tampering detection
Recently Published Documents


TOTAL DOCUMENTS

221
(FIVE YEARS 76)

H-INDEX

18
(FIVE YEARS 3)

Mathematics ◽  
2022 ◽  
Vol 10 (2) ◽  
pp. 168
Author(s):  
Naheed Akhtar ◽  
Mubbashar Saddique ◽  
Khurshid Asghar ◽  
Usama Ijaz Bajwa ◽  
Muhammad Hussain ◽  
...  

Digital videos are now low-cost, easy to capture and easy to share on social media due to the common feature of video recording in smart phones and digital devices. However, with the advancement of video editing tools, videos can be tampered (forged) easily for propaganda or to gain illegal advantages—ultimately, the authenticity of videos shared on social media cannot be taken for granted. Over the years, significant research has been devoted to developing new techniques for detecting different types of video tampering. In this paper, we offer a detailed review of existing passive video tampering detection techniques in a systematic way. The answers to research questions prepared for this study are also elaborated. The state-of-the-art research work is analyzed extensively, highlighting the pros and cons and commonly used datasets. Limitations of existing video forensic algorithms are discussed, and we conclude with research challenges and future directions.


Author(s):  
Manjunatha S ◽  
Malini M. Patil

The extended utilization of picture-enhancing or manipulating tools has led to ease of manipulating multimedia data which includes digital images. These manipulations will disturb the truthfulness and lawfulness of images, resulting in misapprehension, and might disturb social security. The image forensic approach has been employed for detecting whether or not an image has been manipulated with the usage of positive attacks which includes splicing, and copy-move. This paper provides a competent tampering detection technique using resampling features and convolution neural network (CNN). In this model range spatial filtering (RSF)-CNN, throughout preprocessing the image is divided into consistent patches. Then, within every patch, the resampling features are extracted by utilizing affine transformation and the Laplacian operator. Then, the extracted features are accumulated for creating descriptors by using CNN. A wide-ranging analysis is performed for assessing tampering detection and tampered region segmentation accuracies of proposed RSF-CNN based tampering detection procedures considering various falsifications and post-processing attacks which include joint photographic expert group (JPEG) compression, scaling, rotations, noise additions, and more than one manipulation. From the achieved results, it can be visible the RSF-CNN primarily based tampering detection with adequately higher accurateness than existing tampering detection methodologies.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3161
Author(s):  
Adrian-Silviu Roman ◽  
Béla Genge ◽  
Adrian-Vasile Duka ◽  
Piroska Haller

Modern auto-vehicles are built upon a vast collection of sensors that provide large amounts of data processed by dozens of Electronic Control Units (ECUs). These, in turn, monitor and control advanced technological systems providing a large palette of features to the vehicle’s end-users (e.g., automated parking, autonomous vehicles). As modern cars become more and more interconnected with external systems (e.g., cloud-based services), enforcing privacy on data originating from vehicle sensors is becoming a challenging research topic. In contrast, deliberate manipulations of vehicle components, known as tampering, require careful (and remote) monitoring of the vehicle via data transmissions and processing. In this context, this paper documents an efficient methodology for data privacy protection, which can be integrated into modern vehicles. The approach leverages the Fast Fourier Transform (FFT) as a core data transformation algorithm, accompanied by filters and additional transformations. The methodology is seconded by a Random Forest-based regression technique enriched with further statistical analysis for tampering detection in the case of anonymized data. Experimental results, conducted on a data set collected from the On-Board Diagnostics (OBD II) port of a 2015 EUR6 Skoda Rapid 1.2 L TSI passenger vehicle, demonstrate that the restored time-domain data preserves the characteristics required by additional processing algorithms (e.g., tampering detection), showing at the same time an adjustable level of privacy. Moreover, tampering detection is shown to be 100% effective in certain scenarios, even in the context of anonymized data.


