CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art

by Deepali N. Pande, A. R. Bhagat Patil, Antara S. Bhattacharya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 2
Year of Publication: 2014
Authors: Deepali N. Pande, A. R. Bhagat Patil, Antara S. Bhattacharya
10.5120/15476-4165

Deepali N. Pande, A. R. Bhagat Patil, Antara S. Bhattacharya . Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art. International Journal of Computer Applications. 89, 2 ( March 2014), 35-47. DOI=10.5120/15476-4165

@article{ 10.5120/15476-4165,
author = { Deepali N. Pande, A. R. Bhagat Patil, Antara S. Bhattacharya },
title = { Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 2 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number2/15476-4165/ },
doi = { 10.5120/15476-4165 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:14.028490+05:30
%A Deepali N. Pande
%A A. R. Bhagat Patil
%A Antara S. Bhattacharya
%T Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 2
%P 35-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many recent technologies in the field of image processing have necessitated the attention to the field of image forensics. Increase in cyber communication system and availability of advanced digital processing tools, in the past decades has given birth to forgery attempts. Irrespective of various approaches used to protect the Image, proving integrity of the image received in communication is a difficult issue. Under such circumstances, no image can be treated secure against breaches. Moreover, knowledge of the manipulation model is a must for detecting a certain type of tampering. The aim of this paper is to highlight new developments regarding detection of tampering in comparison of various schemata used in the past decades for forgery detection. An assortment of various models used for providing information security to image based on authentication, integrity and confidentiality is presented. Methods of tamper detection have been assessed over the type of attack. An in depth classification of types of image security has been proposed which emphasizes total security issues. The paper puts forward chief developments in schemata of tampering detection.

References
  1. Min-Jen Tsai, "A visible watermarking algorithm based on the content and contrast aware (COCOA) technique ", J. Vis. Commun. Image R. 20 (2009) 323–338 http://dx. doi. org/10. 1016/j. jvcir. 2009. 03. 011
  2. Lihua Tian , Nanning Zheng, Jianru Xue, Ce Li, Xiaofeng Wang, "An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection", Signal Processing: Image Communication 26 (2011)427–437 http://dx. doi. org/10. 1016/j. image. 2011. 06. 001
  3. M. P. Queluz, "Authentication of digital images and video: Generic models and a new contribution", Signal Processing: Image Communication 16 (2001) 461-475
  4. Gwo-Jong Yua, Chun-Shien Lub, Hong-Yuan Mark Liao, "A message-based cocktail watermarking system", Pattern Recognition 36 (2003) 957 – 968 http://dx. doi. org/10. 1016/S0923-5965(00)00010-2
  5. Sanjay Rawat, Balasubramanian Raman, "A chaotic system based fragile watermarking scheme for image tamper detection", Int. J. Electron. Commun. (AEÜ) 65 (2011) 840– 847 http://dx. doi. org/10. 1016/S0031-3203(02)00106-1
  6. Wei-Che Chen, Ming-Shi Wang, "A fuzzy c-means clustering-based fragile watermarking scheme for image authentication", Expert Systems with Applications 36 (2009) 1300–1307 http://dx. doi. org/10. 1016/j. aeue. 2011. 01. 016 http://dx. doi. org/10. 1016/j. aeue. 2011. 02. 001
