Open Access Open Access  Restricted Access Subscription or Fee Access

Automatic Detection of Forged Images

S. Manimurugan, Neenu Sebastian

Abstract


Digital Technology has matured to become predominant technology for creating, processing, transmitting and storing a information, a form of knowledge and intellectual assets. Digital image forgery is a growing problem in criminal cases and in public discourse. Photographic fakes can be used to promote a magazine story, defame a political opponent, or other objectives. Digital image forensic tools are helping to investigate and solve crimes. Realizing that it might be impossible to develop a method that is universal for all kinds of images and JPEG is the most frequently used image format, here an approach that can detect doctored JPEG images is proposed. In the proposed method the difference in the JPEG compression qualities within the forged image is used for detecting the forgery performed. Finally, automatic tampering detection and location of tampered region are fulfilled by image segmentation.

Keywords


Digital Forgeries, Segmentation, JPEG Ghost, Global Thersholding

Full Text:

PDF

References


S. Ye, Q. Sun, and E. Chang, “Detecting digital image forgeries by measuring inconsistencies of blocking artifact,” in 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 12–15.

Hany Farid, “Exposing digital forgeries in color filter array interpolated images,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3948–3959, 2005.

J. He, Z. Lin, L. Wang, and X. Tang, “Detecting doctored JPEG images via DCT coefficient analysis,” in European Conference on Computer Vision, Graz, Austria, 2006.

J. Fridrich, D. Soukal, and J. Luk´a˘s, “Detection of copy-move forgery in digital images,” in Proceedings of Digital Forensic Research Workshop, August 2003

M. K. Johnson and H. Farid, “Exposing digital forgeries by detecting inconsistencies in lighting,” in ACM Multimedia and Security Workshop, 2005.

A.C.Popescu and H. Farid, “Exposing digital forgeries by detecting traces of re-sampling,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 758–767, 2005.

Hany Farid, “Exposing Digital Forgeries from JPEG Ghosts”, IEEE Transactions on Information Forensics and Security, vol. 4,Issue 1, pp. 154-160,2009

R. C. Gonzalez and R. E. Woods, Digital Image Processing 2nd ed.,Prentice Hall, Upper Saddle Rive, NJ, 2002.

Chih-Ming Kung, Shu-Tsung Chao,Yen-Chen Tu, Yu-Hua Yan, Chih-Hsien Kung,” A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application” in JOURNAL Of Multimedia, VOL. 4, NO. 3, June 2009.

Zhi Zhou, Arce, G.R., Di Crescenzo, G.,”Halftone visual cryptography” in IEEE transcations on imageprocessing ,volume 15 ,Issue 8,pp.2441-2453,August 2006.

Upmanyu, M,Namboodiri, A.M,Srinathan, K, Jawahar, C.V,” Blind Authentication: A Secure Crypto-Biometric Verification Protocol” in IEEE Transactions on Information Forensics and Security,volume 5,Issue 2,pp.255-268,June 2010.

H. Farid, “Digital image ballistics from JPEG quantization,” Department of Computer Science, Dartmouth College, Tech. Rep. TR2006-583, 2006.

Hany Farid, “Exposing digital forgeries through specular highlights on the eye,” in 9th International Workshop on Information Hiding, Saint Malo, France, 2007.

A.C.Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Department of Computer Science, Dartmouth College, Tech. Rep. TR2004-515, 2004.

W. Luo, Z. Qu, J. Huang, and G. Qiu, “A novel method for detecting cropped and recompressed image block,” in IEEE Conference on Acoustics, Speech and Signal Processing, pp. 217–220,2007.

S. Ye, Q. Sun, and E. Chang, “Detecting digital image forgeries by measuring inconsistencies of blocking artifact,” in 2007 IEEE International Conference on Multimedia and Expo, pp. 12–15,2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.