Image Forensics Techniques for Robust Image Security: A Brief Survey

Authors

  • Harsh Mathur  AISECT UNIVERSITY, Bhojpur, Bhopal, Madhya Pradesh, India
  • Dr. S. Vinadhari  AISECT UNIVERSITY, Bhojpur, Bhopal, Madhya Pradesh, India

Keywords:

Digital Image Tampering, Digital Image Forensic, Image Forgery, Image Authentication, Multimedia Forensics.

Abstract

The rising of Cyber Crime has drawn attention toward Digital Forensics and cyber security. it is a branch of forensic science which deals with cyber crime. It essentially includes the detection, recovery and investigation of material found in digital hardware. Digital images and recordings expect most basic part in digital crime scene investigation. They are the prime affirmations of any cyber-crime scene. So the commitment of the image is basic. Digital Photography is having a fast and constantly developing scattering as of late, since it licenses anyone to take a subjective number of good quality images, rapidly and at no cost, and to store them effortlessly on a significant number of digital support, or share them on the Internet. At the same time, with the wide availability of advanced tools for editing image like (e.g. Adobe Photoshop, Gimp), modifying a digital photo, with little or no obvious signs of tamper¬ing have become also very easy and widespread. A digitally modified image can be vague from a bona fide image. The altering, be that as it may, may bother some fundamental factual properties of the image. Under this assumption there are many different techniques are proposed that quantify and detect statistical perturbations found in different forms of tampered images. In these literature a comparative analysis and performance of some of them has evaluated.

References

  1. A. Dada Warbhe, R. V. Dharaskar and V. M. Thakare, "Digital image forensics: An affine transform robust copy-paste tampering detection," 2016 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, 2016, pp. 1-5.
  2. Meenakshi Sundaram A and C. Nandini, "CBFD: Coherence Based Forgery Detection technique in image forensics analysis," 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, 2015, pp. 192-197.
  3. E. Mohebbian and M. Hariri, "Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images," 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, 2015, pp. 436-440.
  4. F. Zeng, W. Wang, M. Tang and Z. Cao, "Exposing Blurred Image Forgeries through Blind Image Restoration," 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, 2015, pp. 466-469.
  5. D. M. Uliyan, H. A. Jalab and A. W. A. Wahab, "Copy move image forgery detection using Hessian and center symmetric local binary pattern," 2015 IEEE Conference on Open Systems (ICOS), Melaka, 2015, pp. 7-11.
  6. [6] B. Üstübi̇oğlu, S. Ayas, H. Doğan and G. Ulutaş, "Image forgery detection based on Colour SIFT," 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, 2015, pp. 1741-1744.
  7. D. Cozzolino, G. Poggi and L. Verdoliva, "Copy-move forgery detection based on PatchMatch," 2014 IEEE International Conference on Image Processing (ICIP), Paris, 2014, pp. 5312-5316.
  8. M. Zandi, A. Mahmoudi-Aznaveh and A. Mansouri, "Adaptive matching for copy-move Forgery detection," 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014, pp. 119-124.
  9. Fridrich, A. Jessica, B. David Soukal, and A. Jan Lukas. "Detection of copy-move forgery in digital images." in Proceedings of Digital Forensic Research Workshop. 2003.
  10. Prints & Photographs Division Library of Congress. Photo tampering throughout history. URL http://www.fourandsix.com/photo-tampering-history/.
  11. H. Farid. Creating and detecting doctored and virtual images: Implications to the child pornography prevention act. Technical Report TR2004-518, Dartmouth College, September 2004.
  12. I.J. Cox, M. L. Miller, and J. A. Bloom. Digital Watermarking. Morgan Kaufmann Publishers, 2002.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Harsh Mathur, Dr. S. Vinadhari, " Image Forensics Techniques for Robust Image Security: A Brief Survey , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.248-254, September-October-2017.