image tampering
Recently Published Documents


TOTAL DOCUMENTS

145
(FIVE YEARS 47)

H-INDEX

17
(FIVE YEARS 3)

Author(s):  
Natiq M. Abdali ◽  
Zahir M. Hussain

<span lang="EN-US">Recent <span>research has demonstrated the effectiveness of utilizing neural networks for detect tampering in images. However, because accessing a database is complex, which is needed in the classification process to detect tampering, reference-free steganalysis attracted attention. In recent work, an approach for least significant bit (LSB) steganalysis has been presented based on analyzing the derivatives of the histogram correlation. In this paper, we further examine this strategy for other steganographic methods. Detecting image tampering in the spatial domain, such as image steganography. It is found that the above approach could be applied successfully to other kinds of steganography with different orders of histogram-correlation derivatives. Also, the limits of the ratio stego-image to cover are considered, where very small ratios can escape this detection method unless </span> modified.</span>


Author(s):  
Jingyi Shen ◽  
Yun Yao ◽  
Hao Mei

Copy-paste tampering is a common type of digital image tampering, which refers to copying a part of the image area in the same image, and then pasting it into another area of the image to generate a forged image, so as to carry out malicious operations such as fraud and framing. This kind of malicious forgery leads to the security problem of digital image. The research of digital image copy paste forensics has important theoretical significance and practical value. For digital image copy-paste tampering, this paper is based on moment invariant image copy paste tampering detection algorithm, and use Matlab software to design the corresponding tampering forensics system.


2021 ◽  
pp. 108342
Author(s):  
Pascal Lefévre ◽  
Philippe Carré ◽  
Caroline Fontaine ◽  
Philippe Gaborit ◽  
Jiwu Huang

2021 ◽  
Vol 12 (2) ◽  
pp. 13-32
Author(s):  
Ali Ahmad Aminu ◽  
Nwojo Nnanna Agwu

Digital image tampering detection has been an active area of research in recent times due to the ease with which digital image can be modified to convey false or misleading information. To address this problem, several studies have proposed forensics algorithms for digital image tampering detection. While these approaches have shown remarkable improvement, most of them only focused on detecting a specific type of image tampering. The limitation of these approaches is that new forensic method must be designed for each new manipulation approach that is developed. Consequently, there is a need to develop methods capable of detecting multiple tampering operations. In this paper, we proposed a novel general purpose image tampering scheme based on CNNs and Local Optimal Oriented Pattern (LOOP) which is capable of detecting five types of image tampering in both binary and multiclass scenarios. Unlike the existing deep learning techniques which used constrained pre-processing layers to suppress the effect of image content in order to capture image tampering traces, our method uses LOOP features, which can effectively subdue the effect image content, thus, allowing the proposed CNNs to capture the needed features to distinguish among different types of image tampering. Through a number of detailed experiments, our results demonstrate that the proposed general purpose image tampering method can achieve high detection accuracies in individual and multiclass image tampering detections respectively and a comparative analysis of our results with the existing state of the arts reveals that the proposed model is more robust than most of the exiting methods.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Amit Doegar ◽  
Srinidhi Hiriyannaiah ◽  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
Maitreyee Dutta

Cloud computing has evolved in various application areas such as medical imaging and bioinformatics. It raises the issues of privacy and tampering in the images especially related to the medical field and bioinformatics for various reasons. The digital images are quite vulnerable to be tampered by the interceptors. The credibility of individuals can transform through falsified information in the images. Image tampering detection is an approach to identifying and finding the tampered components in the image. For the efficient detection of image tampering, the sufficient number of features are required which can be achieved by a deep learning architecture-based models without manual feature extraction of functions. In this research work, we have presented and implemented a cloud-based residual exploitation-based deep learning architectures to detect whether or not an image is being tampered. The proposed approach is implemented on the publicly available benchmark MICC-F220 dataset with the k -fold cross-validation approach to avoid the overfitting problem and to evaluate the performance metrics.


Sign in / Sign up

Export Citation Format

Share Document