  7. Chunlei Li, Yunhong Wanga, Bin Maa, Zhaoxiang Zhang, "A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure", Computers and Electrical Engineering 37 (2011) 927–940 http://dx. doi. org/10. 1016/j. eswa. 2007. 11. 018
  8. Luis Rosales-Roldan , Manuel Cedillo-Hernandez , Mariko Nakano- Miyatake , Hector Perez-Meana , BrianKurkoski, "Watermarking-based image authentication with recovery capability using halftoning technique", Signal Processing: Image Communication 28 (2013)69–83 http://dx. doi. org/10. 1016/j. image. 2012. 11. 006
  9. Xiaojun Tong ,YangLiu, MiaoZhang, YueChen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery", Signal Processing: Image Communication 28 (2013)301–308 http://dx. doi. org/10. 1016/j. image. 2012. 12. 003
  10. Dariusz Bogumi, "An asymmetric image watermarking scheme resistant against geometrical distortions" Signal Processing: Image Communication 21 (2006) 59–66 http://dx. doi. org/10. 1016/j. image. 2005. 06. 005
  11. Shan Suthaharan, "Fragile image watermarking using a gradient image for improved localization and security", Pattern Recognition Letters 25 (2004) 1893–1903http://dx. doi. org/10. 1016/j. patrec. 2004. 08. 017
  12. Xunzhan Zhua, Anthony T. S. Hob, Pina Marziliano, "A new semi-fragile image watermarking with robust tampering restoration using irregular sampling", Signal Processing: Image Communication 22 (2007) 515–528
  13. Xiaojun Qi, Xing Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication", J. Vis. Commun. Image R. 22 (2011) 187–200 http://dx. doi. org/10. 1016/j. jvcir. 2010. 12. 005
  14. F. Deguillaume, S. Voloshynovskiy, T. Pun , "Secure hybrid robust watermarking resistant against tampering and copy attack", Signal Processing 83 (2003) 2133 – 2170 http://dx. doi. org/10. 1016/j. jvcir. 2010. 12. 005
  15. Huiping Guo, Yingjiu Li, Sushil Jajodia, "Chaining watermarks for detecting malicious modifications to streaming data", Information Sciences 177 (2007) 281–298 http://dx. doi. org/10. 1016/j. ins. 2007. 02. 020 http://dx. doi. org/10. 1016/j. ins. 2007. 02. 043 http://dx. doi. org/10. 1016/j. ins. 2006. 03. 014
  16. Phen Lan Lina, Chung-Kai Hsiehb, Po-Whei Huang, "A hierarchical digital watermarking method for image tamper detection and recovery", Pattern Recognition 38 (2005) 2519 – 2529 http://dx. doi. org/10. 1016/j. patcog. 2005. 02. 007
  17. Qingtang Sua, Yugang Niu, Yongsheng Zhao, Shan Panga, Xianxi Liuc, "A dual color images watermarking scheme based on the optimized compensation", Int. J. Electron. Commun. (AEÜ) 67 (2013) 652– 664 http://dx. doi. org/10. 1016/j. aeue. 2013. 01. 009
  18. Yanjiao Shia, Miao Qia, Yugen Yia, Ming Zhanga, Jun Konga, "Object based dual watermarking for video authentication", Optik 124 (2013) 3827– 3834 http://dx. doi. org/10. 1016/j. ijleo. 2012. 11. 078
  19. Fre´de´ ric Lusson, KarenBailey, MarkLeeney, KevinCurran, "A novel approach to digital watermarking exploiting color spaces", Signal Processing 93 (2013) 1268–1294 http://dx. doi. org/10. 1016/j. sigpro. 2012. 10. 018
  20. Xiaofeng Wanga, Jianru Xue, Zhenqiang Zheng , Zhenli Liu , Ning Li, "Image forensic signature for content authenticity analysis", J. Vis. Commun. Image R. 23 (2012) 782–797 http://dx. doi. org/10. 1016/j. jvcir. 2012. 03. 005
  21. Jillian Cannons, and Pierre Moulin, "Design and Statistical Analysis of a Hash-Aided Image Watermarking System", IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 10, OCTOBER 2004 1393
