scholarly journals Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns

Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3372 ◽  
Author(s):  
Esteban Armas Vega ◽  
Ana Sandoval Orozco ◽  
Luis García Villalba ◽  
Julio Hernandez-Castro

In the last few years, the world has witnessed a ground-breaking growth in the use of digital images and their applications in the modern society. In addition, image editing applications have downplayed the modification of digital photos and this compromises the authenticity and veracity of a digital image. These applications allow for tampering the content of the image without leaving visible traces. In addition to this, the easiness of distributing information through the Internet has caused society to accept everything it sees as true without questioning its integrity. This paper proposes a digital image authentication technique that combines the analysis of local texture patterns with the discrete wavelet transform and the discrete cosine transform to extract features from each of the blocks of an image. Subsequently, it uses a vector support machine to create a model that allows verification of the authenticity of the image. Experiments were performed with falsified images from public databases widely used in the literature that demonstrate the efficiency of the proposed method.

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Muhammad Hameed Siddiqi ◽  
Khurshed Asghar ◽  
Umar Draz ◽  
Amjad Ali ◽  
Madallah Alruwaili ◽  
...  

With the advancement of the multimedia technology, the extensive accessibility of image editing applications makes it easier to tamper the contents of digital images. Furthermore, the distribution of digital images over the open channel using information and communication technology (ICT) makes it more vulnerable to forgery. The vulnerabilities in telecommunication infrastructure open the doors for intruders to introduce deceiving changes in image data, which is hard to detect. The forged images can create severe social and legal troubles if altered with malicious purpose. Image forgery detection necessitates the development of sophisticated techniques that can efficiently detect the alterations in the digital image. Splicing forgery is commonly used to conceal the reality in images. Splicing introduces high contrast in the corners, smooth regions, and edges. We proposed a novel image forgery detection technique based on image splicing using Discrete Wavelet Transform and histograms of discriminative robust local binary patterns. First, a given color image is transformed in YCbCr color space and then Discrete Wavelet Transform (DWT) is applied on Cb and Cr components of the digital image. Texture variation in each subband of DWT is described using the dominant rotated local binary patterns (DRLBP). The DRLBP from each subband are concatenated to produce the final feature vector. Finally, a support vector machine is used to develop image forgery detection model. The performance and generalization of the proposed technique were evaluated on publicly available benchmark datasets. The proposed technique outperformed the state-of-the-art forgery detection techniques with 98.95% detection accuracy.


Author(s):  
Latha Parameswaran ◽  
K Anbumani

This chapter discusses a content-based authentication technique based on inter-coefficient relationship of Discrete Wavelet Transform (DWT). Watermark is generated from the first level DWT. An image digest (which is a binary string) is generated from the second level DWT. The watermark is embedded in the mid-frequency coefficients of first level DWT as directed by the image digest. Image authentication is done by computing the Completeness of Signature. The proposed scheme is capable of withstanding incidental image processing operations such as compression and identifies any malicious tampering done on the host image.


2021 ◽  
Vol 10 (6) ◽  
pp. 3147-3155
Author(s):  
Vikas Srivastava ◽  
Sanjay Kumar Yadav

Sharing information through images is a trend nowadays. Advancements in the technology and user-friendly image editing tool make easy to edit the image and spread fake news through different social networking platforms. Forged image has been generated through an advanced image editing tool, so it is very challenging for image forensics to detect the micro discrepancy which distorted the micro pattern. This paper proposes an image forensic detection technique, which implies multi-level discrete wavelet transform to implement digital image filtering. Canny edge detection technique is implemented to detect the edge of the image to implement Otsu’s based enhanced local ternary pattern (OELTP), which can detect forgery-related artifact. DWT is implemented over Cb and Cr components of the image and using edge texture to improve the Otsu global threshold, which is used to extract features using ELTP technique. Support vector machine (SVM) is used for classification to find the image is forged or not. The performance of the work evaluated on three different open available data sets CASIA v1, CASIA v2, and Columbia. Our proposed work gives better results with some of the previous states of the work in terms of detection accuracy.


