Image have been a powerful media of
communication. People have doing image manipulation
using cost free editing softwares. Excellent example is
photoshop, gimp etc. There are two sides of coins. Likewise
every equipment have good and bad sides. Photoshop is used
for good and bad image manipulation. Tampering the image
comes under bad manipulation. We can see bad image
manipulation in medical field, news media, photography,
firm. Aim is to misrepresent the situation. Medical images
are used to misrepresent the patient’s diagnosis by funny
guys. Patients data are sensitive information. Image
manipulation is due to the free availability of tools. And the
aim of this misrepresentation is for claiming medical
insurance. Likewise media writers also can add some false
stories and trying to falsifying the images. Media workers
are falsifying images for their media publicity. Falsifying
image means tampering the images. Image tampering is a
digital art. One who tampers image is just for fun. It comes
under illegal activities. In medical area, physicians or
researchers make diagnosis or research based on image only.
Image tampering can not identify in a naked eye. In this
paper, I prepared a literature survey about various image
forgery detection techniques and finally i concluded the
comparative study with some parameters. An expert
network administrator can also do this type of manipulation
in his sketch before a new lab configuration. Patients can
add manipulations and they can apply for medical loan.
Likewise others can add extra contents and falsifying the
data.
Published In : IJCAT Journal Volume 2, Issue 5
Date of Publication : May 2015
Pages : 139 - 149
Figures :13
Tables : 04
Publication Link :A Review on Image Forgery and Its Detection
Mr. Arun Anoop M : He obtained his BTech in Computer Science and
Engineering from cochin university in the year 2008.He completed his
PG diploma in information security and system administration from
DOEACC center, NIT , Calicut and also secured S-Grade. He
obtained his MTech in Information Technology from kalasalingam
university in the year 2011.Presently he is working as Assistant
Professor in Computer Science and Engineering, MESCE,
kuttippuram, kerala.Before joining MESCE he has worked as
teaching assistant in information technology in kalasalingam
university, krishnankoil, Tamilnadu. He is having 4 years of teaching
experience after MTech. He has attended many workshops, FDPs
and conferences. His areas of interest are network security, wireless
sensor networks, vanet , image forensics. He has around 17 National
and International Conferences and journals. He has guided 6 Mtech
students. He is the board member of IJCTT journal. And also he is a
certified computer hacking forensics investigator-EC Council.
Image Manipulation
Tamper Detection
Techniques
Image Processing
Network Security
Image
Forensics
I had given brief idea about image foregery and its
detection methods and I had mentioned some important
image authentication tools in daily life for investigators in
image forensics. I mentioned about the survey of image
tampering techniques. Finally concluded an analysis
based on existing papers with four parameters. In future,
researchers can do the analysis work on CASIA V2
dataset and can do the research based on any of the
tampering techniques. This study has discussed image
forgery techniques with neat diagram and its detection.
This study will help researchers to get deep knowledge in
field of image forgery.
[1] Minati Mishra, Flt. Lt. Dr. M. C. Adhikary, “Digital
Image Tamper Detection Techniques - A
Comprehensive Study,”IJCSBI,Vol. 2, No. 1. JUNE
2013.
[2] Deepika Sharma1, Pawanesh Abrol2, ” Digital Image
Tampering – A Threat to Security Management,”
International Journal of Advanced Research in
Computer and Communication Engineering Vol. 2,
Issue 10, October 2013.
[3] N.Anantharaj1, ”Tampering and Copy-Move Forgery
Detection Using Sift Feature,”ICGICT, Vol.2, Special
Issue 1, March 2014.
[4] Sahar Qasim Saleh,”Image Splicing And Copy-Move
Forgery Detection,” Master in Computer Science,
December 2012, King Saud University College of
Computer & Information Sciences Department of
Computer Science.
[5] Somayeh Sadeghi, Hamid A. Jalab, and Sajjad
Dadkhah, ” Efficient Copy-Move Forgery Detection
for Digital Images,”World Academy of Science,
Engineering and Technology,Vol:6 2012-11-28.
[6] Hany Farid, “A Survey of Image Forgery
Detection,”Dartmouth College
[7] S.Murali, Govindraj B. Chittapur, Prabhakara H. S
and Basavaraj S. Anami, ”Comparison And Analysis
Of Photo Image Forgery Detection
Techniques,”(IJCSA) Vo2, No.6, December 2012
[8] Hany Farid, ”Image Forgery Detection A
survey,”IEEE SIGNAL PROCESSING MAGAZINE,
MARCH 2009.
[9] Sangwon Lee, David A. Shamma,Bruce Gooch,
”Detecting false captioning using common-sense
reasoning,” 2006 DFRWS. Published by Elsevier Ltd.
[10] Yongzhen Ke,Weidong Min , Fan Qin and Junjun
Shang, ”Image Forgery Detection Based on Semantic,”
International Journal of Hybrid Information
Technology Vol.7, No.1 (2014), pp.109-124.
[11] Voruganti Arun Kumar Raj, Hochschule, ” Digital
image tamper detection tools,”Karlsruhe Technik und
Wirtschaft,UNIVERSITY OF APPLIED SCIENCES,
September 2005.
[12] Photomontage.Available:
http://en.wikipedia.org/wiki/Photomontage
[13] Auth-spliced-data-set.Available:
http://www.ee.columbia.edu/ln/dvmm/downloads/Aut
hSplicedDataSet/AuthSplicedDataSet.htm
[14] Splicing.Available:http://www.ee.columbia.edu/ln/dv
mm/trustfoto/projs/splicing/homepage-splicing.png
[15] Image Forensics.