  22. Marco Tagliasacchi, Giuseppe Valenzise, and Stefano Tubaro, "Hash-Based Identification of Sparse Image Tampering" IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 11, NOVEMBER 2009 2491
  23. Chi-Shiang Chan, "An image authentication method by applying Hamming code on rearranged bits", Pattern Recognition Letters 32 (2011) 1679–1690 http://dx. doi. org/10. 1016/j. patrec. 2011. 07. 023
  24. Gemma Piella, "A general framework for multiresolution image fusion: from pixels to regions", Information Fusion 4 (2003) 259–280 http://dx. doi. org/10. 1016/S1566-2535(03)00046-0
  25. Chin-Chuan Han , "A hand-based personal authentication using a coarse-to-fine strategy", Image and Vision Computing 22 (2004) 909–918 http://dx. doi. org/10. 1016/j. imavis. 2004. 05. 008
  26. Maycel-Isaac Faraj , Josef Bigun, "Audio–visual person authentication using lip-motion from orientation maps", Pattern Recognition Letters 28 (2007) 1368–1382 http://dx. doi. org/10. 1016/j. patrec. 2007. 02. 017
  27. Andrew Teoh Beng Jina, David Ngo Chek Linga, Alwyn Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenized random number", Pattern Recognition 37 (2004) 2245 – 2255 http://dx. doi. org/10. 1016/j. patcog. 2004. 04. 011
  28. Loris Nanni, Alessandra Lumini, "Fusion of color spaces for ear authentication", Pattern Recognition 42 (2009) 1906 – 1913 http://dx. doi. org/10. 1016/j. patcog. 2008. 10. 016
  29. Hyun-Ae Park, Kang R young Park, "Iris recognition based on score level fusion by using SVM", Pattern Recognition Letters 28 (2007) 2019–2028 http://dx. doi. org/10. 1016/j. patrec. 2007. 05. 017
  30. Jiansheng Chen, Yiu-Sang Moon , Ming-Fai Wong , Guangda Su, "Palmprint authentication using a symbolic representation of images", Image and Vision Computing 28 (2010) 343–351 http://dx. doi. org/10. 1016/j. imavis. 2010. 03. 003 http://dx. doi. org/10. 1016/j. imavis. 2009. 04. 012
  31. Ajay Kumar, David C. M. Wong, Helen C. Shen, Anil K. Jain, "Personal authentication using hand images", Pattern Recognition Letters 27 (2006) 1478–1486 http://dx. doi. org/10. 1016/j. patrec. 2006. 02. 021
  32. Girija Chetty, Michael Wagner, "Robust face-voice based speaker identity verification using multilevel fusion", Image and Vision Computing 26 (2008) 1249–1260 http://dx. doi. org/10. 1016/j. imavis. 2008. 02. 009
  33. Rongrong Nia, Qiuqi Ruana, H. D. Cheng, "Secure semi-blind watermarking based on iteration mapping and image features" Pattern Recognition 38 (2005) 357 – 368 http://dx. doi. org/10. 1016/j. patcog. 2004. 08. 006
  34. K. Somasundaram, N. Palaniappan, "Cryptographic Image Fusion for Personal ID Image Authentication". , available on http://www. ruraluniv. ac. in/papers/89. pdf
  35. Yi Zheng Goh , Andrew Beng Jin Teoh , Michael Kah Ong Goh, "Wavelet local binary patterns fusion as illuminated facial image preprocessing for face verification", Expert Systems with Applications 38 (2011) 3959–3972 http://dx. doi. org/10. 1016/j. eswa. 2010. 09. 057
  36. Jun-ying Gan , Yu Liang, "A Method for Face and Iris Feature Fusion in Identity Authentication", IJCSNS International Journal of Computer Science and Network Security, VOL. 6 No. 2B, February 2006 135
  37. Dakshina Ranjan Kisku, Ajita Rattani, Phalguni Gupta, Jamuna Kanta Sing, C. Jinshong Hwang, "Human Identity Verification Using Multispectral Palmprint Fusion", Journal of Signal and Information Processing, 2012, 3, 263-273 http://dx. doi. org/10. 4236/jsip. 2012. 32036
  38. P. S. Revenkar, Anisa Anjum, W . Z. Gandhare, "Secure Iris Authentication Using Visual Cryptography", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 3, 2010