Author(s):  
Lizbardo Orellano Benancio ◽  
◽  
Ricardo Muñoz Canales ◽  
Paolo Rodriguez Leon ◽  
Enrique Lee Huamaní

Abstract—During various court hearings, the thesis that every authentic digital file has precise metadata of its creation date was questioned.In this way, the problem was raised which indicates, if the metadata of a digital file (Image) whose label records the date of creation by the recording device of a digital image file are accurate and reliable.For this reason, during the forensic analysis carried out in this work, a record of the metadata of five (05) digital image files from known sources is shown and where their characteristics have been detailed, in addition a record of the metadata of the images used that were later manipulated with image editing software with which metadata comparisons were made to show the labels that suffered modifications in their content.Finally, the obtaining of HASH code with the SHA - 256 algorithm is shown, for digital assurance, of the edited and original files whose comparison allows observing the changes in the content at a binary level. Keywords—Crime; Cybercrime; Digital Image; HASH; Metadata


2006 ◽  
Vol 31 (3) ◽  
pp. 37-41 ◽  
Author(s):  
Barbara Rockenbach

ARTstor (http://www.artstor.org) is a digital library consisting of images in the areas of art, architecture, the humanities and social sciences, along with a set of tools to support use of those images in research and pedagogy. Originally conceived as a project of the Andrew W. Mellon Foundation in 2001, ARTstor became an independent not-for-profit organization in January 2004 and launched the digital library in July of that year. ARTstor works closely with both providers and users of content from educational and cultural institutions around the world in creating a resource that meets the needs of the scholarly, educational and cultural communities. At present, the ARTstor Digital Library contains over 420,000 digital images and descriptive data; software to enable active use of the images in the digital library; and tools that allow users to access and use personal and/or institutional images along with ARTstor content for scholarship and teaching.


Author(s):  
John Mansfield

Advances in camera technology and digital instrument control have meant that in modern microscopy, the image that was, in the past, typically recorded on a piece of film is now recorded directly into a computer. The transfer of the analog image seen in the microscope to the digitized picture in the computer does not mean, however, that the problems associated with recording images, analyzing them, and preparing them for publication, have all miraculously been solved. The steps involved in the recording an image to film remain largely intact in the digital world. The image is recorded, prepared for measurement in some way, analyzed, and then prepared for presentation.Digital image acquisition schemes are largely the realm of the microscope manufacturers, however, there are also a multitude of “homemade” acquisition systems in microscope laboratories around the world. It is not the mission of this tutorial to deal with the various acquisition systems, but rather to introduce the novice user to rudimentary image processing and measurement.


Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


2016 ◽  
Vol 1 (4) ◽  
pp. 150
Author(s):  
Veton Zejnullahi

The process of globalization, which many times is considered as new world order is affecting all spheres of modern society but also the media. In this paper specifically we will see the impact of globalization because we see changing the media access to global problems in general being listed on these processes. We will see that the greatest difficulties will have small media as such because the process is moving in the direction of creating mega media which thanks to new technology are reaching to deliver news and information at the time of their occurrence through choked the small media. So it is fair to conclude that the rapid economic development and especially the technology have made the world seem "too small" to the human eyes, because for real-time we will communicate with the world with the only one Internet connection, and also all the information are take for the development of events in the four corners of the world and direct from the places when the events happen. Even Albanian space has not left out of this process because the media in the Republic of Albania and the Republic of Kosovo are adapted to the new conditions under the influence of the globalization process. This fact is proven powerful through creating new television packages, written the websites and newspapers in their possession.


2020 ◽  
Vol 63 (10) ◽  
pp. 25-37
Author(s):  
Alexander N. Danilov

The article discusses the meanings of life and value priorities of the post- Soviet society. The author argues that, at present, there are symptoms of a global ideological crisis in the world, that the West does not have its own vision of where and how to move on and has no understanding of the future. Unfortunately, most of the post-Soviet countries do not have such vision as well. In these conditions, there are mistrust, confusion, paradoxical manifestation of human consciousness. The main meanings that determine our life-world are: the desire of citizens for social justice and social security, the desire to figure out and understand the basic values of modern society, how honestly and equally the authorities act toward their fellow citizens, and to what extent they reflect their interests. The meanings of life, which are the answers to the challenges of the time, are embodied in the cultural code of each nation, state. The growth points of new values, which will become the basis for the future sustainable development of a new civilization, have yet to be discovered in the systemic transformative changes of the culture. In this process, the emergence of a new system of values that governs human life is inevitable. However, modern technology brings new troubles to humans. It has provided wide opportunities for informational violence and public consciousness manipulation. Nowadays, the scenario that is implemented in Western consumer societies claims to be the dominant scenario. Meanwhile, today there is no country in the world that is a role model, there is no ideal that others would like to borrow. Most post-Soviet states failed to advance their societies to more decent levels of economic development, to meet the challenges of the modern information age, and to provide the population with new high living standards. Therefore, in conditions of growing confrontation, we should realistically understand the world and be ready to implement changes that will ensure sustainable development of the state and society without losing our national identity.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Sign in / Sign up

Export Citation Format

Share Document