Pollachi, Tamil Nadu, India
Dr. V. Anuradha
Head (PG), Department of Computer Science, Sree Saraswathi Thyagaraja College, Pollachi, Tamil Nadu, India

Image, Tampering, Detection, Active, Passive, Photographs.

  1. S. Battiato, G. M. Farinella, E. Messina,G. Puglisi, "Robust Image Alignment for Tampering Detection, IEEE Transactions On Information Forensics And Security, Vol. 7, No. 4, August 2012.
  2. S. Battiato, G.M. Farinella, E.Messina, And G. Puglisi, "Robust Image Registration And Tampering Localization Exploiting Bag Of Features Based Forensic Signature," In Proc. ACM Multimedia (Mm’11), 2011.
  3. S. Xiang, H. J. Kim and J. Huang, Histogram-based image hashing scheme robust against geometric deformations, Proc. of the ACM Multimedia and Security Workshop, ACM Press, 2007, pp. 121-128.
  4. S. S. Kozat, K. Mihcak and R. Venkatesan, Robust perceptual image hashing via matrix invariants, Proc. of IEEE Conference on Image Processing (lCIP'04), Singapore, Oct. 24-27, 2004, pp. 3443-3446.
  5. V. M. Potdar, S. Han and E. Chang, "A Survey of Digital Image Watermarking Techniques", 2005 3rd IEEE International Conference on Industrial Informatics (INDIN).
  6. T.-Y. Lee, S.-D. Lin.: Dual Watermark for Image Tamper Detection and Recovery. In Pattern Recognition 41 pp. 3497--3506. (2008).
  7. Henry Farid "Image forgery detection survey " , IEEE SIGNAL PROCESSING MAGAZINE, March 2009. 2] M.Ali Qureshi, M. Deriche "A review on copy move forgery detection techniques" IEEE 2014.
  8. N.Anantharaj "Tampering and Copy move forgery detection using shift Feature, 2014.
  9. Sahar Qasim Seleh," Tampering and Copy move Forgery Detection using shiftfeature"2012.
  10. V. Christlen,C. Riess, J.Jordan,C.Riess, and E.Anegelopouou "An Evaluation of popular Copy Move Forgery detection approach" Dec, 2012 19] R.Achanta , A. Shaji, K. Smith, A. Lucchi, P.Fua, and S. Susstrunk,"SLICsuperpixel compared to stateof the arts superpixelmethod", 2012 20] I. Amerini, L. Ballan,R.Caldelli, A. Del Bimbo,AND g. Serra, "A State based forensic method for copy move attack detection and transformation recovery",2011.
  11. Tong, Xiaojun, et al. "A novel chaos-based fragile watermarking for image tampering detection and self-recovery." Signal Processing: Image Communication 28.3 (2013): 301-308.
  12. Dadkhah, Sajjad, et al. "An effective SVD-based image tampering detection and self-recovery using active watermarking." Signal Processing: Image Communication 29.10 (2014): 1197-1210.
  13. W. Lu, A. L. Varna, and M. Wu, "Forensic hash for multimedia information," in Proc. SPIE Electronic Imaging Symp.—Media Forensics Security, 2010.
  14. W. Lu and M.Wu, "Multimedia forensic hash based on visual words," in Proc. IEEE Computer Soc. Int. Conf. Image Processing, 2010, pp.989-992.
  15. S. Roy and Q. Sun, "Robust hash for detecting and localizing image tampering," in Proc. IEEE Computer Soc. Int. Conf. Image Processing, 2007, pp. 117-120.
  16. N. Khanna, A. Roca, G. T.-C. Chiu, J. P. Allebach, and E. J. Delp, "Improvements on image authentication and recovery using distributed source coding," in Proc. SPIE Conf. Media Forensics Security, 2009, vol. 7254, p. 725415.
  17. J. Fridrich and M. Goljan, Robust hash functions for digital watermarking, IEEE Proceedings International Conference on Information Technology: Coding and Computing, pp.178-183, 2000.
  18. F. Lefebvre, J. Czyz, and B. Macq, A robust soft hash algorithm for digital image signature, Proceedings of International Conference on Image Processing, vol. 2, pp. 14-17, September 2003: II - 495-8.
  19. E. L. Lehmann and J. P. Romano, Testing Statistical Hypotheses, 3rd ed., New York, USA, Springer, pp. 590-599, 2005.
  20. Bianco, S., Mazzini, D., Pau, D., Schettini, R.: Local detectors and compact descriptors for visual search: a quantitative comparison. Digital Signal Process. 44, 1-13 (2015).
  21. Jegou, H., Perronnin, F., Douze, M., Sánchez, J., Pérez, P., Schmid, C.: Aggregating local descriptors into a compact codes. IEEE Trans. Pattern Anal. Mach. Intell. 34(9), 1704-1716 (2012).
  22. Janan, F., Brady, M.: Shape description and matching using integral invariants on eccentricity transformed images. Int. J. Comput. Vis. 113(2), 92-112 (2015

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 440-446
Manuscript Number : CSEIT1726139
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

V. Sumathi, Dr. V. Anuradha, "Study and Investigation of Tampering Detection Methods Based on Image Hashing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.440-446, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT1726139

Article Preview

Follow Us

Contact Us