tampered image
Recently Published Documents


TOTAL DOCUMENTS

34
(FIVE YEARS 14)

H-INDEX

5
(FIVE YEARS 2)

Author(s):  
C. Vijesh Joe ◽  
Jennifer S. Raj

Cloud applications that work on medical data using blockchain is used by managers and doctors in order to get the image data that is shared between various healthcare institutions. To ensure workability and privacy of the image data, it is important to verify the authenticity of the data, retrieve cypher data and encrypt plain image data. An effective methodology to encrypt the data is the use of a public key authenticated encryption methodology which ensures workability and privacy of the data. But, there are a number of such methodologies available that have been formulated previously. However, the drawback with those methodologies is their inadequacy in protecting the privacy of the data. In order to overcome these disadvantages, we propose a searchable encryption algorithm that can be used for sharing blockchain- based medical image data. This methodology provides traceability, unforgettable and non-tampered image data using blockhain technology, overcoming the drawbacks of blockchain such as computing power and storage. The proposed work will also sustain keyword guessing attacks apart from verification of authenticity and privacy protection of the image data. Taking these factors into consideration, it is determine that there is much work involved in providing stronger security and protecting privacy of data senders. The proposed methodology also meets the requirement of indistinguishability of trapdoor and ciphertext. The highlights of the proposed work are its capability in improving the performance of the system in terms of security and privacy protection.


Author(s):  
S Devi ◽  
V Karthik ◽  
S Baga Vathi Bavatharani ◽  
K Indhumadhi

2021 ◽  
Vol 7 (8) ◽  
pp. 134
Author(s):  
Miki Tanaka ◽  
Sayaka Shiota ◽  
Hitoshi Kiya

SNS providers are known to carry out the recompression and resizing of uploaded images, but most conventional methods for detecting fake images/tampered images are not robust enough against such operations. In this paper, we propose a novel method for detecting fake images, including distortion caused by image operations such as image compression and resizing. We select a robust hashing method, which retrieves images similar to a query image, for fake-image/tampered-image detection, and hash values extracted from both reference and query images are used to robustly detect fake-images for the first time. If there is an original hash code from a reference image for comparison, the proposed method can more robustly detect fake images than conventional methods. One of the practical applications of this method is to monitor images, including synthetic ones sold by a company. In experiments, the proposed fake-image detection is demonstrated to outperform state-of-the-art methods under the use of various datasets including fake images generated with GANs.


2021 ◽  
Vol 14 (3) ◽  
pp. 38
Author(s):  
Azhar Hadmi ◽  
Awatif Rouijel

Perceptual image hashing system generates a short signature called perceptual hash attached to an image before transmission and acts as side information for analyzing the trustworthiness of the received image. In this paper, we propose a novel approach to improve robustness for perceptual image hashing scheme for generating a perceptual hash that should be resistant to content-preserving manipulations, such as JPEG compression and Additive white Gaussian noise (AWGN) also should differentiate the maliciously tampered image and its original version. Our algorithm first constructs a robust image, derived from the original input by analyzing the stability of the extracted features and improving their robustness. From the robust image, which does perceptually resemble the original input, we further extract the final robust features. Next, robust features are suitably quantized allowing the generation of the final perceptual hash using the cryptographic hash function SHA1. The main idea of this paper is to transform the original image into a more robust one that allows the extraction of robust features. Generation of the robust image turns out be quite important since it introduces further robustness to the perceptual image hashing system. The paper can be seen as an attempt to propose a general methodology for more robust perceptual image hashing. The experimental results presented in this paper reveal that the proposed scheme offers good robustness against JPEG compression and Additive white Gaussian noise.


