Arpan Gupta, Amit Kumar, Tarun Chaudhary, Alka Leekha
{"title":"Detection and Localization of Tampered Image using Hash Functions*","authors":"Arpan Gupta, Amit Kumar, Tarun Chaudhary, Alka Leekha","doi":"10.1109/SPIN52536.2021.9566130","DOIUrl":null,"url":null,"abstract":"In this fast-developing world digital dependency has taken up great heights. With its immense usage comes the concept of revealing false information of an image to feed the dreadful intention which is called nothing but Image Forgery. The duplicated or forged image is operated in a way that detecting the tampered regions can be an exhaustible task. The paper exactly deals with such alterations in the structure of the image. It offers a Hashing technique, which as best described, helps to detect and locate the tampered regions of the image. A comparison of various Hash Functions like MD5 and SHA-2, in particular, is put into effect with its implementation highlighting the desired tampered region of the image which is facilitated by the sliding window approach.","PeriodicalId":343177,"journal":{"name":"2021 8th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th International Conference on Signal Processing and Integrated Networks (SPIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPIN52536.2021.9566130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this fast-developing world digital dependency has taken up great heights. With its immense usage comes the concept of revealing false information of an image to feed the dreadful intention which is called nothing but Image Forgery. The duplicated or forged image is operated in a way that detecting the tampered regions can be an exhaustible task. The paper exactly deals with such alterations in the structure of the image. It offers a Hashing technique, which as best described, helps to detect and locate the tampered regions of the image. A comparison of various Hash Functions like MD5 and SHA-2, in particular, is put into effect with its implementation highlighting the desired tampered region of the image which is facilitated by the sliding window approach.