An improved tamper-detection method for digital images

Author(s):  
Intaek Kim ◽  
Seung-Soo Han ◽  
Jung Hwa Shin
2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


2018 ◽  
Vol 5 (2) ◽  
pp. 69-94
Author(s):  
K R Chetan ◽  
S Nirmala

A novel adaptive semi-fragile watermarking scheme for tamper detection and recovery of digital images is proposed in this paper. This scheme involves embedding of content and chroma watermarks generated from the first level Discrete Curvelet Transform (DCLT) coarse coefficients. Embedding is performed by quantizing the first level coarse DCLT coefficients of the input image and amount of quantization is intelligently decided based on the energy contribution of the coefficients. During watermark extraction, a tampered matrix is generated by comparing the feature similarity index value between each block of extracted and generated watermarks. The tampered objects are subsequently identified and an intelligent report is formed based on their severity classes. The recovery of the tampered objects is performed using the generated DCLT coefficients from luminance and chrominance components of the watermarked image. Results reveal that the proposed method outperforms existing method in terms of tamper detection and recovery of digital images.


Author(s):  
Akira Yamamoto ◽  
Shigeya Suzuki ◽  
Hisakazu Hada ◽  
Jin Mitsugi ◽  
Fumio Teraoka ◽  
...  

2014 ◽  
Vol 513-517 ◽  
pp. 1005-1008
Author(s):  
Xiao Ming Yao ◽  
Hong Yu Chen ◽  
Hong Lei Li ◽  
Xiao Yi Zhou

Data tampering as one of the primary security issues in RFID-enabled applications has been presented in recent years and proposals based on watermarking have been put forward to address different aspects of tampering in RFID tags. However, most of current researches are focused on the way of generating the watermark from the data to be protected and embedding it into the tag field (usually the field of serial number or SN) used as the cover medium, thus the innate structural coding relationship as a new clue to guess out the hidden watermark might be ignored. In this paper, this flaw has been fully considered, and a novel tamper detection method using CFB based encryption to hide the location clues is presented. Although it cant resist the attack from statistical analysis either, theoretical analysis has demonstrated that our scheme outperforms its previous counterparts in data security.


2019 ◽  
Vol 8 (3) ◽  
pp. 5882-5887

Copy-move tamper discovery in digital image is a significant research application in forensic investigation. Developing an imperative and reliable means to discover copy-move tampering in order to guarantee the authenticity of digital images is a solitary research area in image processing. This category of tampering is performed to hide some unwanted information or duplicate certain region of image. This article introduces a generic algorithmic skeleton to copy-move tamper discovery Experiments are carried out on three states of art copy-move tamper detection methods with respect to three different data sets. Empirical results indicates that PCA based method is better than Frequency transformation and Zernike moment based method in terms of detection accuracy in all three data sets. This article also identified the key challenges and opportunities in copy-move tamper detection.


Sign in / Sign up

Export Citation Format

Share Document