A Review on Image Forgery and Its Detection  
  Authors : Arun Anoop M

 

Image have been a powerful media of communication. People have doing image manipulation using cost free editing softwares. Excellent example is photoshop, gimp etc. There are two sides of coins. Likewise every equipment have good and bad sides. Photoshop is used for good and bad image manipulation. Tampering the image comes under bad manipulation. We can see bad image manipulation in medical field, news media, photography, firm. Aim is to misrepresent the situation. Medical images are used to misrepresent the patient’s diagnosis by funny guys. Patients data are sensitive information. Image manipulation is due to the free availability of tools. And the aim of this misrepresentation is for claiming medical insurance. Likewise media writers also can add some false stories and trying to falsifying the images. Media workers are falsifying images for their media publicity. Falsifying image means tampering the images. Image tampering is a digital art. One who tampers image is just for fun. It comes under illegal activities. In medical area, physicians or researchers make diagnosis or research based on image only. Image tampering can not identify in a naked eye. In this paper, I prepared a literature survey about various image forgery detection techniques and finally i concluded the comparative study with some parameters. An expert network administrator can also do this type of manipulation in his sketch before a new lab configuration. Patients can add manipulations and they can apply for medical loan. Likewise others can add extra contents and falsifying the data.

 

Published In : IJCAT Journal Volume 2, Issue 5

Date of Publication : May 2015

Pages : 139 - 149

Figures :13

Tables : 04

Publication Link :A Review on Image Forgery and Its Detection

 

 

 

Mr. Arun Anoop M : He obtained his BTech in Computer Science and Engineering from cochin university in the year 2008.He completed his PG diploma in information security and system administration from DOEACC center, NIT , Calicut and also secured S-Grade. He obtained his MTech in Information Technology from kalasalingam university in the year 2011.Presently he is working as Assistant Professor in Computer Science and Engineering, MESCE, kuttippuram, kerala.Before joining MESCE he has worked as teaching assistant in information technology in kalasalingam university, krishnankoil, Tamilnadu. He is having 4 years of teaching experience after MTech. He has attended many workshops, FDPs and conferences. His areas of interest are network security, wireless sensor networks, vanet , image forensics. He has around 17 National and International Conferences and journals. He has guided 6 Mtech students. He is the board member of IJCTT journal. And also he is a certified computer hacking forensics investigator-EC Council.

 

 

 

 

 

 

 

Image Manipulation

Tamper Detection Techniques

Image Processing

Network Security

Image Forensics

I had given brief idea about image foregery and its detection methods and I had mentioned some important image authentication tools in daily life for investigators in image forensics. I mentioned about the survey of image tampering techniques. Finally concluded an analysis based on existing papers with four parameters. In future, researchers can do the analysis work on CASIA V2 dataset and can do the research based on any of the tampering techniques. This study has discussed image forgery techniques with neat diagram and its detection. This study will help researchers to get deep knowledge in field of image forgery.

 

 

 

 

 

 

 

 

 

