A Review of Image Forgery Techniques

Similar documents
FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Introduction to Video Forgery Detection: Part I

Image Forgery Detection Using Svm Classifier

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

Sapna Sameriaˡ, Vaibhav Saran², A.K.Gupta³

Format Based Photo Forgery Image Detection S. Murali

An Automatic JPEG Ghost Detection Approach for Digital Image Forensics

Passive Image Forensic Method to detect Copy Move Forgery in Digital Images

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Forgery Detection using Noise Inconsistency: A Review

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012

Tampering and Copy-Move Forgery Detection Using Sift Feature

Camera identification from sensor fingerprints: why noise matters

Correlation Based Image Tampering Detection

Neuro-Fuzzy based First Responder for Image forgery Identification

Image Manipulation Detection using Convolutional Neural Network

Survey On Passive-Blind Image Forensics

S SNR 10log. peak peak MSE. 1 MSE I i j

IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Exposing Image Forgery with Blind Noise Estimation

Exposing Digital Forgeries from JPEG Ghosts

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Different-quality Re-demosaicing in Digital Image Forensics

Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Literature Survey on Image Manipulation Detection

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

Wavelet-based Image Splicing Forgery Detection

Hiding Image in Image by Five Modulus Method for Image Steganography

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Multimedia Forensics

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Tampering Detection Algorithms: A Comparative Study

Image Forgery Identification Using JPEG Intrinsic Fingerprints

PoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2

Watermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

ECC419 IMAGE PROCESSING

Colored Digital Image Watermarking using the Wavelet Technique

IMAGE COMPOSITE DETECTION USING CUSTOMIZED

Image Extraction using Image Mining Technique

Laser Printer Source Forensics for Arbitrary Chinese Characters

An Integrated Image Steganography System. with Improved Image Quality

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

Convolutional Neural Network-based Steganalysis on Spatial Domain

IMAGE SPLICING FORGERY DETECTION AND LOCALIZATION USING FREQUENCY-BASED FEATURES

Scanner Identification Using Sensor Pattern Noise

Exposing Photo Manipulation with Geometric Inconsistencies

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

WITH the rapid development of image processing technology,

Sterilization of Stego-images through Histogram Normalization

Images and Graphics. 4. Images and Graphics - Copyright Denis Hamelin - Ryerson University

SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries

Digital Watermarking Using Homogeneity in Image

Image Forgery Detection: Developing a Holistic Detection Tool

Source Camera Model Identification Using Features from contaminated Sensor Noise

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Copy-Move Image Forgery Detection using SVD

Keywords: - Gaussian Mixture model, Maximum likelihood estimator, Multiresolution analysis

Human Authentication from Brain EEG Signals using Machine Learning

DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES

Digital Image Forgery Identification Using Motion Blur Variations as Clue

CS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

Determination of the MTF of JPEG Compression Using the ISO Spatial Frequency Response Plug-in.

DIAGNOSIS OF STATOR FAULT IN ASYNCHRONOUS MACHINE USING SOFT COMPUTING METHODS

Exposing Image Splicing with Inconsistent Local Noise Variances

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Information Forensics: An Overview of the First Decade

PHOTO ANALYSIS SOFTWARE

General-Purpose Image Forensics Using Patch Likelihood under Image Statistical Models

Retrieval of Large Scale Images and Camera Identification via Random Projections

Resampling and the Detection of LSB Matching in Colour Bitmaps

International Journal of Advance Research in Computer Science and Management Studies

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification

Application of Histogram Examination for Image Steganography

Fragile Sensor Fingerprint Camera Identification

Locating Steganographic Payload via WS Residuals

An Implementation of LSB Steganography Using DWT Technique

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

A Watermark for Image Integrity and Ownership Verification

Filtering and Reconstruction System for Gray Forensic Images

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network

Forensic Classification of Imaging Sensor Types

Content Based Image Retrieval Using Color Histogram

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Image Manipulation Detection Using Sensor Linear Pattern

On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts

COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee

Reducing of Colors in Digital Images by Using (Kohonen) Artificial Neural Networks

Steganalysis by Subtractive Pixel Adjacency Matrix

CERIAS Tech Report

Transcription:

A Review of Image Forgery Techniques Hardish Kaur, Geetanjali Babbar Assistant professor, CGC Landran, India. ABSTRACT: Image forgery refer to copying and pasting contents from one image into another image. This procedure is quite common now these days. This process is done to earn money in a wrong way and to hide the originality of the image. This paper focuses on the methods of detection of the image forgery and the aspects of the image forgery. This paper also focuses on the classification methods of the image forgery. KEYWORDS: IMAGE FORGERY, IMAGE PROCESSING, CLASSIFICATION I. INTRODUCTION The trustworthiness of photographs has an essential role in many areas, including: forensic investigation, criminal investigation, surveillance systems, intelligence services, medical imaging, and journalism. The art of making image fakery has a long history. But, in today s digital age, it is possible to very easily change the information represented by an image without leaving any obvious traces of tampering. Despite this, no system yet exists which accomplishes effectively and accurately the image tampering detection task.the digital information revolution and issues concerned with multimedia security have also generated several approaches to digital forensics and tampering detection. Generally, these approaches could be divided into active and passive blind approaches. The area of active methods simply can be divided into the data hiding approach (e.g., watermarks) and the digital signature approach. We focus on blind methods, as they are regarded as a new direction and in contrast to active methods, they work in absence of any protecting techniques and without using any prior information about the image. To detect the traces of tampering, blind methods use the image function and the fact that forgeries can bring into the image specific detectable changes (e.g., statistical changes).when digital watermarks or signatures are not available, the blind approach is the only way how to make the decision about the trustworthiness of the investigated image. Image forensics is a burgeoning research field and promise a significant improvement in forgery detection in the never ending competition between image forgery creators and image forgery detectors.the example in Figure shows two digital images. The left image was printed by several news sources in an article about a mysterious giant-sized hogzilla [19]. While the authenticity of the image is unknown, with very little skill a forged version was digitally created using the computer software Adobe Photoshop. It is very hard, if impossible, for the human eye to detect digital manipulation at face value. This is just one example of the need for a tool to aid in the detection of digital image tampering. The research in this thesis attempts to address this need and provide some insight into this challenging problem Copyright to IJIRCCE www.ijircce.com 4846

Local Binary Pattern. LBP is a kind of gray-scale imageure operator which is usedfor describing the spatial structure of the image imageure. The imageure T in a localneighborhood of a gray scale image can be defined as the joint distribution of the graylevels of P(P > 1) image pixels using the following equation where p is the total number of pixels in asset and t is the local binary pattern I the same image. T= gc(t0,t1 tp-1) With techniques available to protect an original image from tampering, the reverse scenario raises concern of verifying the authenticity of an image of unknown origin. This is an increasingly important issue as digital cameras come down in price and ease of use of powerful image processing software, i.e. Adobe Photoshop and GIMP (GNU Image Manipulation Program), become more widely available [15]. In fact, GIMP is freely available on the web and is a viable alternative to Adobe Photoshop. Most of the image manipulations discussed in this thesis can be performed using GIMP. With increasing opportunities and ease to digitally manipulate images, the research community has its work cut out.the state of the art in Copyright to IJIRCCE www.ijircce.com 4847

research in digital image forensics currently focuses on digital watermarking and variations of this, as previously discussed. Research conducted on image authentication in the absence of any digital watermarking scheme is still in its infancy stages [9] [12]. II. CLASSIFIERS IN THE PROCESS OF IMAGE TEMPERING A. Support Vector Machine (SVM) Support vector machine classifier is used to make segments of selected data on the basis of emotions and simple image. Input data is presented in two sets of vectors in n-dimensional space, a separate hyper-plane is constructed in space due to which margin between two data sets maximize. Figure represent s the SVM classifier Kernel Function: During training a user need to define four standard kernels as following. A kernel function use of parameters such as γ, c, and degree that defined by user during training. Copyright to IJIRCCE www.ijircce.com 4848

A. NAÏVE BAYES CLASSIFIER Naïve Bayes is used as image classifier because of its simplicity and effectiveness. Simple( naive )classifica1onmethodbased on Bayesrule [7]. The Bayes rule is applied on document for the classification of image. The rule which is following is: This rule is applied for a document d and a class c. probability of A happening given to B can be find with the probability of B given to A. this algorithm work on the basis of likelihood in which probability of document B is same as frequency of words in A.on the basis of words collection and frequencies a category is represented. We can define frequency of word is number of time repetition in document define frequency of that word. We can assume n number of categories from C 0 to C n-1. Determining which category a document D is most associated with means calculating the probability that document D is in category C i, written P(C i D), for each category C i. Using the Bayes Rule, you can calculate P(C i D) by computing: P(C i D) = ( P(D C i ) * P(C i ) ) / P(D) P(C i D) is the probability that document D is in category C i ; in document D bag of words is given by probability, which create in category C i. P(D C i ) is the probability that for a given category C i, the words in D appear in that category. P(C i ) is the probability of a given category; that is, the probability of a document being in category C i without considering its contents. P(D) is the probability of that specific document occurring. We can classify image with procedure that required using above discussed parameters is as following: III. BACK PROPAGTION NEURAL NETWORK A bpa neural network (BPANN) is a feed-forward, artificial neural network that has more than one layer of hidden units [7] between its inputs and its outputs. Each hidden unit, j, typically uses the logistic function1 to map its total input from the layer below, xj, to the scalar state, yj that it sends to the layer above. y j = logistic(xj) =1/1 + e xj, x j = bj + y i w ij where bj is the bias of unit j, i is an index over units in the layer below, and wij is a the weight on a connection to unit j from unit i in the layer below. For multiclass classification, output unit j converts its total input, xj, into a class probability, pj. Copyright to IJIRCCE www.ijircce.com 4849

