Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
24-03-2011, 03:30 PM
Post: #1
IMAGE FORGERY DETECTION
Submitted by
Deepika Dileep


.ppt  IMAGE FORGERY DETECTION.ppt (Size: 2.5 MB / Downloads: 383)
IMAGE FORGERY DETECTION
Introduction

• We are living in an age where we are exposed to remarkable array of visual imagery.
• Today's digital technology had begun to erode the integrity of images.
• Over the past few years ,the field of digital forensics has emerged to restore some trust to digital images.
Digital Watermarking
• One solution to image authentication problem is digital watermarking.
• Water marking is actually a technique of message hiding in some image or text.
• The main advantage of using watermarks is to encode information which can prove ownership, e.g., copyrights .
• The drawback of this approach is that a watermark must be inserted at the time of recording, which would limit to specially equipped digital cameras.
Watermarking
Image Forensic Tools

• Over the last few years, there has been a growing body of work on tools for digital image forensics.
• These tools are capable of detecting tampering in images from any camera, without relying on watermarks or specialized hardware.
• Instead of watermarks, these tools assume that images possess certain regularities that are disturbed by tampering.
Tools
• Pixel-based
• Format-based
• Camera-based
• Physical-based
• Pixel-based
• The emphasis is on pixel
Techniques for detecting tampering:
 Cloning
 Resampling
 Splicing
 Statistical
Cloning
• The most common image manipulations is to clone portions of the image to conceal a person or object into screen.
• If done with care, it is difficult to detect cloning visually.
• Two algorithms have been developed to detect cloned image regions:
 PCA (Principal Component Analysis)
 DCT (Discrete Cosine Transformation)
Resampling
• To create a convincing composite, it is often necessary to resize, rotate or stretch portions of an image.
• Resampling introduces specific correlations between neighboring pixels.
• If it is known which pixels are correlated with their neighbors, then specific form of correlation is easily determined.
• But if neither is known, then a two step iterative algorithm EM (expectation/maximization) is used to solve the problem.
Splicing
• A common form of photographic manipulation is the digital splicing of two or more images into a single composite.
• If spicing is done, then it will disrupt higher-order statistics which results in tampering.
Statistical
• To randomly draw from the possible set of pixel combinations to obtain statistical regularities in natural images to detect image manipulations.
• Compute first and higher order statistics from a wavelet decomposition.
• Compute the bit agreements and disagreements across bit planes.
• Use linear search algorithm called Floating Forward algorithm, which differentiate authentic from manipulated images.
• Detect manipulations like resizing, filtering etc.
Format-Based
• Unique properties of lossy compression can be exploited for forensic analysis.
• Forensic technique that detect tampering deals with JPEG lossy compression scheme.
JPEG Quantization
• RGB image is first converted into luminance/chrominance space .
• The full quantization is achieved by DCT method which produce a table of 192 values representing the channel.
• These values changes according to low and high compression rates.
• When an image block is individually transformed or quantized ,artifacts appear at the border of neighboring blocks.
• When an image is cropped or recompressed ,the specific pattern is disrupted.
• Only limitation is that there is some overlap across cameras of different makes and models.
Double JPEG
• Both original and manipulated images are stored in JPEG format.
• In this scenario, the manipulated image is compressed twice.
• Double JPEG compression does not necessarily prove malicious tampering.
Camera-Based
• Techniques for modeling and estimating different camera artifacts:
 Chromatic Aberration
 Color Filter Array
 Camera Response
• Inconsistencies can be used as evidence of tampering.
Chromatic Aberration
• In an ideal imaging system, light passes through the lens and is focused to a single point on the sensor.
• Optical system, they fail to perfectly focus light of all wavelengths. The resulting effect is known as chromatic aberration.
• two forms: longitudinal and lateral.
• In both cases, chromatic aberration leads to various forms of color imperfections in the image.
• Lateral aberration manifests itself as a spatial shift in the locations where light of different wavelengths reach the sensor
• Local lateral aberration in a tampered region is inconsistent with global aberration.
Color Filter Array
Digital color image consist of 3 channels (RGB).
• Only a single color sample is recorded at each pixel location and other two samples are estimated from the neighboring samples.
• If specific form of correlation is known, then it is easy to determine which pixels are correlated with their neighbors.
• Any deviations from this pattern is an evidence for tampering.
Camera Response
• Most digital camera sensors are linear.
• There should be linear relationship between the amount of light measured by each sensor element and the corresponding pixel value.
• Difference in response function across an image results in tampering.
Physics -based
• When image is created by splicing together individual images ,there is often difficult to exactly match the lighting effects.
• There are techniques for estimating the properties of lighting environment.
• Differences in lighting across an image is the evidence of tampering.
Conclusion
• Today’s technology allows digital media to be altered and manipulated in ways that were simply impossible 20 years ago.
• As we continue to develop techniques for exposing photographic frauds, new techniques will be developed to make better fakes that are harder to detect.
• The field of image forensics, however, has made and will continue to make it harder and more time-consuming (but never impossible) to create a forgery that cannot be detected.
22-11-2012, 11:43 AM
Post: #2
RE: IMAGE FORGERY DETECTION
to get information about the topic "image tamper detection" full report ppt and related topic refer the link bellow

