scholarly journals Novel framework for optimized digital forensic for mitigating complex image attacks

Author(s):  
Shashidhar T. M. ◽  
K. B. Ramesh

Digital Image Forensic is significantly becoming popular owing to the increasing usage of the images as a media of information propagation. However, owing to the presence of various image editing tools and softwares, there is also an increasing threats over image content security. Reviewing the existing approaches of identify the traces or artifacts states that there is a large scope of optimization to be implmentation to further enhance teh processing. Therfore, this paper presents a novel framework that performs cost effective optmization of digital forensic tehnqiue with an idea of accurately localizing teh area of tampering as well as offers a capability to mitigate the attacks of various form. The study outcome shows that propsoed system offers better outcome in contrast to existing system to a significant scale to prove that minor novelty in design attribute could induce better improvement with respect to accuracy as well as resilience toward all potential image threats.

Author(s):  
Lizbardo Orellano Benancio ◽  
◽  
Ricardo Muñoz Canales ◽  
Paolo Rodriguez Leon ◽  
Enrique Lee Huamaní

Abstract—During various court hearings, the thesis that every authentic digital file has precise metadata of its creation date was questioned.In this way, the problem was raised which indicates, if the metadata of a digital file (Image) whose label records the date of creation by the recording device of a digital image file are accurate and reliable.For this reason, during the forensic analysis carried out in this work, a record of the metadata of five (05) digital image files from known sources is shown and where their characteristics have been detailed, in addition a record of the metadata of the images used that were later manipulated with image editing software with which metadata comparisons were made to show the labels that suffered modifications in their content.Finally, the obtaining of HASH code with the SHA - 256 algorithm is shown, for digital assurance, of the edited and original files whose comparison allows observing the changes in the content at a binary level. Keywords—Crime; Cybercrime; Digital Image; HASH; Metadata


2018 ◽  
Vol 16 (1) ◽  
pp. 1
Author(s):  
Hendro Wijayanto ◽  
Iwan Ady Prabowo ◽  
Paulus Harsadi

Data and information security technique is a way to keep an object confidential. eXchangable Image File Format (EXIF) Metadata is data information about digital image. In the digital forensic investigation, this is very useful for copyright security or safeguarding digital evidence. Steganography and cryptography techniques have been widely used to overcome these problem. However, from the research that has been done in terms of security EXIF of metadata digital image photography, there are still some weaknesses. Among them is the depreciation of the digital image size after decryption. Since the standard EXIF metadata treatmens released by JEIDA and CIPA have different characteristic with JFIF metadata. A null value will be deemed to be the content with a value of 1 in EXIF standard. While in JFIF metadata model, the value of null is considered to be worth 0 (zero). This is make the EXIF metadata security process is shrinking of -25,15% from the original size. With the optimizing null value before encryption, the same metadata will be obtained between original image and after decryption. The null value will be replaced with an empty string (it’s worth 1) before encryption. Results from the model obtained an average of -1,51% depreciation of the original digital image size.Therefore, this technique can optimize the digital image copyright protection.Keywords : substitution, EXIF, optimization, metadata, security, image forensic


Author(s):  
Tahira Nazir ◽  
Aun Irtaza ◽  
Ali Javed ◽  
Hafiz Malik ◽  
Awais Mehmood ◽  
...  

2011 ◽  
Vol 19 (2) ◽  
Author(s):  
A. Roy ◽  
S. Mitra ◽  
R. Agrawal

AbstractManipulation in image has been in practice since centuries. These manipulated images are intended to alter facts — facts of ethics, morality, politics, sex, celebrity or chaos. Image forensic science is used to detect these manipulations in a digital image. There are several standard ways to analyze an image for manipulation. Each one has some limitation. Also very rarely any method tried to capitalize on the way image was taken by the camera. We propose a new method that is based on light and its shade as light and shade are the fundamental input resources that may carry all the information of the image. The proposed method measures the direction of light source and uses the light based technique for identification of any intentional partial manipulation in the said digital image. The method is tested for known manipulated images to correctly identify the light sources. The light source of an image is measured in terms of angle. The experimental results show the robustness of the methodology.


2011 ◽  
Vol 71-78 ◽  
pp. 3904-3908
Author(s):  
Ming Hsiang Shih ◽  
Wen Pei Sung ◽  
Feng Jen Tsai

Strong typhoon and earthquake seriously threaten the safety of the life and property of the people. A cost-effective and reliable method is proposed to monitor the natural frequency response of building under excitation of external forces based on the applying digital image correlation method, DIC. The analysis accuracy of this dynamic DIC method is tested and verified by comparing with numerical analysis program, accelerometers, ACC and fast Fourier Transform, FFT. The test results reveal that the analysis accuracy of this DIC method near to the ACC and FFT traditional experimental methods. They demonstrate that using this DIC method to detect dynamic response of building under the excitation of external force has high practicability.


2015 ◽  
Vol 139 (12) ◽  
pp. 1558-1564 ◽  
Author(s):  
Annie O. Morrison ◽  
Jerad M. Gardner

Context The field of pathology is driven by microscopic images. Educational activities for trainees and practicing pathologists alike are conducted through exposure to images of a variety of pathologic entities in textbooks, publications, online tutorials, national and international conferences, and interdepartmental conferences. During the past century and a half, photographic technology has progressed from primitive and bulky, glass-lantern projector slides to static and/or whole slide digital-image formats that can now be transferred around the world in a matter of moments via the Internet. Objective To provide a historic and technologic overview of the evolution of microscopic-image photographic tools and techniques. Data Sources Primary historic methods of microscopic image capture were delineated through interviews conducted with senior staff members in the Emory University Department of Pathology. Searches for the historic image-capturing methods were conducted using the Google search engine. Google Scholar and PubMed databases were used to research methods of digital photography, whole slide scanning, and smart phone cameras for microscopic image capture in a pathology practice setting. Conclusions Although film-based cameras dominated for much of the time, the rise of digital cameras outside of pathology generated a shift toward digital-image capturing methods, including mounted digital cameras and whole slide digital-slide scanning. Digital image capture techniques have ushered in new applications for slide sharing and second-opinion consultations of unusual or difficult cases in pathology. With their recent surge in popularity, we suspect that smart phone cameras are poised to become a widespread, cost-effective method for pathology image acquisition.


Sign in / Sign up

Export Citation Format

Share Document