Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

Image Forensic for detecting Splicing Image with Distance Function

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Imam Riadi, Abdul Fadlil, Titi Sari
10.5120/ijca2017914729

Imam Riadi, Abdul Fadlil and Titi Sari. Image Forensic for detecting Splicing Image with Distance Function. International Journal of Computer Applications 169(5):6-10, July 2017. BibTeX

@article{10.5120/ijca2017914729,
	author = {Imam Riadi and Abdul Fadlil and Titi Sari},
	title = {Image Forensic for detecting Splicing Image with Distance Function},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {169},
	number = {5},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {6-10},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume169/number5/27979-2017914729},
	doi = {10.5120/ijca2017914729},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In the era of digital image, good editing software allows users to process digital images in an easy way. It is inevitable, which, unfortunately leads to the widespread of image forgery. Hence, an image fraud detection tool is essential to verify the authenticity of a digital image. The rapid growth of digital image manipulation has prompted writers on forensic image to reveal their authenticity. Manipulations are commonly found in image formats such as Joint Photographic Experts Group (JPEG). JPEG is the most common format supported by devices and apps. Therefore, the researchers will analyze measurement of forensic image similarity using distance function method, while image manipulation is used specially on image splicing. The results of this study show that distance function can be 2 different images.

References

  1. Handoko W.T., Ardhianto E. dan E. Safriliyanto. 2011. “Analisis Dan Imp lementasi Image Denoising dengan Metode Normal Shrink sebagai Wavelet Thresholding Analysis”. Jurnal Teknologi Informasi DINAMIK. 16 (1): 56 - 63.
  2. Lin Weiyao, Qazi Tanzeela, Hayat Khizar, Khan Samee U., Madani Sajjad A., Khan Imran A., Kołodziej Joanna, Li Hongxiang, Yow Kin Choong, Zhong Xu Cheng, 2013 "Survey on blind image forgery detection,", Volume 7, Issue 7, 2013 , p. 660 – 670, IET Image Processing.
  3. Zhao X., J. Li, S. Li, and S. Wang, 2011,” Detecting digital citra splicing in chroma spaces, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics)”, vol. 6526 LNCS, pp. 12–22.
  4. Hussain Muhammad, Qasem Sahar, bebis George, Muhammad Ghulam, Aboalsamh Hatim, Mathkour Hassan, 2014, “Evaluation of image forgery detection using multi-scale Weber local descriptors”Vol. XX, No. X (2014) 1–27, International Journal on Artificial Intelligence Tools
  5. Cok D. R., 1996, “Cloning Technique For Digital Citra Retouching,”.
  6. Sadeghi Somayeh, Jalab Hamid A., and Dadkhah Sajjad, 2012 “Efficient Copy-Move Forgery Detection for Digital Citras,” World Acad. Sci. Eng. Technol., vol. 71, no. 11, pp. 542–546, World Academy of Science, Engineering and Technology
  7. Sari Titi, Riadi Imam, Fadlil Imam, 2016. “Image Forensics for File Engineering Detection Using Error Level Analysis”, ISBN : 979-587-626-0 UNSRI Vol-2, No.1(2016), Annual Research Seminar (ARS)
  8. Chen. Y.-L and Hsu. C.-T, 2-11 “Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection”, Volume: 6, Issue: 2. IEEE Transactions on Information Forensics and Security.
  9. Bianchi Tiziona and Piva Alexandro, 2012. , “Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts”,Volume: 7, Issue: 3, IEEE Signal Processing Society
  10. Rancher, A . C . 2004. “Methods of Multivariate Analysis Second Edition” . Joh Wiley& Sons, Canada.
  11. Hair Jr., Joseph F., Black, William C., Babin, Barry C., dan Ro lph E. Anderson. 2010. “Multivariate Data Analysis 7/e”. Pearson Prentice Hall, New Jersey.
  12. Yampolskiy, Roman P. and Venu Govindaraju. 2005. “Similarity Measure Functions for Strategy Based Bio metrics”. International Journal of Biological and Life Sciences . 1(4): 227- 228.
  13. Royce Winston, 1970, “Managing The Development of Large Software Systems”, page 1-9, IEEE Wascon.

Keywords

Image, Forensics, Splicing, Distance Function.