  39. Shiguo Lian, "Image Authentication Based on Neural Networks" available on arxiv. org/ftp/arxiv/papers/0707/0707. 4524. pdf
  40. Chih-Hung Lin, Tzung-Her Chen , Chun-Wei Chiu, "Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern", Displays 34 (2013) 59–68 http://dx. doi. org/10. 1016/j. displa. 2012. 11. 004
  41. Piyu Tsaia ,Yu-Chen Hub, Chin-Chen Changa, "Using set partitioning in hierarchical trees to authenticate digital images", Signal Processing: Image Communication 18 (2003) 813–822 http://dx. doi. org/10. 1016/j. image. 2003. 06. 001
  42. S. M. Elshoura, D. B. Megherbi, "A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments", Signal Processing: Image Communication 28 (2013)531–552 http://dx. doi. org/10. 1016/j. image. 2012. 12. 005
  43. Wien Hong, "Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique", Information Sciences 221 (2013) 473–489 http://dx. doi. org/10. 1016/j. ins. 2012. 09. 013
  44. Cheng-Hsing Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution", Pattern Recognition 41 (2008) 2674 – 2683 http://dx. doi. org/10. 1016/j. patcog. 2008. 01. 019
  45. Chang-Lung Tsai, Huei-Fen Chiang, Kuo-Chin Fan, Char-Dir Chung, "Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism", Pattern Recognition 38 (2005) 1993 – 2006 http://dx. doi. org/10. 1016/j. patcog. 2005. 03. 001
  46. Suresh N. Mali, Pradeep M. Patil, Rajesh M. Jalnekar, "Robust and secured image-adaptive data hiding", Digital Signal Processing 22 (2012) 314–323 http://dx. doi. org/10. 1016/j. dsp. 2011. 09. 003
  47. Da-Chun Wu, Wen-Hsiang Tsai, "A steganographic method for images by pixel-value differencing", Pattern Recognition Letters 24 (2003) 1613–1626 http://dx. doi. org/10. 1016/S0167-8655(02)00402-6
  48. Cheng-HsingYang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution", Pattern Recognition 41 (2008) 2674 – 2683 http://dx. doi. org/10. 1016/j. patcog. 2008. 01. 019
  49. Norman Poh, Samy Bengio, "Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication", Pattern Recognition 39 (2006) 223 – 233 http://dx. doi. org/10. 1016/j. patcog. 2005. 06. 011
  50. Suresh N. Mali, Pradeep M. Patil, Rajesh M. Jalnekar, "Robust and secured image-adaptive data hiding", Digital Signal Processing 22 (2012) 314–323 http://dx. doi. org/10. 1016/j. dsp. 2011. 09. 003
  51. Guangjie Liu, Junwen Wanga, Shiguo Lian, Zhiquan Wanga, "A passive image authentication scheme for detecting region-duplication forgery with rotation", Journal of Network and Computer Applications 34 (2011) 1557–1565http://dx. doi. org/10. 1016/j. jnca. 2011. 01. 012 ; http://dx. doi. org/10. 1016/j. jnca. 2010. 12. 004
  52. Jun-Chou Chuang, Yu-Chen Hu, "An adaptive image authentication scheme for vector quantization compressed image", J. Vis. Commun. Image R. 22 (2011) 440–449 http://dx. doi. org/10. 1016/j. jvcir. 2011. 03. 011
  53. Hong-Jie He, Jia-Shu Zhang , Fan Chen , "Adjacent-block based statistical detection method for self-embedding watermarking techniques", Signal Processing 89 (2009) 1557–1566 http://dx. doi. org/10. 1016/j. sigpro. 2009. 02. 009
  54. Sergio Bravo- Solorio, Asoke K. Nandi, "Secure fragile watermarking method for image authentication with improved tampering localization and self- recovery capabilities", Signal Processing 91 (2011) 728–739 http://dx. doi. org/10. 1016/j. sigpro. 2011. 01. 022; http://dx. doi. org/10. 1016/j. sigpro. 2010. 07. 019
  55. Radu O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain", Measurement 46 (2013) 367–373 http://dx. doi. org/10. 1016/j. measurement. 2012. 07. 010
