CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Image Forensics to Detect Image Authenticity using Error Level Analysis and Noise Analysis Methods

by Ocha Maulidya, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 28
Year of Publication: 2023
Authors: Ocha Maulidya, Imam Riadi
10.5120/ijca2023923026

Ocha Maulidya, Imam Riadi . Image Forensics to Detect Image Authenticity using Error Level Analysis and Noise Analysis Methods. International Journal of Computer Applications. 185, 28 ( Aug 2023), 6-11. DOI=10.5120/ijca2023923026

@article{ 10.5120/ijca2023923026,
author = { Ocha Maulidya, Imam Riadi },
title = { Image Forensics to Detect Image Authenticity using Error Level Analysis and Noise Analysis Methods },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 28 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number28/32866-2023923026/ },
doi = { 10.5120/ijca2023923026 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:15.067185+05:30
%A Ocha Maulidya
%A Imam Riadi
%T Image Forensics to Detect Image Authenticity using Error Level Analysis and Noise Analysis Methods
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 28
%P 6-11
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital development is so rapid that it is easy to change the image, especially the image on the image. It can be made and changed as desired if taking the definition of a digital image itself is evidence of information technology presenting an object in a computer device. Processing images like this is easy, even without leaving a trace of its use. The rapid development of editing tools makes manipulating image images easier for technology users. There are examples of three image manipulation techniques: splicing imagery, copy-move image, and retouching imagery. Image manipulation can also be dangerous because there are many cases of spreading unsubstantiated hoax news, including the spread of fake photos. If left unchecked, this will impact thinking and visualization, where people cannot distinguish between real and fake news. This is the basis for conducting this research, detecting changes in an image using the Error Level Analysis and Noise Analysis methods. This research is expected to produce and provide good results in detecting these image objects to help users and increase knowledge.

References
  1. A. Apriliani, K. Hijjayanti, and Suhairoh, "Image Authenticity Analysis Using Exif Metadata,” vol. 5, no. 1, pp. 84-85, 2020, doi: 10.24114/ cess.v5i1.15600.
  2. W.Y. Sulistyo, I. Riadi, and A. Yudhana, “Analysis of Image Authenticity Detection Using Error Level Analysis with Forensicallybeta,” vol. 1, no. 1, pp. 154, 2018.
  3. T.R. Hidayat, “Web-based Photo Forensics Application”, 1st ed, STIMIK AKAKOM, Yogyakarta, 2017.
  4. Irwansyah, H. Yudiastuti, “Digital Forensic Analysis of Engineering Images Using JPEGSNOOP and Forensicallybeta”, vol. 21, no. 1, pp. 55-59, 2019, doi:10.33557/jurnalmatrik.v21i1.518.
  5. A.Y. Wijaya, " Development of Block Matching Method for Copy Move Detection in Image Forgery," JUTI: Jurnal Ilmiah Teknologi Informasi, vol.15, no. 1, pp. 84-94, 2017, doi: 10.12962/j24068535.v15i1.a638.
  6. B. Darmawan, A. Sasmitha, and P.W. Buana, “Development of Image Modification Detection Method Using Error Level Analysis Method,” vol. 7, no. 1, pp. 29-35, 2019, doi:10.24843/JIM.2019.v07.i01.p04.
  7. M. Subli, M.M. Efendi, “Comparison of Hoax Photo Analysis Results Using the Exif/Metadata Method,” 1st ed, Widina Bhakti Persada Bandung, 2021, Bab 1, pp. 1-3.
  8. M.R. Al-Fajri, Carudin, and D. Yusup, “Forensic Image Analysis in Detecting Image File Engineering with the NIST Method”, vol. 6, no. 2, pp.84-90, 2021, doi: 10.32528/justindo.v6i2.5120.
  9. D.A. Faroek, R. Umar and I. Riadi, “Image Authenticity Detection Using Error Level Analysis (ELA) and Principal Component Analysis (CPA),” vol. 8, no. 2, pp. 132-137, 2019, doi: 10.22441/format.2019.v8.i2.006.
  10. Y.M. Djaksana, A.K. Rivai, and D. Supriyadi, “Analysis of Image Manipulation (ImageForgery) Using the Integration of Error Level Analysis and Block Matching Methods,” vol. 12, no. 1, pp. 79-84, 2018.
  11. F. Harahap, “Photo Manipulation Detection with Forensicallybeta and Imageforensic.org Tools with Error Level Analysis (ELA) Method,” vol. 2, no. 3, pp. 159-164, 2021.
  12. C. Juditha, “Hoax Communication Interactivity in Social Media and Anticipation”, vol. 3, no. 1, pp. 31-44, 2018, doi: 10.30818/jpkm.2018.2030104.
  13. A.S. Primastuti, “Developing of Image Detection System with JPG Format using Error Level Analysis Technique,” vol. 184, no. 2, pp. 41-47, 2022, doi: 10.5120/ijca2022921977.
  14. A.Wicaksono, N. Mardiyantoro, and H. Sibyan, “Application of Error Level Analysis Method to Detect Digital Image Modification,” vol. 1, no. 1, pp. 62-69, 2022.
  15. RN. Pambayun, “Analysis of Trim Features on Solid State Drives for Digital Forensics Cases,” 1st ed, Muhammadiyah Purwokerto University, 2018.
  16. X. Zhao, J. Li, S. Li, and S. Wang, “Detecting digital citra splicing in chroma spaces,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6526 LNCS, pp. 12-22, 2011.
  17. P. N. Andono, T. Sutojo and Muljono, “Digital Image Processing”, Yogyakarta: Penerbit Andi, 2017.
  18. F. Z. Emeraldien, R. J. Sunarsono and R. Alit, "Twitter as a Political Communication Platform in Indonesia," SCAN Jurnal Teknologi Informasi dan Komunikasi, vol. 14, no. 1, pp. 21-30, 2019.
  19. "Image Engineering," [Online]. Available: https://www.image-engineering.de/library/image-quality/factors/1080-noise. [Accessed 2022].
  20. "LMS SPADA INDONESIA," Kemendikbud, 2021. [Online]. Available: https://lmsspada.kemdikbud.go.id/mod/page/view.php?id=57362. [Accessed 2022].
  21. "National Institute of Justice (NIJ)," U.S Department of Justice, [Online]. Available: https://nij.ojp.gov/digital-evidence-and-forensics. [Accessed 2022].
  22. Sunardi, I. Riadi and I. M. Nasrulloh, " Solid State Drive (SSD) Forensic Analysis Using the GRR Rapid Response Framework," Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 6, no. 5, pp. 509-518, 2019.
  23. W. T. Handoko, E. Ardhianto and E. Safriliyanto, "Analisis Dan Implementasi Image Denoising dengan Metode Normal Shrink sebagai Wavelet Thresholding Analysis," Jurnal Teknologi Informasi DINAMIK, vol. 16, no. 1, pp. 56-63, 2011.
  24. G. H. A. Kusuma and I. N. Prawiranegara, “Digital Forensic Analysis of CCTV Video Recordings Using Metadata and Hash,” Prosiding Seminar Nasional Sisfotek (Sistem Informasi dan Teknologi Informasi), vol. 3, no. 1, pp. 223-227, 2019
  25. S. Ratna, " Digital Image Processing and Histogram with Phyton and Text Editor Phycharm," Jurnal Ilmiah “Technologia,” vol. 11, no. 3, pp. 181-186, 2020.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensics Image Forensics Digital Imagery Error Level Analysis Noise Analysis Twitter ForensicallyBeta