CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Revealing Image Forgery on Digital Images by applying Contrast Enhancement

by Sonu John Jacob, Krishnalal G., Jagathy Raj V.P.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 15
Year of Publication: 2015
Authors: Sonu John Jacob, Krishnalal G., Jagathy Raj V.P.
10.5120/ijca2015906675

Sonu John Jacob, Krishnalal G., Jagathy Raj V.P. . Revealing Image Forgery on Digital Images by applying Contrast Enhancement. International Journal of Computer Applications. 127, 15 ( October 2015), 32-36. DOI=10.5120/ijca2015906675

@article{ 10.5120/ijca2015906675,
author = { Sonu John Jacob, Krishnalal G., Jagathy Raj V.P. },
title = { Revealing Image Forgery on Digital Images by applying Contrast Enhancement },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 15 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number15/22808-2015906675/ },
doi = { 10.5120/ijca2015906675 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:36.580149+05:30
%A Sonu John Jacob
%A Krishnalal G.
%A Jagathy Raj V.P.
%T Revealing Image Forgery on Digital Images by applying Contrast Enhancement
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 15
%P 32-36
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image manipulation is a malicious threat that is occurring nowadays. The trustworthiness of images is lost. Malicious users have many photo editing software's to manipulate images in many ways such as brightness changes, contrast manipulations and creating composite images. Here in this, it proposes two novel methods to detect contrast manipulations and composite images. First, it detects the manipulation of images by identifying the image's block level histogram. Second, we propose to identify the manipulation occurring in the images using a high frequency metric method. Once both the methods outputs are obtained it combines the outputs to obtain a final output. Finally it will be able to detect the manipulation that has occurred to the image. Results are summarized at the end and our system is compared with methods used.

References
  1. S. Bayram, H. T. Sencar and N. Memon, “An Efficient and Robust Method for Detecting Copy-move Forgery,” in Intl. Conf on Acoustics, Speech and Signal Processing, Taipei, 2009.
  2. Y.-F. Hsu and S.-F. Chang, “Image Splicing Detection Using Camera Response Function Consistency and Automatic Segmentation,” in Intl. Conf. on Multimedia and Expo, Beijing, 2007.
  3. I. Yerushalmy and H.Hel-Or, “Digital Image Forgery Detection Based on lens and sensor abberration,” Int J. Comput, Vis, vo 92, no. 1, pp. 71-91, 2011
  4. J.O’Brien and H. Farid “Exposing photo manipulation with inconsistent reflections,” ACM Trans. Graph, vol .31, no. 1, pp. 1-11,2012
  5. Z. Fan and R. L. Queiroz, “Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation,” IEEE Trans. on Image Processing, vol. 12, no. 2, pp. 230–235, 2003.
  6. T. Bianchi and A. Piva, “Detection of non – aligned double JPEG compression based on integer periodicty maps, “IEEE Trans. Inf.Forensics Security , vol 7, no.2, pp 842-848, Apr 2012
  7. M.C. Stamm and K.J.R.Liu, “Forensic estimation and reconstruction of a contrast enhancement mapping,” in Proc. IEEE Int Conf. Acoust. Speech Signal, Dallas,TX,USA, Mar.2010, pp 1698-1701
  8. P.Ferrara, T. Bianchiy, A. De Rosaz and A.Piya “Reverse Engineering of double compressed images in the presence of contrast enhancement,” inProc. IEEE Workshop Multimedia Signal Process, Pula, Croatioa, Sep/Oct. 2013, pp. 141-146.
  9. Gang Cao, Yao Zhao, Rongrong Ni, Xuelong Li, “Contrast Enhancement-Based Forensics in Digital Images”, Information Forensics and Security, IEEE Transactions on, on page(s): 515 – 525 Volume: 9, Issue: 3, March 2014
  10. M. C. Stamm and K. J. R. Liu, `Blind Forensics of Contrast Enhancement in Digital Images,'' IEEE Conferecne, Apr. 2008.
  11. J. Fan, H. Cao, and A. C. Kot, \emph{``Estimating EXIF parameters based on noise features for image manipulation detection,''} IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 608–618, Apr. 2013.
  12. M. C. Stamm and K. J. R. Liu, “Forensic detection of image manipulation using statistical intrinsic fingerprints,'' IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492–506, Sep. 2010
  13. Gang Cao, Yao Zhao, Rongrong Ni, “Forensic Estimation in Gamma Correction in Digital Images, " Proceedings of 2010 IEEE 17th International Conference on Image Processing September 26-29, 2010, Hong Kong
  14. Gang Cao, Yao Zhao, Rongrong Ni, ``Image Composition Detection Using Object-based Color Consistency,'' IEEE Proceedings of 9th International Conference on Signal Processing, 2008
  15. Zhen Fang, Shuozhong Wang, Xinpeng Zhang, ``Image Splicing Detection Using Color Edge Inconsistency,'' International Conference on Multimedia Information Networking and Security, 2010
Index Terms

Computer Science
Information Sciences

Keywords

Image Forgery Image Manipulation Brightness Peak Gap Gamma Correction