Authentication of Digital Image using Exif Metadata and Decoding Properties

Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.

Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2021 ◽  
Vol 10 (2) ◽  
pp. 85
Author(s):  
Juan Reinoso-Gordo ◽  
Antonio Gámiz-Gordo ◽  
Pedro Barrero-Ortega

Suitable graphic documentation is essential to ascertain and conserve architectural heritage. For the first time, accurate digital images are provided of a 16th-century wooden ceiling, composed of geometric interlacing patterns, in the Pinelo Palace in Seville. Today, this ceiling suffers from significant deformation. Although there are many publications on the digital documentation of architectural heritage, no graphic studies on this type of deformed ceilings have been presented. This study starts by providing data on the palace history concerning the design of geometric interlacing patterns in carpentry according to the 1633 book by López de Arenas, and on the ceiling consolidation in the 20th century. Images were then obtained using two complementary procedures: from a 3D laser scanner, which offers metric data on deformations; and from photogrammetry, which facilitates the visualisation of details. In this way, this type of heritage is documented in an innovative graphic approach, which is essential for its conservation and/or restoration with scientific foundations and also to disseminate a reliable digital image of the most beautiful ceiling of this Renaissance palace in southern Europe.


2020 ◽  
Vol 30 (1) ◽  
pp. 240-257
Author(s):  
Akula Suneetha ◽  
E. Srinivasa Reddy

Abstract In the data collection phase, the digital images are captured using sensors that often contaminated by noise (undesired random signal). In digital image processing task, enhancing the image quality and reducing the noise is a central process. Image denoising effectively preserves the image edges to a higher extend in the flat regions. Several adaptive filters (median filter, Gaussian filter, fuzzy filter, etc.) have been utilized to improve the smoothness of digital image, but these filters failed to preserve the image edges while removing noise. In this paper, a modified fuzzy set filter has been proposed to eliminate noise for restoring the digital image. Usually in fuzzy set filter, sixteen fuzzy rules are generated to find the noisy pixels in the digital image. In modified fuzzy set filter, a set of twenty-four fuzzy rules are generated with additional four pixel locations for determining the noisy pixels in the digital image. The additional eight fuzzy rules ease the process of finding the image pixels,whether it required averaging or not. In this scenario, the input digital images were collected from the underwater photography fish dataset. The efficiency of the modified fuzzy set filter was evaluated by varying degrees of Gaussian noise (0.01, 0.03, and 0.1 levels of Gaussian noise). For performance evaluation, Structural Similarity (SSIM), Mean Structural Similarity (MSSIM), Mean Square Error (MSE), Normalized Mean Square Error (NMSE), Universal Image Quality Index (UIQI), Peak Signal to Noise Ratio (PSNR), and Visual Information Fidelity (VIF) were used. The experimental results showed that the modified fuzzy set filter improved PSNR value up to 2-3 dB, MSSIM up to 0.12-0.03, and NMSE value up to 0.38-0.1 compared to the traditional filtering techniques.


2020 ◽  
Vol 1 (3) ◽  
pp. 284
Author(s):  
Josua Alfiandi Sinuhaji

Digital imagery is currently very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of digital images can be done by using cryptographic techniques. Cryptographic techniques can encode digital images by encrypting them in the form of passwords that are not understood. ICE is a block cipher published by Kwan in 1997. This algorithm has a structure similar to DES, but with additional bit permutations that do not depend on the key in the rotation function. There are various types of ICE variants, namely Thin-ICE, ICE standard, and ICE-n. The difference between the three is the length of the keyword used and the number of rounds. The Thin-ICE algorithm uses 64 bits and 8 turns. The ICE standard uses 64 bits and 16 round keys. The ICE-n algorithm uses keys 64n bits and 16n turns. The use of this type of algorithm can be adjusted to the needs of users where Thin-ICE has the lowest level of security among the three, while ICE-n is the highest. This algorithm does not become the subject of a patent and the source code can be used freely.Keywords : Cryptography, Digital Image,Algorithm,ICE.


2021 ◽  
pp. 32-47
Author(s):  
Katherine Thomson-Jones

In this chapter, I consider whether digital images are digital in the strongest sense; namely, qua images. Assuming that a digital image is one that is made and screened digitally, there is a further question as to whether the representational scheme to which the image belongs has a fundamentally digital structure. Answering this question requires close analysis of Nelson Goodman’s classical account of the analog/digital distinction. It also requires a response to Goodman’s insistence on the essential analogicity of the pictorial. Such a response points to the uses of digital sampling and quantization technology to impose digital structure on encoded, replicable images.


2011 ◽  
Vol 19 (2) ◽  
Author(s):  
A. Roy ◽  
S. Mitra ◽  
R. Agrawal

AbstractManipulation in image has been in practice since centuries. These manipulated images are intended to alter facts — facts of ethics, morality, politics, sex, celebrity or chaos. Image forensic science is used to detect these manipulations in a digital image. There are several standard ways to analyze an image for manipulation. Each one has some limitation. Also very rarely any method tried to capitalize on the way image was taken by the camera. We propose a new method that is based on light and its shade as light and shade are the fundamental input resources that may carry all the information of the image. The proposed method measures the direction of light source and uses the light based technique for identification of any intentional partial manipulation in the said digital image. The method is tested for known manipulated images to correctly identify the light sources. The light source of an image is measured in terms of angle. The experimental results show the robustness of the methodology.


2012 ◽  
Author(s):  
Omar Mohd. Rijal ◽  
Norliza Mohd. Noor ◽  
Yun Fah Chang

Hasil penyelidikan dari Rijal dan Noor dan mengenai kegunaan kaedah statistik dan punca ketidakpastian yang berhubungkait dengan membuat pentadbiran ketika menggunakan imej digit memberi motivasi kepada kajian ini. Dalam kertas kerja ini tiga contoh lagi dikemukakan dengan tujuan memberi pandangan keseluruhan mengenai applikasi (termasuk secara statistik) analisis imej digit, dan isu–isu am diberi penekanan. Satu kesimpulan dari kajian ini adalah kaedah statistik/matematik harus diberi peranan penting dalam analisis imej digit. Kata kunci: Analisis imej digit; kaedah statistik; perbandingan secara kritikal contoh-contoh terpilih The results of Rijal and Noor and regarding the use of statistical methods and sources of uncertainty associated with making inferences when using digital images provide the motivation for this study. In this paper three other examples are presented with the purpose of providing an overview of applications (possibly statistical) of image analysis, and general issues highlighted. One conclusion from this study is that statistical/mathematical methodology should be emphasized in digital image analysis. Key words: Digital image analysis


Author(s):  
Giulio Fanti ◽  
Roberto Basso

The problem of exposure-time optimization in digital images acquired by a tripod-camera vibrating system is examined in this paper and an initial analysis is presented. The different noise sources concerning both the acquisition sensor in the camera and external vibrations were studied and quantified in some specific cases. The digital image quality is then discussed in terms of the MTF function evaluated at 50% level in order to define what the optimum ranges of exposure-times are.


2019 ◽  
Vol 19 (02) ◽  
pp. 1950010 ◽  
Author(s):  
Fernando O. Guillén-Reyes ◽  
Francisco J. Domínguez-Mota

In this paper, we describe a novel algorithm for edge detection on a digital image, which is based locally on the directional averaged gradient properties of the intensity function, and produces very satisfactory results in high-resolution digital images in low execution time. Several examples show results which are comparable to those obtained by Canny and Sobel methods.


Sign in / Sign up

Export Citation Format

Share Document