Tradeoffs Between Forensics and Anti-Forensics of Digital Images

2018 ◽  
pp. 2124-2138
Author(s):  
Priya Makarand Shelke ◽  
Rajesh Shardanand Prasad

Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.

2017 ◽  
Vol 4 (2) ◽  
pp. 92-105 ◽  
Author(s):  
Priya Makarand Shelke ◽  
Rajesh Shardanand Prasad

Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.


2019 ◽  
Vol 63 (5) ◽  
pp. 50403-1-50403-15
Author(s):  
Edward T.-H. Chu ◽  
Heng-Chih Hsieh

Abstract Smartphones are playing an increasingly important role in helping people share information and communicate with each other, as evidenced by an increasing number of applications (or apps), including news, search engine, mailbox, and social networking apps. The more heavily people rely on their phones, the more they begin to take the term “user experience” into consideration when buying a smartphone. Obviously, the key to providing a good user experience is to minimize the response time of each graphical user interface (GUI) operation, such as a touch, slide, or flick. Thus, it is crucial for smartphone manufacturers and mobile app developers to measure the response times to enhance the performance of the device or application. In this article, the authors present the SMArtphone Response Time measuring platform (SMART), a novel and low-cost platform for measuring the response time of a smartphone. SMART consists of a normal 30-fps (frame per second) webcam and a mirror. The proposed platform first simultaneously records the changes on a smartphone screen and the GUI operation shown in the mirror. It then adopts image processing techniques to analyze the latency of the GUI operation. The authors’ validation results show that the measurement error of SMART is less than 1/30 s, which means that SMART is a practical solution for measuring the latency of GUI operations. In addition, they adopted SMART for the measurements and analysis of six different commercial smartphones to further demonstrate its applicability.


Author(s):  
Pedro Rodrigues ◽  
Manuel João Ferreira ◽  
João Luís Monteiro

The need to increase the complexity of computational methods to produce improvements in functional performance, particularly in medical image processing applications, leads to find suitable physical devices. This chapter describes two ways of adapting the techniques of image processing to quantum devices. This kind of computing can achieve, for some problems, unparalleled performance as compared to classic computing. In the first method, using the quantum Grover’s algorithm how to implement image processing techniques under quantum rules is shown. In the second method, using diffraction and interference, the possibility of using less complex quantum devices for processing digital images is treated. Using leucocytes images, that mode is tested.


Author(s):  
Durjoy Majumder ◽  
Madhumita Das

Cancer diagnoses so far are based on pathologists' criteria. Hence, they are based on qualitative assessment. Histopathological images of cancer biopsy samples are now available in digital format. Such digital images are now gaining importance. To avoid individual pathologists' qualitative assessment, digital images are processed further through use of computational algorithm. To extract characteristic features from the digital images in quantitative terms, different techniques of mathematical morphology are in use. Recently several other statistical and machine learning techniques have developed to classify histopathological images with the pathologists' criteria. Here, the authors discuss some characteristic features of image processing techniques along with the different advanced analytical methods used in oncology. Relevant background information of these techniques are also elaborated and the recent applications of different image processing techniques for the early detection of cancer are also discussed.


Author(s):  
Rositsa Yordanova ◽  
Petya Nikolova ◽  
Stanka Baycheva

The report analyses an algorithm to track the growth of colonies from mold by digital images. The effect of color components on the recognition and enumeration of mold colonies was analyzed. A selection of form description coefficients has been made to trace this growth. The nature of the modification of the colony of mold in two nutrient media has been established. The obtained data can be used to develop mathematical models describing colony development. Connections and comparisons can be made of the process that influence development of molds.


Author(s):  
AJINKYA KASHINATH PARBHANE ◽  
ANAJALI .A. CHANDAVALE ◽  
A.M. SAPKAL

CAPTCHA stands for Completely Automated Public Turing Tests to Tell Computers and Humans Apart. The CAPTCHAs have been widely used across the Internet to defend against undesirable and malicious bot programs. It was observed that an alarming number of CAPTCHAs could be broken by the technique of Image Processing and Artificial Neural Network. Many Researchers have tried to break a CAPTCHA so as to design robust CAPTCHA , but it is essential to generate a strong CAPTCHA that will resist bot attack. This paper has proposed algorithm to analyze the strength of CAPTCHAs using simple image processing techniques such as Preprocessing, Segmentation and Character recognition which in turn helps to improve the robustness and usability of CAPTCHA in Internet System. The experimental result shows the proposed algorithm gives 75 % accuracy to analyze the strength of CAPTCHA.


Author(s):  
R. C. Gonzalez

Interest in digital image processing techniques dates back to the early 1920's, when digitized pictures of world news events were first transmitted by submarine cable between New York and London. Applications of digital image processing concepts, however, did not become widespread until the middle 1960's, when third-generation digital computers began to offer the speed and storage capabilities required for practical implementation of image processing algorithms. Since then, this area has experienced vigorous growth, having been a subject of interdisciplinary research in fields ranging from engineering and computer science to biology, chemistry, and medicine.


Author(s):  
B.V.V. Prasad ◽  
E. Marietta ◽  
J.W. Burns ◽  
M.K. Estes ◽  
W. Chiu

Rotaviruses are spherical, double-shelled particles. They have been identified as a major cause of infantile gastroenteritis worldwide. In our earlier studies we determined the three-dimensional structures of double-and single-shelled simian rotavirus embedded in vitreous ice using electron cryomicroscopy and image processing techniques to a resolution of 40Å. A distinctive feature of the rotavirus structure is the presence of 132 large channels spanning across both the shells at all 5- and 6-coordinated positions of a T=13ℓ icosahedral lattice. The outer shell has 60 spikes emanating from its relatively smooth surface. The inner shell, in contrast, exhibits a bristly surface made of 260 morphological units at all local and strict 3-fold axes (Fig.l).The outer shell of rotavirus is made up of two proteins, VP4 and VP7. VP7, a glycoprotein and a neutralization antigen, is the major component. VP4 has been implicated in several important functions such as cell penetration, hemagglutination, neutralization and virulence. From our earlier studies we had proposed that the spikes correspond to VP4 and the rest of the surface is composed of VP7. Our recent structural studies, using the same techniques, with monoclonal antibodies specific to VP4 have established that surface spikes are made up of VP4.


Sign in / Sign up

Export Citation Format

Share Document