http://seminarprojects.com/Thread-image-...-detection

http://seminarprojects.com/Thread-image-...-detection
Rating IMAGE FORGERY DETECTION Options
Share IMAGE FORGERY DETECTION To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : tampering of jpeg image, detection of digital image forgery ppt, ppt presentation of detecting digital image forgery, image forgery detection for project work, image forgery detection seminar report, copy move image forgery detection ppt, image forgery detection seminar, image gorgery code, image forgery detection software, image tamparing detection techniques ppt, image forgery detection ppt, image forgery technology, image forgery detection download, seminar report on image forgery detection for download, image forgery detection live presentation, image forgery detection, image forgery seminar reportdownload, digital image tampering seminar, image forensics,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Protection of Data Base Security via Collaborative Inference Detection Report seminar projects maker 0 265 22-03-2014 04:24 PM
Last Post: seminar projects maker
  A RECENT SECURE INTRUSION DETECTION SYSTEM FOR MANETS pdf seminar projects maker 0 494 15-01-2014 12:26 PM
Last Post: seminar projects maker
  GRADIENT PROFILE PRIOR AND ITS APPLICATIONS IN IMAGE SUPER-RESOLUTION AND ENHANCEMENT seminar paper 1 824 10-01-2014 03:46 AM
Last Post: Guest
  Still Image Compression Using Wavelet Transform pdf study tips 0 528 06-09-2013 04:10 PM
Last Post: study tips
  Speed Detection of moving vehicle using speed cameras computer science crazy 25 30,433 16-05-2013 03:12 PM
Last Post: study tips
  Speed Detection of moving vehicle using speed cameras report study tips 0 606 13-04-2013 03:07 PM
Last Post: study tips
  Fast Search Strategies for Fractal Image Compression ppt seminar flower 1 1,141 23-03-2013 11:25 AM
Last Post: Guest
  Visual Cryptography for Color Image using Color Error Diffusion seminar ideas 1 1,085 05-02-2013 10:26 AM
Last Post: seminar tips
  NON TECHNICAL LOSS DETECTION IN POWER UTILITY USING SUPPORT VECTOR MACHINE REPORT project girl 0 372 25-01-2013 10:33 AM
Last Post: project girl
  DYNAMIC IMAGE RESIZING AND RESAMPLING MODULE REPORT project girl 0 479 15-01-2013 04:24 PM
Last Post: project girl
This Page May Contain What is IMAGE FORGERY DETECTION And Latest Information/News About IMAGE FORGERY DETECTION,If Not ...Use Search to get more info about IMAGE FORGERY DETECTION Or Ask Here

Options: