Digital Image Tamper Detection Techniques - A Comprehensive Study

Minati Mishra, Flt. Lt. Dr. M. C. Adhikary

Abstract


Photographs are considered to be the most powerful and trustworthy media of expression. For a long time, those were accepted as proves of evidences in varied fields such as journalism, forensic investigations, military intelligence, scientific research and publications, crime detection and legal proceedings, investigation of insurance claims, medical imaging etc. Today, digital images have completely replaced the conventional photographs from every sphere of life but unfortunately, they seldom enjoy the credibility of their conventional counterparts, thanks to the rapid advancements in the field of digital image processing. The increasing availability of low cost and sometimes free of cost image editing software such as Photoshop, Corel Paint Shop, Photoscape, PhotoPlus, GIMP and Pixelmator have made the tampering of digital images even more easier and a common practice. Now it has become quite impossible to say whether a photograph is a genuine camera output or a manipulated version of it just by looking at it. As a result, photographs have almost lost their reliability and place as proves of evidences in all fields. This is why digital image tamper detection has emerged as an important research area to establish the authenticity of digital photographs by separating the tampered lots from the original ones. This paper gives a brief history of image tampering and a state-of-the-art review of the tamper detection techniques.


Keywords


Digital Image, Tampering, Splicing, Cloning, Steganography, Watermarking

Full Text:

PDF

References


The Oxford dictionary online. http://oxforddictionaries.com

P Lester. Photojournalism: An Ethical Approach. Lawrence Erlbaum Associates. 91-92; 1991.

H. Farid, “A Survey of Image Forgery Detectionâ€, IEEE Signal Processing Magazine, 26(2):16-25, 2009

C. Amsberry, “Alterations of photos raise host of legal, ethical issues," TheWall Street Journal, Jan 1989.

http://www.fourandsix.com/photo-tampering-history

http://en.wikipedia.org/wiki/Kerry_Fonda_2004_election_photo_controversy

http://www.snopes.com/photos/politics/kerry2.asp

http://www.famouspictures.org/mag/index.php?title=Altered_Images#Tourist_of_Death

http:// izismile.com/ 2012/02/08/ historic photographs_ which are known _to _be _altered 13_pics.html

http://samvada.org/2012/news-digest/congress-mla-arrested-for-tampering-rss-chief-mohan-bhagwat-photo

Kusam, Pawanesh Abrol and Devanand, “Digital Tampering Detection Techniques: A Reviewâ€, BVICAM’s International Journal of Information Technology, Vol.1, No.2,

Giuseppe Messina, "DCT Based Digital Forgery Identification", Presented to Interpol Crime Against Children Group, Lyon, 25 March 2009.

Sangwon Lee, David A. Shamma, Bruce Gooch, “Detecting false captioning using common-sense reasoningâ€, Digital Investigation, Elsevier, 2006:S65-S70.

F. Cutzu, R. Hammoud, and A. Leykin, “Estimating the degree of photorealism of images: Distinguishing paintings from photographs,†in Proc. IEEE Conf. Computer Vision Pattern Recognition, Madison, WI, 2003.

Siwei Lyu and Hany Farid, "How Realistic is Photorealistic?â€, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 2, FEBRUARY 2005 845-850.

V. Athitsos, M. J. Swain, and C. Frankel, “Distinguishing photographs and graphics on the world wide web,†in Proc.Workshop Content-Based Access Image Video Libraries, San Juan, PR, 1997.

http://www.lostateminor.com/2013/04/23/nathan-walshs-photorealistic-paintings-of-america/

http://www.autodesk.com/eng/etc/fakeorfoto/about.html

Patchara Sutthiwan, Yun-Qing Shi, Jing Dong, Tian-Tsong Ng, “New Developments in Color Image Tampering Detectionâ€, 978-1-4244-5309-2/10, IEEE, Pp3064-3067, 2010.

Minati Mishra, A.R. Routray, Sunit Kumar: “High Security Image Steganography with modified Arnold’s cat mapâ€, IJCA, Vol.37, No.9:16-20, January 2012.

