Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Enhanced Passive copy – paste Tampering Detection Technique for Digital Images

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 3
Year of Publication: 2014
Authors:
Ar. Guru Gokul
N. Kumaratharan
P. Suguna

Ar. Guru Gokul, N Kumaratharan and P Suguna. Article: Enhanced Passive copy – paste Tampering Detection Technique for Digital Images. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(3):29-32, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Ar. Guru Gokul and N. Kumaratharan and P. Suguna},
	title = {Article: Enhanced Passive copy – paste Tampering Detection Technique for Digital Images},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {3},
	pages = {29-32},
	month = {October},
	note = {Full text available}
}

Abstract

Digital images are powerful and widely used communication medium in many fields like medical imaging, digital forensics, surveillance, journalism, etc. The availability of sophisticated digital image technology has given rise to image forgery. The forgeries are very difficult for a human eye to detect. Passive tampering detection method aims to detect the tampering areas in the digital images without any prior knowledge of the original images. The available tampering detection technique uses 8 x 8 blocks to detect the tampered region. However, all the pixels involved in the block are not compared, which again leads to a forgery. To mitigate these effects, a new progressive passive copy-paste tampering detection technique is proposed. Experimental result shows that the proposed technique overcomes the foresaid technique which enhances the tampering detection method.

References

  • B. Mahdian, S. Saic. "A bibliography on blind methods for identifying image forgery", Signal Processing: Image Communication, 25(6): 389-399, 2010.
  • M. Barni, A. Costanzo, L. Sabatini. "Identification of cut & paste tampering by means of double-JPEG detection and image segmentation", Proceedings of 2010 IEEE International Symposium on Circuits and Systems, Paris, France, pp. 1687-1690, 2010.
  • W. Li, Y. Yuan, and N. Yu. "Passive detection of doctored JPEG image via block artifact grid extraction", Signal Processing, 89(9): 1821-1829, 2009.
  • Z. Lin, J. He, X. Tang, and C. K. Tang. "Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis", Pattern Recognition, 42(11): 2492-2501, 2009.
  • W. Luo, Z. Qu, J. Huang, and G. Qiu. "A novel method for detecting cropped and recompressed image block", IEEE International conference on Acoustics, Speech and Signal Processing, 2: II- 217-II-220, 2007.
  • J. Fridrich, D. Soukal, and Jan Lukáš. "Detection of copy-move forgery in digital images", Proc. Digital Forensic Research Workshop, Cleveland, OH, USA, 2004.
  • B. Mahdian, and S. Saic. "Detection of copy–move forgery using a method based on blur moment invariants", Forensic Science International, Vol. 171(2), Pages: 180-189, 2007.
  • S. Bayram, H. T. Sencar, and N. Memon. "An efficient and robust method for detecting copy-move forgery", IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1053-1056, 2009.
  • Fan, Z. and R. L. de Queiroz, "Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation", IEEE Transactions on Image Processing, Vol. 12, No. 2: 230-235, February 2003.
  • CASIA Tampered Image Detection Evaluation Database, CASIA TIDE V1. 0, http://forensics. idealtest. org:8080/ index_v1. html.