Anti- Forensics of Median Filtered Image using Non-Linear Optimization Techniques

Authors

  • Seema, Ms. Swati Gupta, Mr. Bijender Bansal, Dr. Deepak Goyal, Dr. Monika Goyal

Keywords:

Digital image forensics, forgery, image authentication, tampering detection, passive forensics, anti-forensics.

Abstract

The growth of experienced image processing and editing software has made the manipulation of digital images easy and imperceptible to the naked eyes. This has increased the demand to assess the trustworthiness of digital images when utilized in crime investigation, as evidence in court of law and for surveillance purposes. This paper presents a comprehensive investigation of the progress and challenges within the field of digital image forensics to assist the beginners in developing the understanding, apprehending the wants and identifying the research gaps in this domain.

References

Cheddad A. Doctored Image Detection: A Brief Introduction to Digital Image Forensics. Inspire magazine, July 2012.

Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kolodziej J, Li H, Lin WYCK, Xu CZ. Survey on Blind Image Forgery Detection. ET Image Processing 2013; 7(1), 1–11.

Guoqian Z and Dianji L. An Overview of Digital Watermarking in Image Forensics. In: Proc. of 4th IEEE International Joint Conference on Computational Sciences and Optimization, 2011, pp. 332-335.

Swaminathan A, Wu M and Liu KJR. Digital Image Forensics via Intrinsic Fingerprints. IEEE Trans on Information Forensics and Security 2008; 3(1), 101-117.

Weiqi L, Zhenhua Q, Feng P and Jiwu H. A Survey of Passive Technology for Digital Image Forensics. Review article, Front. Comput. China 2007.

Abhijtha E, Karthick VJA. Forensic Technique for Detecting Tamper in Digital Image Compression. International Journal of Advanced Research in Computer and Communication Engineering 2013; 2(3), 1325-1330.

www.cambridgeincolour.com/learn-photography-concepts.htm

Kirchner M. Efficient Estimation of CFA Pattern Configuration in Digital Camera Images. SPIE 2010; 7541.

Lyu S, Farid H. How realistic is photorealistic? IEEE Trans Signal Processing 2005; 53(2), 845-850.

Ng TT, Chang SF, Hsu J, et al. Physics Motivated Features for Distinguishing Photographic Images and Computer Generated Graphics. In: Proc. of ACM Multimedia November 2005; 5, 239-248.

Ke Y, Shan Q, Qin F, Min W. Image Recapture Detection using Multiple Features. International Journal of Multimedia and Ubiquitous Computing 2013; 8(5), 71-82.

Wang X, Liu Y, Xu B, Li L, Xue J. A Statistical Feature Based Approach to Distinguish PRCG from Photographs. Computer Vision and Image Understanding 2014; 128, 84-93.

Farid H. Image Forgery detection: A Survey. IEEE Signal Processing Magazine 2009; 16-25.

Bayram S., Sencar HT., Memon N. A Survey of Copy-move Forgery Detection Techniques. Unknown 2008.

Lin HJ, Wang CW, Wu TY. Fast Copy-Move Forgery Detection. WSEAS Trans on Signal Processing May 2008; 5(5), 188-197.

Singh VK, Tripathi RC. Fast and Efficient Copy-Move Forgery Detection in Digital Images using Sub-Region Duplication. International Journal of Advanced Science and Technology 2011.

Yang B, Su W, Chen X, Zhang L, Li X. An Efficient Process Model for Copy-move Forgery Detection based on DWT-SVD. Pattern Recognition December 2013; 22(3),1008-1015.

Chaiwanatnanon K. Detection of Copy-Move Forgery by Clustering Technique. In: Proc. of International Conference on Image, Vision and Computing, 2010; 5.

Zimba M, Xingming S. DWT-PCA (EVD) Based Copy-move Image Forgery Detection. International Journal of Digital Content Technology and its Applications 2011; 5(1).

Bayram S, Sencar HT, Memon N. An Efficient and Robust Method for Detecting Copy-move Forgery. In: Proc of ACSSP2008; pp. 105-108.

Popescu AC, Farid H. Exposing Digital Forgeries by Detecting Traces of Resampling. IEEE Transactions on Signal Processing 2005; 53, 758-767.

Yao Q, Christine R, Eli A. A Study on Features for the Detection of Copy-Move Forgeries. In: Proc. Of SICHERHEIT 2010; 105-110.

Usteba O, Christain R, Johannes J, Cristina R, Eli A. An Evaluation of Popular Copy-Move Forgery Detection Approaches. IEEE Trans on Information Forensics and Security 2010; 2760-2770.

Kaur A, Sharma R. Optimization of Copy-Move Forgery Detection Technique. International Journal of Advanced Research in Computer Science and Software Engineering 2013;3(3),567-578.

Kaur A, Sharma R. Copy-Move Forgery Detection using DCT and SVD. International Journal of Computer Applications July 2013.

Kumar S, Desai JV, Mukklejee S, Das PR. Suitability of Independent Component Analysis in Digital Image Forgery Detection. International Journal of Engineering and Technology Feb-Mar 2013; 5(1), 205-231.

Reiner A, Matthias KC. Counter-forensics: Attacking Image Forensics. Digital Image Forensics 2008; 231-243.

Kirchner M, Fridrich J. Dealing with Defaming Image forensics. Information Hiding. Lect. Notes Comput. Sci. 4567. T. Furon, F. Cayre, and G. Doërr, Eds. Berlin, Germany: Springer-Verlag, 2007; 31-44.

Stamm MC, Liu RL, Barni M. Anti-Forensics of Digital Image Processing. IEEE 17th International Conference on Image Processing (ICIP), 2011.

Matthew CS, Steven RW, Sabrina L, Ray KJL. Anti-forensics of Hybrid Compression. In: Proc. of ICCCT 2010.

Downloads

How to Cite

Seema, Ms. Swati Gupta, Mr. Bijender Bansal, Dr. Deepak Goyal, Dr. Monika Goyal. (2020). Anti- Forensics of Median Filtered Image using Non-Linear Optimization Techniques. International Journal of Research & Technology, 8(4), 95–102. Retrieved from https://ijrt.org/j/article/view/530

Similar Articles

<< < 19 20 21 22 23 24 

You may also start an advanced similarity search for this article.