CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints

by Ajit Singh, Jyoti Malik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 19
Year of Publication: 2015
Authors: Ajit Singh, Jyoti Malik
10.5120/20444-2794

Ajit Singh, Jyoti Malik . A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints. International Journal of Computer Applications. 116, 19 ( April 2015), 16-21. DOI=10.5120/20444-2794

@article{ 10.5120/20444-2794,
author = { Ajit Singh, Jyoti Malik },
title = { A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 19 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number19/20444-2794/ },
doi = { 10.5120/20444-2794 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:57:35.008707+05:30
%A Ajit Singh
%A Jyoti Malik
%T A Comprehensive Study of Passive Digital Image Forensics Techniques based on Intrinsic Fingerprints
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 19
%P 16-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Over the past decade digital images has become a very popular way to communicate, store and process information. With the rapid advancement and easy availability of technology, there is a flood of devices that are able to capture, store and create digital images. Over the past years image processing techniques have been developed that makes it really easy to tamper images. From journalism to social media edited images are appearing everywhere with increasing frequency. Authentication of images is very necessary as visual data effects what people perceive and believe. Digital image Forensics is an emerging field that uses intrinsic and extrinsic methods to authenticate digital images. Passive techniques extract and analyze inherent patterns introduced by various image processing steps and use these artifacts to associate the image with source device as well as to detect tampering of the digital images. This paper gives an overview of passive techniques of Digital Image Forensics which are based on intrinsic fingerprints inherent in digital images.

References
  1. Alessandro Piva,. "An Overview on Image Forensics", ISRN Signal Processing Article ID 496701, 22 pages, Volume 2013
  2. Judith A. Redi, Wiem Taktak, and Jean-Luc Dugelay, "Digital image forensics: A booklet for beginners", Multimedia Tools and Applications, 51(1):133–162, 2010.
  3. H. T. Sencar, and N. Memon, "Overview of State-of-the-art in Digital Image Forensics", Part of Indian Statistical Institute Platinum Jubilee Monograph series titled Statistical Science and Interdisciplinary Research,' World Scientific Press, 2008.
  4. Sintayehu Dehnie, Husrev T. Sencar, and Nasir Memon, "Digital image forensics for identifying computer generated and digital camera images", In IEEE International Conference on Image Processing, pages 2313– 2316, 2006.
  5. K. S. Choi, E. Y. Lam, and K. K. Y. Wong, "Automatic source camera identification using the intrinsic lens radial distortion", In Optics Express, vol. 14, pp. 11551–11565, 2006.
  6. A. E. Dirik, H. T. Senear, and N. Memon, "Digital single lens reflex camera identification from traces of sensor dust", In IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 539–552, 2008.
  7. Ismail Avcibas, Sevinc Bayram, Nasir Memon, Mahalingam Ramkumar, and Bulent Sankur, "A classifier design for detecting image manipulations", In IEEE International Conference on Image Processing, pages 2645–2648, 2004.
  8. W Luo, Z Qu, F Pan, J Huang, "A survey of passive technology for digital image forensics", Frontiers of Computer Science in China 1 (2), 166-179, 2007.
  9. Tian-Tsong Ng, Shih-Fu Chang, Ching-Yung Lin, and Qibin Sun, "Multimedia Security Technologies for Digital Rights", chapter Passive-Blind Image Forensics, pages 383–412. Elsevier, 2006.
  10. Irene Amerini, Roberto Caldelli,, Alberto Del Bimbo and Giuseppe Serra, "A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery", IEEE Transactions on Information Forensics and Security, VOL. 6, NO. 3, September 2011.
  11. Chih-Ming Kung, Shu-Tsung Chao; Yen-Chen Tu, Yu-Hua Yan and Chih-Hsien Kung, "A Robust Watermarking and Image Authentication Scheme used for Digital Content Application", JOURNAL OF MULTIMEDIA, VOL. 4, NO. 3, JUNE 2009.
  12. Seyed Mohammad Mousavi, "Image Authentication Scheme using Digital Signature and Digital Watermarking", IJCEM International Journal of Computational Engineering & Management, Vol. 16 Issue 3, May 2013.
  13. J Sravanthi, Dr. MHM Krishna Prasad, "Robust and secure Digital Signature for Image Authentication over Wireless Channels", International Journal of Computer Trends and Technology- July to Aug Issue 2011.
  14. Sevinc Bayram, Husrev T. Sencar, Nasir Memon and Ismail Avcibas, "Source Camera Identification based on CFA Interpolation", in International Conference on Image Processing IEEE Genova, Italy, 2005.
  15. A. E. Dirik and N. Memon, "Image tamper detection based on demosaicing artifacts," in Proceedings of the International Conference on Image Processing (ICIP '09), pp. 1497–1500, IEEE, Cairo, Egypt, November 2009.
  16. Jan Lukas, Jessica Fridrich and Miroslav Goljan, "Determining digital image origin using sensor imperfections", In Proceeding. SPIE 5685, Image and Video Communications and Processing 2005.
  17. J. Fridrich, "Digital image forensic using sensor noise," in IEEE Signal Processing Magazine, vol. 26, no. 2, pages. 26–37, 2009.
  18. Ashwin Swaminathan, Min Wu, and K. J. Ray Liu, "Nonintrusive Component Forensics of Visual Sensors Using Output Images", in IEEE Transactions on Information Forensics and Security 2. 1, pages 91–106, March 2007.
  19. Wei Wang, Jing Dong, Tieniu Tan, "A Survey of Passive Image Tampering Detection", Digital Watermarking Lecture Notes in Computer Science, Volume 5703, pp 308-322 ,2009.
  20. Z. J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki, and N. Saitoh, "Methods for Identification of Images Acquired with Digital Cameras", Proc. of SPIE, Enabling Technologies for Law Enforcement and Security, vol. 4232, February 2001.
  21. K. S. Choi, E. Y. Lam, and K. K. Y. Wong, "Source camera identification using footprints from lens aberration", Proceedingsof the SPIE 2006.
  22. M. K. Johnson and H. Farid, "Exposing Digital Forgeries Through Chromatic Aberration", In ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006.
  23. H. Farid, "Digital Image Ballistics from JPEG Quantization",Technical Report, TR2006-583, Dartmouth College, Computer Science, 2006.
  24. Y. -F. Hsu and S. -F. Chang, "Detecting Image Splicing Using Geometry Invariants and Camera Characteristics consistency", In ICME, Toronto, Canada, July 2006.
  25. J. Fridrich, D. Soukal, and J. Lukas, "Detection of Copy- Move Forgery in Digital Images", Proc. of DFRWS 2003.
  26. J. Fridrich, "Image Watermarking for Tamper Detection," Proc. of IEEE International Conference on Image Processing (ICIP), vol. 2, pp. 404–408, Chicago, IL, Oct. 1998.
  27. M. Sreerama Murty, D. Veeraiah, A. Srinivas Rao ,"Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis", Signal & Image Processing : An International Journal (SIPIJ) Vol. 2, No. 2, June 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Image Forensics Digital Watermarking Forgery detection Intrinsic Fingerprints Passive Blind Image Forensics Source Identification.