Available:http://www.lambertoballan.net/research/ima
ge-forensics/
[16] Copy move forgery
detection.Available:http://www.lambertoballan.net/20
13/03/copy-move-forgery-detection-and-localizationby-
means-of-robust-clustering-with-j-linkage/
[17] Splicing.Available:http://www.ee.columbia.edu/ln/dv
mm/trustfoto/projs/splicing/homepage-splicing.png
[18] Jonathan R. Sturak, B.S, “Forensic Analysis Of
Digital Image Tampering,” Department Of The Air
Force
[19] “The Art and Science of Digital Compositing”,
Brinkmann, R.,. San Diego: Academic Press, 1999.
[20] Fridrich, J., J. Lukas, and D. Soukal, “Detection of
Copy-Move Forgery in Digital Images.” Proceedings
of DFRWS 2003. Cleveland, OH, August 2003
[21] P. Sutthiwan, Y. Shi, H. Zhao, T. T. Ng, and W. Su,
„Markovian rake transform for digital image
tampering detection?, Transactions on data hiding and
multimedia security, pp. 1–17, 2011
[22] CASIA Tampering Detection Dataset,Available:
http://forensics.idealtest.org
[23] Smudge tool, http://docs.gimp.org/en/gimp-toolsmudge.
html
[24] Muhammad, G. Dept. of Comput. Eng., King Saud
Univ., Riyadh, Saudi Arabia Al-Hammadi, M.H. ;
Hussain, M. ; Mirza, A.M. ; Bebis, G.,"Copy move
image forgery detection method using steerable
pyramid transform and texture descriptor,"EUROCON
IEEE,pg.1586 - 1592,July 2013
[25] Cozzolino, Davide Universitá Federico II di Napoli,
DIETI, 80125 Naples Italy Poggi, Giovanni ;
Verdoliva, Luisa"Copy-move forgery detection based
on PatchMatch,”Image Processing (ICIP), 2014 IEEE
International Conference,pg.5312 - 5316,Oct. 2014.
[26] Jaberi, M. Comput. Sci. & Eng. Dept., Univ. of
Nevada, Reno, NV, USA Bebis, G. ; Hussain, M. ;
Muhammad, G.,"Improving the detection and
localization of duplicated regions in copy-move image
forgery,"Digital Signal Processing (DSP), 2013 18th
International Conference(IEEE),pg.1 - 6,July 2013 [27] Chakraborty, S. Adv. Signal Process. Group, CDACKolkata,
Kolkata, India,"Copy move image forgery
detection using mutual information,"Computing,
Communications and Networking
Technologies(ICCCNT),2013,Fourth_International
Conference(IEEE),pg.1 - 4,July 2013.
[28] Bo Xu, Guangjie Liu, and Yuewei Dai,School of
Automation, Nanjing University of Science &
Technology, Nanjing 210094, China,"Detecting Image
Splicing Using Merged Features in Chroma
Space,"The Scientific World Journal Volume 2014
(2014), Article ID 262356, 8 pages
[29] CASIA Tampered Image Detection evaluation dataset.
Available: http://forensics.idealtest.org/
[30] CASIA.Available:
http://forensics.idealtest.org:8080/index_v2.html
[31] Himanshu Goyal,Tarun Gulati, Department of
Electronics & Communication Engineering, MMU,
Mullana (Ambala), INDIA “Robust Copy Move Image
Forgery Detection using Scale Invariant Features
Transform,”International Journal of Computer
Applications (0975 – 8887) Volume 97– No.10, July
2014.
[32] Fill tool,
Available:http://www.getpaint.net/doc/latest/FillTools.
html
[33] Copy_move,Available:
https://www5.cs.fau.de/research/areas/computervision/
image-forensics/evaluation-of-copy-moveforgery-
detection/
[34] Sahar Qasim Saleh,King Saud University College of
Computer & Information Sciences Department of
Computer Science,” Image Splicing And Copy-Move
Forgery Detection”, December 2012.
[35] Swapnil H. Kudke, A. D. Gawande, Electronics &
Telecommunication Department, Sipna College of
Engineering & Technology, Amravati,” Copy- Move
Attack Forgery Detection by Using SIFT”, IJITEE,
Volume-2, Issue-5, April 2013.
[36] Fotoforensics,Available: http://fotoforensics.com/
[37] TinEye,Available: http://tineye.com/
[38] Find exif,Available:http://www.findexif.com/
[39] JPEG_Snoop,Available:
http://www.impulseadventure.com/photo/jpegsnoop.
html
[40] ImageForensics,Available:http://www.imageforensic.o
rg/
[41] Getghiro,Available:http://www.getghiro.org/
[42] ELA,Available:http://resources.infosecinstitute.com/er
ror-level-analysis-detect-image-manipulation/
[43] Pierluigi Paganini,Chief Information Security Officer
at Bit4Id,”Photo Forensics: Detect Photoshop
Manipulation with Error Level Analysis,”Oct
2013,Available:http://resources.infosecinstitute.com/er
ror-level-analysis-detect-image-manipulation/
[44] Photomanipulation(Forgery)detection,Available:
http://forensic.belkasoft.com/en/forgery-detection.