2021 ◽  
Vol 13 (6) ◽  
pp. 1-15
Author(s):  
Digambar Pawar ◽  
Mayank Gajpal

Images now-a-days are often used as an authenticated proof for any cyber-crime. Images that do not remain genuine can mislead the court of law. The fast and dynamically growing technology doubts the trust in the integrity of images. Tampering mostly refers to adding or removing important features from an image without leaving any obvious trace. In earlier days, digital signatures were used to preserve the integrity, but now a days various tools are available to tamper digital signatures as well. Even in various state-of-the-art works in tamper detection, there are various restrictions in the type of inputs and the type of tampering detection. In this paper, the researchers propose a prototype model in the form of a tool that will retrieve all the image files from given digital evidence and detect tampering in the images. For various types of tampering, different tampering detection algorithms have been used. The proposed prototype will detect if tampering has been done or not and will classify the image files into groups based on the type of tampering.


Author(s):  
Jingyi Shen ◽  
Yun Yao ◽  
Hao Mei

Copy-paste tampering is a common type of digital image tampering, which refers to copying a part of the image area in the same image, and then pasting it into another area of the image to generate a forged image, so as to carry out malicious operations such as fraud and framing. This kind of malicious forgery leads to the security problem of digital image. The research of digital image copy paste forensics has important theoretical significance and practical value. For digital image copy-paste tampering, this paper is based on moment invariant image copy paste tampering detection algorithm, and use Matlab software to design the corresponding tampering forensics system.


2021 ◽  
Author(s):  
Chunyan Zeng ◽  
Yao Yang ◽  
Zhifeng Wang ◽  
Shuai Kong ◽  
Shixiong Feng ◽  
...  

Abstract Digital Audio tampering detection can be applied to verify the authenticity of digital audio. However, the current methods are mostly based on visual comparison analysis of the continuity of electronic network frequency (ENF) of digital audio with a standard ENF database. It is usually tricky to obtain the ENF database, and the feature expression of the visualization method is weak, which leads to low detection accuracy. In order to solve this problem, this paper proposed an audio tampering detection method based on the fusion of shallow and deep features. Firstly, the band-pass filtering process is performed on the audio signal to obtain the ENF components, and then the discrete Fourier transform and Hilbert transform are applied to obtain the phase and instantaneous frequency of the ENF components. Secondly, the shallow features are extracted by performing framing and fitting operations on the estimated phase and instantaneous frequency. Then, the designed convolutional neural network is used to obtain deep features, and the attention mechanism is applied to fuse shallow features and deep features. Finally, after dimensionality reduction through the fully connected layer, the Softmax layer is used for classification to detect the tampering audio. The method achieves 97.03% accuracy on three classic databases, which are Carioca 1, Carioca 2, and New Spanish. In addition, we have achieved an accuracy of 88.31% on the newly constructed database GAUDI-DI. Experimental results show that the proposed method is superior to the state-of-the-art method.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Junpeng Xu ◽  
Haixia Chen ◽  
Xu Yang ◽  
Wei Wu ◽  
Yongcheng Song

AbstractIn a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure. Image authentication is the most important approaches to verify image integrity and authenticity. However, it has been challenging for image authentication to address both issues of tampering detection and privacy protection. One aspect, image authentication requires image contents not be changed to detect tampering. The other, privacy protection needs to remove sensitive information from images, and as a result, the contents should be changed. In this paper, we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection. Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose (for example, cover some sensitive areas with mosaics) according to specific rules and verify the authenticity without interaction with the original authenticator. The security of our scheme is guaranteed by the security of the underlying cryptographic primitives. Experiment results show that our scheme is efficient and practical. We believe that our work will facilitate image applications where both authentication and privacy protection are desirable.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5665
Author(s):  
Poh Yuen Chan ◽  
Alexander I-Chi Lai ◽  
Pei-Yuan Wu ◽  
Ruey-Beei Wu

This paper proposes a practical physical tampering detection mechanism using inexpensive commercial off-the-shelf (COTS) Wi-Fi endpoint devices with a deep neural network (DNN) on channel state information (CSI) in the Wi-Fi signals. Attributed to the DNN that identifies physical tampering events due to the multi-subcarrier characteristics in CSI, our methodology takes effect using only one COTS Wi-Fi endpoint with a single embedded antenna to detect changes in the relative orientation between the Wi-Fi infrastructure and the endpoint, in contrast to previous sophisticated, proprietary approaches. Preliminary results show that our detectors manage to achieve a 95.89% true positive rate (TPR) with no worse than a 4.12% false positive rate (FPR) in detecting physical tampering events.


Sign in / Sign up

Export Citation Format

Share Document