Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
24-03-2011, 03:30 PM
Post: #1

Submitted by
Deepika Dileep

.ppt  IMAGE FORGERY DETECTION.ppt (Size: 2.5 MB / Downloads: 417)

• We are living in an age where we are exposed to remarkable array of visual imagery.
• Today's digital technology had begun to erode the integrity of images.
• Over the past few years ,the field of digital forensics has emerged to restore some trust to digital images.
Digital Watermarking
• One solution to image authentication problem is digital watermarking.
• Water marking is actually a technique of message hiding in some image or text.
• The main advantage of using watermarks is to encode information which can prove ownership, e.g., copyrights .
• The drawback of this approach is that a watermark must be inserted at the time of recording, which would limit to specially equipped digital cameras.
Image Forensic Tools

• Over the last few years, there has been a growing body of work on tools for digital image forensics.
• These tools are capable of detecting tampering in images from any camera, without relying on watermarks or specialized hardware.
• Instead of watermarks, these tools assume that images possess certain regularities that are disturbed by tampering.
• Pixel-based
• Format-based
• Camera-based
• Physical-based
• Pixel-based
• The emphasis is on pixel
Techniques for detecting tampering:
 Cloning
 Resampling
 Splicing
 Statistical
• The most common image manipulations is to clone portions of the image to conceal a person or object into screen.
• If done with care, it is difficult to detect cloning visually.
• Two algorithms have been developed to detect cloned image regions:
 PCA (Principal Component Analysis)
 DCT (Discrete Cosine Transformation)
• To create a convincing composite, it is often necessary to resize, rotate or stretch portions of an image.
• Resampling introduces specific correlations between neighboring pixels.
• If it is known which pixels are correlated with their neighbors, then specific form of correlation is easily determined.
• But if neither is known, then a two step iterative algorithm EM (expectation/maximization) is used to solve the problem.
• A common form of photographic manipulation is the digital splicing of two or more images into a single composite.
• If spicing is done, then it will disrupt higher-order statistics which results in tampering.
• To randomly draw from the possible set of pixel combinations to obtain statistical regularities in natural images to detect image manipulations.
• Compute first and higher order statistics from a wavelet decomposition.
• Compute the bit agreements and disagreements across bit planes.
• Use linear search algorithm called Floating Forward algorithm, which differentiate authentic from manipulated images.
• Detect manipulations like resizing, filtering etc.
• Unique properties of lossy compression can be exploited for forensic analysis.
• Forensic technique that detect tampering deals with JPEG lossy compression scheme.
JPEG Quantization
• RGB image is first converted into luminance/chrominance space .
• The full quantization is achieved by DCT method which produce a table of 192 values representing the channel.
• These values changes according to low and high compression rates.
• When an image block is individually transformed or quantized ,artifacts appear at the border of neighboring blocks.
• When an image is cropped or recompressed ,the specific pattern is disrupted.
• Only limitation is that there is some overlap across cameras of different makes and models.
Double JPEG
• Both original and manipulated images are stored in JPEG format.
• In this scenario, the manipulated image is compressed twice.
• Double JPEG compression does not necessarily prove malicious tampering.
• Techniques for modeling and estimating different camera artifacts:
 Chromatic Aberration
 Color Filter Array
 Camera Response
• Inconsistencies can be used as evidence of tampering.
Chromatic Aberration
• In an ideal imaging system, light passes through the lens and is focused to a single point on the sensor.
• Optical system, they fail to perfectly focus light of all wavelengths. The resulting effect is known as chromatic aberration.
• two forms: longitudinal and lateral.
• In both cases, chromatic aberration leads to various forms of color imperfections in the image.
• Lateral aberration manifests itself as a spatial shift in the locations where light of different wavelengths reach the sensor
• Local lateral aberration in a tampered region is inconsistent with global aberration.
Color Filter Array
Digital color image consist of 3 channels (RGB).
• Only a single color sample is recorded at each pixel location and other two samples are estimated from the neighboring samples.
• If specific form of correlation is known, then it is easy to determine which pixels are correlated with their neighbors.
• Any deviations from this pattern is an evidence for tampering.
Camera Response
• Most digital camera sensors are linear.
• There should be linear relationship between the amount of light measured by each sensor element and the corresponding pixel value.
• Difference in response function across an image results in tampering.
Physics -based
• When image is created by splicing together individual images ,there is often difficult to exactly match the lighting effects.
• There are techniques for estimating the properties of lighting environment.
• Differences in lighting across an image is the evidence of tampering.
• Today’s technology allows digital media to be altered and manipulated in ways that were simply impossible 20 years ago.
• As we continue to develop techniques for exposing photographic frauds, new techniques will be developed to make better fakes that are harder to detect.
• The field of image forensics, however, has made and will continue to make it harder and more time-consuming (but never impossible) to create a forgery that cannot be detected.
22-11-2012, 11:43 AM
Post: #2
to get information about the topic "image tamper detection" full report ppt and related topic refer the link bellow


Share IMAGE FORGERY DETECTION To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : tampering of jpeg image, detection of digital image forgery ppt, ppt presentation of detecting digital image forgery, image forgery detection for project work, image forgery detection seminar report, copy move image forgery detection ppt, image forgery detection seminar, image gorgery code, image forgery detection software, image tamparing detection techniques ppt, image forgery detection ppt, image forgery technology, image forgery detection download, seminar report on image forgery detection for download, image forgery detection live presentation, image forgery detection, image forgery seminar reportdownload, digital image tampering seminar, image forensics,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
Last Post: mkaasees
  An Efficient Outlier Detection Using Amalgamation of Clustering and Attribute-Entropy mkaasees 0 0 17-09-2016 04:36 PM
Last Post: mkaasees
Last Post: mkaasees
  An in-depth analysis on traffic flooding attacks detection and system dhanabhagya 0 182 30-01-2016 12:11 PM
Last Post: dhanabhagya
  Copyright Protection of Digital Image dhanabhagya 0 166 23-01-2016 03:27 PM
Last Post: dhanabhagya
  An automatic collision detection and acceleration dhanabhagya 0 151 09-01-2016 01:43 PM
Last Post: dhanabhagya
  Image processing dhanabhagya 0 286 06-01-2016 04:44 PM
Last Post: dhanabhagya
  Secure ATM by Image Processing presentation Abstract 2 1,050 14-08-2015 12:28 PM
Last Post: mkaasees
  Intrution Detection System presentation Abstract 0 153 29-05-2015 02:31 PM
Last Post: presentation Abstract
  Speed Detection of moving vehicle using speed cameras presentation Abstract 0 154 28-05-2015 04:00 PM
Last Post: presentation Abstract
This Page May Contain What is IMAGE FORGERY DETECTION And Latest Information/News About IMAGE FORGERY DETECTION,If Not ...Use Search to get more info about IMAGE FORGERY DETECTION Or Ask Here