IV. CONCLUSION The above paper classifies the ways of image tempering and classification methods and the ways of classification using different classifiers. The paper also describes a comparative study of the Support Vector Machines, Naïve Bayes Classification and the Neural Network Classification methods. The future research workers may use one of the above classification methods or a combination of the above classification methods. REFERENCES 1. JPEG2000, TheFreeDicitionarydotcom. August 18, 2004.http://encyclopedia.thefreedictionary.com/JPEG%202000. 2. Myths & Facts about JPEG, Graphics Software at About.com. August 18, 2004.http://graphicssoft.about.com/library/weekly/aa0104jpegmyths.htm. 3. What is Wavelet Analysis? Wavelet Toolbox Documentation. MATLABversion 6.5. The MathWorks, Inc. 2002. 4. Associated Press, Britain Says Soldier Held in Photo Probe. Newsday May 18, 2004. http://www.newsday.com/news/nationworld/world/wire/sns-ap-britainprisoner-abuse,0,4827144.story?coll=sns-ap-world-headlines. 5. Baxes, G. A., Digital Image Processing : Principles and Applications. New York: John Wiley & Sons, Inc, 1994. 6. Brinkmann, R., The Art and Science of Digital Compositing. San Diego:Academic Press, 1999. 7. Chandramouli, R., N. Memon, and M. Rabbani, Encyclopedia of Imaging Scienceand Technology: Digital Watermarking. J. Hornak, Editor. John Wiley, October2001. 8. Fan, Z. and R. L. de Queiroz, Identification of Bitmap Compression History:JPEG Detection and Quantizer Estimation, IEEE Transactions on ImageProcessing, Vol. 12, No. 2: 230-235, February 2003. 9. Farid, H. and A. Popescu, Exposing Digital Forgeries by Detecting Traces of Resampling. Proceedings of the IEEE Transactions on Signal Processing. (In Press). 2004. 10. Fridrich, J., R. Du, and M. Goljan, Steganalysis Based on JPEG Compatibility, Special session on Theortical and Practical Issues in Digital Watermarking and Data Hiding, Multimedia Systems and Applications IV. Pp. 275-280. Denver, CO,August 2001. 11. Fridrich, J. and J. Lukas, Estimation of Primary Quantization Matrix in DoubleCompressed JPEG Images. Proceedings of DFRWS 2003. Cleveland, OH,August 2003. 12. Fridrich, J., J. Lukas, and D. Soukal, Detection of Copy-Move Forgery in DigitalImages. Proceedings of DFRWS 2003. Cleveland, OH, August 2003.\ 13. Guggenheim, K. New Prison Abuse Photos Outrage Lawmakers. PhillyburbsMay 13, 2004. http://www.phillyburbs.com/pb-dyn/news/27-05132004-299158.html. 14. Johnson, R. C. JPEG2000 Wavelet Compression Spec Approved, August 18,2004. http://www.us.design-reuse.com/news/news1917.html. 15. Katzenbeisser, S. and F. Petitcolas, A.P. Information Hiding techniques forsteganography and digital watermarking. Boston: Artech House, 2000. 16. Klasen, L. Image Sequence Analysis of Complex Objects. PhD dissertation.linkoping University, Sweden, 2002. 17. Lukas, J. Digital Image Authentication Using Image Filtering Techniques. Proceedings of 15th Conference of Scientific computing "Algoritmy 2000",Vysoke Tatry-Podbanske, Slovakia, September 2000. 18. Luong C. M. Introduction to Computer Vision and Image Processing, Department of Pattern Recognition and Knowledge Engineering, Institute ofinformation Technology, Hanoi, Vietnam, May 4, 2004.http://www.netnam.vn/unescocourse/computervision/computer.htm. 19. Minor, E. (Associated Press) Hogzilla! Huge pig has small town talking, but is ita hoax? San Jose Mercury News, July 29, 2004. sec. 3A. 20. Sachs, J. Digital Image Basics. Digital Light & Color. 1999. 21. Saha, S. Image Compression from DCT to Wavelets: A Review, May 28,2004 http://www.acm.org/crossroads/xrds6-3/sahaimgcoding.html. Copyright to IJIRCCE www.ijircce.com 4850