Detection of Clones in Digital Images

Minati Mishra

Abstract


During the recent years, tampering of digital images has become a general habit among people and professionals. As a result, establishment of image authenticity has become a key issue in fields those make use of digital images. Image authentication involves separation of original camera outputs from their tampered or Stego counterparts. Digital image cloning being a popular type of image tampering, this paper analyses and compares various cloning detection techniques with respect to their time complexities and robustness of detection against various post processing operations such as cropping, brightness and contrast adjustments.

Keywords


Digital Image, Tampering, Splicing, Cloning, DCT, SVD, DWT, PCA

Full Text:

PDF

References


Minati Mishra & MC Adhikary, “Digital Image Tamper Detection Techniques: A Comprehensive Studyâ€, International Journal of Computer Science and Business Informatics (ISSN: 1694-2108), Vol. 2, No. 1, Pp. 1-12, JUNE 2013.

The Oxford dictionary online. http://oxforddictionaries.com

Hany Farid, “Image Forgery Detection: A surveyâ€, IEEE signal processing magazine, March 2009, Pp: 16-25.

Kusam, Pawanesh Abrol and Devanand, “Digital Tampering Detection Techniques: A Reviewâ€, BVICAM’s International Journal of Information Technology, Vol.1, No.2,

J. Fridrich, D. Soukal, and J. Lukáš, “Detection of Copy- Move Forgery in Digital Imagesâ€, In Proceedings of the Digital Forensic Research Workshop, Cleveland, OH, August 2003.

A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regionsâ€, Technical Report, TR2004-515, Dartmouth College, Computer Science, 2004.

Farid, H., Lyu, S.: Higher-order wavelet statistics and their application to digital forensics. In: IEEE Conference on Computer Vision and Pattern Recognition Workshop (2003).

Amara Graps, “An Introduction to Waveletsâ€, IEEE Computational Service and Engineering, 1992, 2(2):50-61

Guohui Li, Qiong WuI, Dan Tu, Shaojie Sun, “A Sorted Neighbourhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVDâ€, ICME 2007, 1750-1753.

K. Baker, "Singular Value Decomposition Tutorial", 2005.Available at http://www.cs.wits.ac.za/~michael/SVDTut.pdf

http://en.wikipedia.org/wiki/Principal_component_analysis


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)