[1] Minati Mishra, Flt. Lt. Dr. M. C. Adhikary, “Digital Image Tamper Detection Techniques - A Comprehensive Study,”IJCSBI,Vol. 2, No. 1. JUNE 2013. [2] Deepika Sharma1, Pawanesh Abrol2, ” Digital Image Tampering – A Threat to Security Management,” International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 10, October 2013. [3] N.Anantharaj1, ”Tampering and Copy-Move Forgery Detection Using Sift Feature,”ICGICT, Vol.2, Special Issue 1, March 2014. [4] Sahar Qasim Saleh,”Image Splicing And Copy-Move Forgery Detection,” Master in Computer Science, December 2012, King Saud University College of Computer & Information Sciences Department of Computer Science. [5] Somayeh Sadeghi, Hamid A. Jalab, and Sajjad Dadkhah, ” Efficient Copy-Move Forgery Detection for Digital Images,”World Academy of Science, Engineering and Technology,Vol:6 2012-11-28. [6] Hany Farid, “A Survey of Image Forgery Detection,”Dartmouth College [7] S.Murali, Govindraj B. Chittapur, Prabhakara H. S and Basavaraj S. Anami, ”Comparison And Analysis Of Photo Image Forgery Detection Techniques,”(IJCSA) Vo2, No.6, December 2012 [8] Hany Farid, ”Image Forgery Detection A survey,”IEEE SIGNAL PROCESSING MAGAZINE, MARCH 2009. [9] Sangwon Lee, David A. Shamma,Bruce Gooch, ”Detecting false captioning using common-sense reasoning,” 2006 DFRWS. Published by Elsevier Ltd. [10] Yongzhen Ke,Weidong Min , Fan Qin and Junjun Shang, ”Image Forgery Detection Based on Semantic,” International Journal of Hybrid Information Technology Vol.7, No.1 (2014), pp.109-124. [11] Voruganti Arun Kumar Raj, Hochschule, ” Digital image tamper detection tools,”Karlsruhe Technik und Wirtschaft,UNIVERSITY OF APPLIED SCIENCES, September 2005. [12] Photomontage.Available: http://en.wikipedia.org/wiki/Photomontage [13] Auth-spliced-data-set.Available: http://www.ee.columbia.edu/ln/dvmm/downloads/Aut hSplicedDataSet/AuthSplicedDataSet.htm [14] Splicing.Available:http://www.ee.columbia.edu/ln/dv mm/trustfoto/projs/splicing/homepage-splicing.png [15] Image Forensics. Available:http://www.lambertoballan.net/research/ima ge-forensics/ [16] Copy move forgery detection.Available:http://www.lambertoballan.net/20 13/03/copy-move-forgery-detection-and-localizationby- means-of-robust-clustering-with-j-linkage/ [17] Splicing.Available:http://www.ee.columbia.edu/ln/dv mm/trustfoto/projs/splicing/homepage-splicing.png [18] Jonathan R. Sturak, B.S, “Forensic Analysis Of Digital Image Tampering,” Department Of The Air Force [19] “The Art and Science of Digital Compositing”, Brinkmann, R.,. San Diego: Academic Press, 1999. [20] Fridrich, J., J. Lukas, and D. Soukal, “Detection of Copy-Move Forgery in Digital Images.” Proceedings of DFRWS 2003. Cleveland, OH, August 2003 [21] P. Sutthiwan, Y. Shi, H. Zhao, T. T. Ng, and W. Su, „Markovian rake transform for digital image tampering detection?, Transactions on data hiding and multimedia security, pp. 1–17, 2011 [22] CASIA Tampering Detection Dataset,Available: http://forensics.idealtest.org [23] Smudge tool, http://docs.gimp.org/en/gimp-toolsmudge. html [24] Muhammad, G. Dept. of Comput. Eng., King Saud Univ., Riyadh, Saudi Arabia Al-Hammadi, M.H. ; Hussain, M. ; Mirza, A.M. ; Bebis, G.,"Copy move image forgery detection method using steerable pyramid transform and texture descriptor,"EUROCON IEEE,pg.1586 - 1592,July 2013 [25] Cozzolino, Davide Universitá Federico II di Napoli, DIETI, 80125 Naples Italy Poggi, Giovanni ; Verdoliva, Luisa"Copy-move forgery detection based on PatchMatch,”Image Processing (ICIP), 2014 IEEE International Conference,pg.5312 - 5316,Oct. 2014. [26] Jaberi, M. Comput. Sci. & Eng. Dept., Univ. of Nevada, Reno, NV, USA Bebis, G. ; Hussain, M. ; Muhammad, G.,"Improving the detection and localization of duplicated regions in copy-move image forgery,"Digital Signal Processing (DSP), 2013 18th International Conference(IEEE),pg.1 - 6,July 2013 [27] Chakraborty, S. Adv. Signal Process. Group, CDACKolkata, Kolkata, India,"Copy move image forgery detection using mutual information,"Computing, Communications and Networking Technologies(ICCCNT),2013,Fourth_International Conference(IEEE),pg.1 - 4,July 2013. [28] Bo Xu, Guangjie Liu, and Yuewei Dai,School of Automation, Nanjing University of Science & Technology, Nanjing 210094, China,"Detecting Image Splicing Using Merged Features in Chroma Space,"The Scientific World Journal Volume 2014 (2014), Article ID 262356, 8 pages [29] CASIA Tampered Image Detection evaluation dataset. Available: http://forensics.idealtest.org/ [30] CASIA.Available: http://forensics.idealtest.org:8080/index_v2.html [31] Himanshu Goyal,Tarun Gulati, Department of Electronics & Communication Engineering, MMU, Mullana (Ambala), INDIA “Robust Copy Move Image Forgery Detection using Scale Invariant Features Transform,”International Journal of Computer Applications (0975 – 8887) Volume 97– No.10, July 2014. [32] Fill tool, Available:http://www.getpaint.net/doc/latest/FillTools. html [33] Copy_move,Available: https://www5.cs.fau.de/research/areas/computervision/ image-forensics/evaluation-of-copy-moveforgery- detection/ [34] Sahar Qasim Saleh,King Saud University College of Computer & Information Sciences Department of Computer Science,” Image Splicing And Copy-Move Forgery Detection”, December 2012. [35] Swapnil H. Kudke, A. D. Gawande, Electronics & Telecommunication Department, Sipna College of Engineering & Technology, Amravati,” Copy- Move Attack Forgery Detection by Using SIFT”, IJITEE, Volume-2, Issue-5, April 2013. [36] Fotoforensics,Available: http://fotoforensics.com/ [37] TinEye,Available: http://tineye.com/ [38] Find exif,Available:http://www.findexif.com/ [39] JPEG_Snoop,Available: http://www.impulseadventure.com/photo/jpegsnoop. html [40] ImageForensics,Available:http://www.imageforensic.o rg/ [41] Getghiro,Available:http://www.getghiro.org/ [42] ELA,Available:http://resources.infosecinstitute.com/er ror-level-analysis-detect-image-manipulation/ [43] Pierluigi Paganini,Chief Information Security Officer at Bit4Id,”Photo Forensics: Detect Photoshop Manipulation with Error Level Analysis,”Oct 2013,Available:http://resources.infosecinstitute.com/er ror-level-analysis-detect-image-manipulation/ [44] Photomanipulation(Forgery)detection,Available: http://forensic.belkasoft.com/en/forgery-detection.