Open Access Open Access  Restricted Access Subscription or Fee Access

Advancement in Forensic Analysis of Image Manipulation on Online Social Network

P. Dhanyaja, V. K. Reshma


The Web 3.0 and Social Network Services (SNSs) is reaching quick in several analysis fields. A subsequent consequence is that criminals are running with technology and with extremely subtle methods. Pictures square measure typically concerned in unlawful activities, with it currently being basic to do to establish as much as info on a given image as doable. Large volume of multimedia contents is being transmitted through OSNs. These digital contents are properly processed and used. The key functions are to analyse OSN processes on pictures and characteristics changes happened to it, like JPEG quantization table, pixel resolution and metadata.


Online Social Networks OSN, Digital Forensics, Image Forensics, Quality Factor, Facebook, Pixel Resolution, Metadata.

Full Text:



Roberto Caldelli, Member, IEEE, Rudy Becarelli, and Irene Amerini, Member, IEEE, Image origin classification based on social network provenance in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016.

Tatsuya Chuman, Kenta lida and Hitoshi Kiya,”image manipulation on social media for encryption thgen compression systems,” Asia-Pacific Signal and Information Processing Association Annual Summit and Conference A (PSIPA), 2017.

Castiglione, G. Cattaneo, and A. De Santis, “A forensic analysis of images on online social networks,” in Intelligent Networking and Collaborative Systems (INCoS), 2011 Third International Conference on, Nov 2011, pp. 679–684.

N. Khanna, G. T.-C. Chiu, J. P. Allebach, and E. J. Delp, “Forensic tech- niques for classifying scanner, computer generated and digital camera images,” in Proc. of IEEE ICASSP, Las Vegas, USA, 2008.

Jang, Y. J., Kwak, J.: Digital forensics investigation methodology applicable for social network services. Multimedia Tools and Applications (2014): 1-12.

Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from JPEG headers. IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 10661075, Sep. 2011.

Kee, E., Farid, H.: Digital image authentication from thumbnails. Proceedings of SPIE, vol. 7541. Jan. 2010.

Camera & Imaging Products Association: Standardization Committee - Ex- changeable image file format for digital still cameras: Exif Version 2.3 - E C.pdf.

Battiato, S., Messina G.: Digital forgery estimation into DCT domain: A critical analysis. Proceedings of ACM Workshop on Multimedia Forensics (MiFor), 2009, pp. 3742.

M. Moltisanti, A. Paratore, S. Battiato, and L. Saravo, Image Analysis and Processing — ICIAP 2015: 18th International Conference, Genoa, Italy, September 7-11, 2015, Proceedings, Part II. Cham: Springer International Publishing, 2015, ch. Image Manipulation on Facebook for Forensics Evidence, pp. 506–517.

J. Luk´as, J. J. Fridrich, and M. Goljan, “Digital camera identificationfrom sensor pattern noise,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205–214, 2006.

Stamm, M.C, Wu, M., Liu, K.J.R.: Information forensics: An overview of the first decade. IEEE Access, vol. 1, pp. 167200, May 2013.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.