Yun Q. Shi, Chunhua Chen, Guorong Xuan, and Wei Su, “Steganalysis versus Splicing Detectionâ€, International Workshop on Digital Watermarking, December 2007.

Phen Lan Lina, Chung-Kai Hsiehb, Po-Whei Huangb, “A hierarchical digital watermarking method for image tampers detection and recoveryâ€, Pattern Recognition, Elsevier, Pp. 2519-2528, 2005.

Jiri Fridrich, “A HYBRID WATERMARK FOR TAMPER DETECTION IN DIGITAL IMAGESâ€, Fifth International Symposium on Signal Processing and its Applications (ISSPA) 1999.

F. Deguillaume, S. Voloshynovskiy, T. Pun, “Secure hybrid robust watermarking resistant against tampering and copy attackâ€, Signal Processing, Elsevier, Vol. 83,2003, pp. 2133–2170.

C.-S. Woo, J. Du, B. Pham, "Multiple watermark method for privacy control and tamper detection in medical images," in Proc. APRS Workshop on Digital Image Computing, Australia, 2005, pp.59-64.

Byun, S. C., et al. "A public-key based watermarking for color image authentication." Multimedia and Expo, 2002. ICME'02. Proceedings. 2002 IEEE International Conference on. Vol. 1. IEEE, 2002.

P.W. Wong, “A public key watermark for image verification and authenticationâ€, in: Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, October 1998, pp. 455–459.

D. Kundur, D. Hatzinakos, "Toward a telltale watermarking technique for tamper-proofing", in: Proceedings of the IEEE International Conference on Image Processing, vol. 2, 1998, pp. 409–413.

J. Fridrich, Image watermarking for tamper detection, in: Proceedings of the IEEE International Conference on Image Processing, vol. II, Chicago, IL, USA, October 1998, pp.404–408.

Hany Farid, “Image Forgery Detection: A surveyâ€,IEEE SIGNAL PROCESSING MAGAZINE , MARCH 2009, Pp: 16-25.

Jessica Fridrich, David Soukal, and Jan Lukáš, “Detection of Copy-Move Forgery in Digital Imagesâ€, Proc. Digital Forensic Research Workshop, IEEE Computer Society, Cleveland, OH, August 2003

G. Li, Q. Wu, D. Tu, and S. Sun, “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD,†in IEEE Int. Conf. Multimedia and Expo, Beijing, China, 2007, pp. 1750–1753.

W. Luo, J. Huang, and G. Qiu, “Robust detection of region-duplication forgery in digital images,†in Proc. Int. Conf. on Pattern Recognition, Washington,D.C., 2006, pp. 746–749.

B. Mahdian and S. Saic, “Detection of copy move forgery using a method based on blur movement invariants,†Forensic Sci. Int., vol. 171, pp. 180–189, 2007.

Tian-Tsong Ng, Shih-Fu Chang, “A MODEL FOR IMAGE SPLICINGâ€, International conference on Image Processing (ICIP), IEEE, Pp. 1169-1172, 2004.

Yun Q. Shi, Chunhua Chen, Wen Chen, “ A Natural Image Model Approach to Splicing Detectionâ€, ACM Conference’07, Dallas, Texas, USA., September 20–21, 2007.

Jing Zhang, Yun Zhao, Yuting Su, “A New Approach Merging Markov and DCT Features for Image Splicing Detectionâ€, IEEE, 390-394, 2009.

Detect Digital Image Splicing with Visual Cues, Zhenhua Qu, Guoping Qiu, and Jiwu Huang, S. Katzenbeisser and A.-R. Sadeghi (Eds.): IH 2009, LNCS 5806, pp. 247–261, 2009.Springer-Verlag Berlin Heidelberg 2009.

Michael Zimba, Sun Xingming, “Digital Image Splicing Detection Based on Local Complexity of Local Maximum Partial Gradient of DWT Coefficientsâ€, International Journal of Digital Content Technology and its Applications (JDCTA) Volume6, Number5, Pp. 1:9, March 2012.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)