  56. Zhongwei He, WeiLu , WeiSun , JiwuHuang, "Digital image splicing detection based on Markov features in DCT and DWT domain", Pattern Recognition 45 (2012) 4292–4299 http://dx. doi. org/10. 1016/j. patcog. 2012. 05. 014; http://dx. doi. org/10. 1016/j. patcog. 2012. 03. 009
  57. Sergio Bravo-Solorio, Asoke K. Nandi, "Automated detection and localization of duplicated regions affected by reflection, rotation and scaling in image forensics", Signal Processing 91 (2011) 1759–1770 http://dx. doi. org/10. 1016/j. sigpro. 2011. 01. 022; http://dx. doi. org/10. 1016/j. sigpro. 2010. 07. 019
  58. Guangjie Liu, Junwen Wang, Shiguo Lian, Yuewei Dai, "Detect image splicing with artificial blurred boundary", Mathematical and Computer Modelling 57 (2013) 2647–2659 http://dx. doi. org/10. 1016/j. mcm. 2012. 09. 012 http://dx. doi. org/10. 1016/j. mcm. 2012. 09. 019 http://dx. doi. org/10. 1016/j. mcm. 2012. 12. 006
  59. Yu Qian Zhaoa, Miao Liaoa, Frank Y. Shihb, Yun Q. Shic, "Tampered region detection of in painting JPEG images", Optik 124 (2013) 2487– 2492 http://dx. doi. org/10. 1016/j. ijleo. 2012. 08. 018
  60. Chuan Qin, Chin-Chen Chang , Kuo-Nan Chen, "Adaptive self-recovery for tampered images based on VQ indexing and inpainting", Signal Processing 93 (2013) 933–946 http://dx. doi. org/10. 1016/j. sigpro. 2013. 03. 036 http://dx. doi. org/10. 1016/j. sigpro. 2012. 11. 013
  61. Kyung-Su Kim, Min-Jeong Lee, Ji-Won Lee, Tae-Woo Oh, Hae-Yeoun Lee, "Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging", Computer Vision and Image Understanding 115 (2011) 1308–1323 http://dx. doi. org/10. 1016/j. cviu. 2011. 05. 001
  62. Xunyu Pan, Siwei Lyu, "Region Duplication Detection Using Image Feature Matching", IEEE Transactions on Information Forensics and Security, VOL. X, NO. X, XX 2010
  63. Pradyumna Deshpande , Prashasti Kanikar, "Pixel Based Digital Image Forgery Detection Techniques", Pradyumna Deshpande , Prashasti Kanikar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 3, May-Jun 2012, pp. 539-543 539
  64. Ashwin Swaminathan, Min Wu and K. J. Ray Liu, "Image Tampering Identification using Blind Deconvolution", 1-4244-0481-9/06/C2006 IEEE
  65. M. Barni, A. Costanzo, "A fuzzy approach to deal with uncertainty in image forensics", Signal Processing: Image Communication 27 (2012)998–1010 http://dx. doi. org/10. 1016/j. image. 2012. 07. 006
  66. Amit Phadikar, Santi P. Maity, Mrinal Mandal, "Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images", J. Vis. Commun. Image R. 23 (2012) 454–466 http://dx. doi. org/10. 1016/j. jvcir. 2012. 01. 005
  67. Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra, "A SIFT-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security.
  68. Likai Chen, Wei Lu, Jiangqun Ni, Wei Sun, Jiwu Huang, "Region duplication detection based on Harris corner points and step sector statistics", J. Vis. Commun. Image R. 24 (2013) 244–254 http://dx. doi. org/10. 1016/j. jvcir. 2013. 01. 008 http://dx. doi. org/10. 1016/j. jvcir. 2013. 09. 006 http://dx. doi. org/10. 1016/j. jvcir. 2013. 10. 003 http://dx. doi. org/10. 1016/j. jvcir. 2013. 05. 010
  69. Frank Van Riper, "Manipulating Truth Losing Credibility @ The Washington Post"; http://www. washingtonpost. com/wpsrv/photo/essays/vanRiper/030409. htm
Index Terms

Computer Science
Information Sciences

Keywords

Digital imaging Information Security Image Tampering Detection Image Authentication Image Forensics Passive Image Tampering Detection