A forensic method for detecting image forgery

S. Mahalakshmi, Dr. K. Vijayalakshmi, E. Agnes
{"title":"A forensic method for detecting image forgery","authors":"S. Mahalakshmi, Dr. K. Vijayalakshmi, E. Agnes","doi":"10.1109/ICE-CCN.2013.6528568","DOIUrl":null,"url":null,"abstract":"An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we propose a new method that makes use of the codebook which is generated from the set of image features to determine the geometric manipulations that are occurred in the received image. In the proposed method, an image hash based on bag of visual words attached as signature to the image before transmission. At the destination the forensic hash is compared to detect the geometric manipulations that are applied to the received image. The spatial distribution of image features is encoded to deal with highly textured and contrasted tampering patterns. The proposed method detects all types of tampering.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICE-CCN.2013.6528568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we propose a new method that makes use of the codebook which is generated from the set of image features to determine the geometric manipulations that are occurred in the received image. In the proposed method, an image hash based on bag of visual words attached as signature to the image before transmission. At the destination the forensic hash is compared to detect the geometric manipulations that are applied to the received image. The spatial distribution of image features is encoded to deal with highly textured and contrasted tampering patterns. The proposed method detects all types of tampering.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种检测图像伪造的法医方法
互联网上可用的软件技术的广泛发展导致图像被篡改。现实世界中的主要问题是确定图像是真实的还是伪造的。在本文中,我们提出了一种利用从图像特征集生成的码本来确定接收图像中发生的几何操作的新方法。在该方法中,基于视觉词包的图像哈希在传输前作为签名附加在图像上。在目的地比较取证哈希值,以检测应用于接收图像的几何操作。对图像特征的空间分布进行编码,以处理高度纹理化和对比篡改模式。提出的方法检测所有类型的篡改。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Removing snow from an image via image decomposition Maximum a posteriori adaptation method for video semantic indexing Low power 8×8 Sum of Absolute Difference engine for Motion Estimation in video compression A modified preamble structure based carrier frequency offset (CFO) and phase noise compensation in an OFDM system Multiple learning based classifiers using layered approach and Feature Selection for attack detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1