2021 ◽  
Vol 11 (7) ◽  
pp. 3187
Author(s):  
Rogelio Reyes-Reyes ◽  
Clara Cruz-Ramos ◽  
Volodymyr Ponomaryov ◽  
Beatriz P. Garcia-Salgado ◽  
Javier Molina-Garcia

In this paper, a fragile watermarking scheme for color image authentication and self-recovery with high tampering rates is proposed. The original image is sub-sampled and divided into non-overlapping blocks, where a watermark used for recovery purposes is generated for each one of them. Additionally, for each recovery watermark, the bitwise exclusive OR (XOR) operation is applied to obtain a single bit for the block authentication procedure. The embedding and extraction process can be implemented in three variants (1-LSB, 2-LSB or 3-LSB) to solve the tampering coincidence problem (TCP). Three, six or nine copies of the generated watermarks can be embedded according to the variant process. Additionally, the embedding stage is implemented in a bit adjustment phase, increasing the watermarked image quality. A particular procedure is applied during a post-processing step to detect the regions affected by the TCP in each recovery watermark, where a single faithful image used for recovery is generated. In addition, we involve an inpainting algorithm to fill the blocks that have been tampered with, significantly increasing the recovery image quality. Simulation results show that the proposed framework demonstrates higher quality for the watermarked images and an efficient ability to reconstruct tampered image regions with extremely high rates (up to 90%). The novel self-recovery scheme has confirmed superior performance in reconstructing altered image regions in terms of objective criteria values and subjective visual perception via the human visual system against other state-of-the-art approaches.


2021 ◽  
Vol 11 (3) ◽  
pp. 1146
Author(s):  
Cheonshik Kim ◽  
Ching-Nung Yang

Research on self-embedding watermarks is being actively conducted to solve personal privacy and copyright problems by image attack. In this paper, we propose a self-embedded watermarking technique based on Absolute Moment Block Truncation Coding (AMBTC) for reconstructing tampered images by cropping attacks and forgery. AMBTC is suitable as a recovery bit (watermark) for the tampered image. This is because AMBTC has excellent compression performance and image quality. Moreover, to improve the quality of the marked image, the Optimal Pixel Adjustment Process (OPAP) method is used in the process of hiding AMBTC in the cover image. To find a damaged block in a marked image, the authentication data along with the watermark must be hidden in the block. We employ a checksum for authentication. The watermark is embedded in the pixels of the cover image using 3LSB and 2LSB, and the checksum is hidden in the LSB. Through the recovering procedure, it is possible to recover the original marked image from the tampered marked image. In addition, when the tampering ratio was 45%, the image (Lena) could be recovered at 36 dB. The proposed self-embedding method was verified through an experiment, and the result was the recovered image showed superior perceptual quality compared to the previous methods.


2020 ◽  
Vol 8 (5) ◽  
pp. 4425-4429

It is easy make fake images by making use of editing software. It has become an effortless job to put together or detach some attributes from an image. Validation of digital images is very essential. Identifying the fake image is the crucial topic. In order to identify tampered image active and passive detection methods are used. An image can be tampered by using image splicing, copy-move, and retouching. In particular, copy-move attack is considered in this paper. It is essential to find out whether the image is tampered or not. An effective method for detecting forged image is proposed which uses adhoc algorithm. In this algorithm there is no need of original image as it compares the similar pixels in the given image. Clusters which are larger than block size are pulled out. Similar clusters are extracted using some similarity function. The method successfully detects the forged parts in the image and saves the forged image in JPEG format. The performance is measured on various images.


2019 ◽  
Vol 8 (3) ◽  
pp. 5926-5929

Blind forensic-investigation in a digital image is a new research direction in image security. It aims to discover the altered image content without any embedded security scheme. Block and key point based methods are the two dispensation options in blind image forensic investigation. Both the techniques exhibit the best performance to reveal the tampered image. The success of these methods is limited due to computational complexity and detection accuracy against various image distortions and geometric transformation operations. This article introduces different blind image tampering methods and introduces a robust image forensic investigation method to determine the copy-move tampered image by means of fuzzy logic approach. Empirical outcomes facilitate that the projected scheme effectively classifies copy-move type of forensic images as well as blurred tampered image. Overall detection accuracy of this method is high over the existing methods.


Sign in / Sign up

Export Citation Format

Share Document