Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 89 - Number 2
Year of Publication: 2014
Authors:
Deepali N. Pande
A. R. Bhagat Patil
Antara S. Bhattacharya
10.5120/15476-4165

Deepali N Pande, Bhagat A R Patil and Antara S Bhattacharya. Article: Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art. International Journal of Computer Applications 89(2):35-47, March 2014. Full text available. BibTeX

@article{key:article,
	author = {Deepali N. Pande and A. R. Bhagat Patil and Antara S. Bhattacharya},
	title = {Article: Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {89},
	number = {2},
	pages = {35-47},
	month = {March},
	note = {Full text available}
}

Abstract

Many recent technologies in the field of image processing have necessitated the attention to the field of image forensics. Increase in cyber communication system and availability of advanced digital processing tools, in the past decades has given birth to forgery attempts. Irrespective of various approaches used to protect the Image, proving integrity of the image received in communication is a difficult issue. Under such circumstances, no image can be treated secure against breaches. Moreover, knowledge of the manipulation model is a must for detecting a certain type of tampering. The aim of this paper is to highlight new developments regarding detection of tampering in comparison of various schemata used in the past decades for forgery detection. An assortment of various models used for providing information security to image based on authentication, integrity and confidentiality is presented. Methods of tamper detection have been assessed over the type of attack. An in depth classification of types of image security has been proposed which emphasizes total security issues. The paper puts forward chief developments in schemata of tampering detection.

References

  • Min-Jen Tsai, "A visible watermarking algorithm based on the content and contrast aware (COCOA) technique ", J. Vis. Commun. Image R. 20 (2009) 323–338 http://dx. doi. org/10. 1016/j. jvcir. 2009. 03. 011
  • Lihua Tian , Nanning Zheng, Jianru Xue, Ce Li, Xiaofeng Wang, "An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection", Signal Processing: Image Communication 26 (2011)427–437 http://dx. doi. org/10. 1016/j. image. 2011. 06. 001
  • M. P. Queluz, "Authentication of digital images and video: Generic models and a new contribution", Signal Processing: Image Communication 16 (2001) 461-475
  • Gwo-Jong Yua, Chun-Shien Lub, Hong-Yuan Mark Liao, "A message-based cocktail watermarking system", Pattern Recognition 36 (2003) 957 – 968 http://dx. doi. org/10. 1016/S0923-5965(00)00010-2
  • Sanjay Rawat, Balasubramanian Raman, "A chaotic system based fragile watermarking scheme for image tamper detection", Int. J. Electron. Commun. (AEÜ) 65 (2011) 840– 847 http://dx. doi. org/10. 1016/S0031-3203(02)00106-1
  • Wei-Che Chen, Ming-Shi Wang, "A fuzzy c-means clustering-based fragile watermarking scheme for image authentication", Expert Systems with Applications 36 (2009) 1300–1307 http://dx. doi. org/10. 1016/j. aeue. 2011. 01. 016 http://dx. doi. org/10. 1016/j. aeue. 2011. 02. 001
  • Chunlei Li, Yunhong Wanga, Bin Maa, Zhaoxiang Zhang, "A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure", Computers and Electrical Engineering 37 (2011) 927–940 http://dx. doi. org/10. 1016/j. eswa. 2007. 11. 018
  • Luis Rosales-Roldan , Manuel Cedillo-Hernandez , Mariko Nakano- Miyatake , Hector Perez-Meana , BrianKurkoski, "Watermarking-based image authentication with recovery capability using halftoning technique", Signal Processing: Image Communication 28 (2013)69–83 http://dx. doi. org/10. 1016/j. image. 2012. 11. 006
  • Xiaojun Tong ,YangLiu, MiaoZhang, YueChen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery", Signal Processing: Image Communication 28 (2013)301–308 http://dx. doi. org/10. 1016/j. image. 2012. 12. 003
  • Dariusz Bogumi, "An asymmetric image watermarking scheme resistant against geometrical distortions" Signal Processing: Image Communication 21 (2006) 59–66 http://dx. doi. org/10. 1016/j. image. 2005. 06. 005
  • Shan Suthaharan, "Fragile image watermarking using a gradient image for improved localization and security", Pattern Recognition Letters 25 (2004) 1893–1903http://dx. doi. org/10. 1016/j. patrec. 2004. 08. 017
  • Xunzhan Zhua, Anthony T. S. Hob, Pina Marziliano, "A new semi-fragile image watermarking with robust tampering restoration using irregular sampling", Signal Processing: Image Communication 22 (2007) 515–528
  • Xiaojun Qi, Xing Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication", J. Vis. Commun. Image R. 22 (2011) 187–200 http://dx. doi. org/10. 1016/j. jvcir. 2010. 12. 005
  • F. Deguillaume, S. Voloshynovskiy, T. Pun , "Secure hybrid robust watermarking resistant against tampering and copy attack", Signal Processing 83 (2003) 2133 – 2170 http://dx. doi. org/10. 1016/j. jvcir. 2010. 12. 005
  • Huiping Guo, Yingjiu Li, Sushil Jajodia, "Chaining watermarks for detecting malicious modifications to streaming data", Information Sciences 177 (2007) 281–298 http://dx. doi. org/10. 1016/j. ins. 2007. 02. 020 http://dx. doi. org/10. 1016/j. ins. 2007. 02. 043 http://dx. doi. org/10. 1016/j. ins. 2006. 03. 014
  • Phen Lan Lina, Chung-Kai Hsiehb, Po-Whei Huang, "A hierarchical digital watermarking method for image tamper detection and recovery", Pattern Recognition 38 (2005) 2519 – 2529 http://dx. doi. org/10. 1016/j. patcog. 2005. 02. 007
  • Qingtang Sua, Yugang Niu, Yongsheng Zhao, Shan Panga, Xianxi Liuc, "A dual color images watermarking scheme based on the optimized compensation", Int. J. Electron. Commun. (AEÜ) 67 (2013) 652– 664 http://dx. doi. org/10. 1016/j. aeue. 2013. 01. 009
  • Yanjiao Shia, Miao Qia, Yugen Yia, Ming Zhanga, Jun Konga, "Object based dual watermarking for video authentication", Optik 124 (2013) 3827– 3834 http://dx. doi. org/10. 1016/j. ijleo. 2012. 11. 078
  • Fre´de´ ric Lusson, KarenBailey, MarkLeeney, KevinCurran, "A novel approach to digital watermarking exploiting color spaces", Signal Processing 93 (2013) 1268–1294 http://dx. doi. org/10. 1016/j. sigpro. 2012. 10. 018
  • Xiaofeng Wanga, Jianru Xue, Zhenqiang Zheng , Zhenli Liu , Ning Li, "Image forensic signature for content authenticity analysis", J. Vis. Commun. Image R. 23 (2012) 782–797 http://dx. doi. org/10. 1016/j. jvcir. 2012. 03. 005
  • Jillian Cannons, and Pierre Moulin, "Design and Statistical Analysis of a Hash-Aided Image Watermarking System", IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 10, OCTOBER 2004 1393
  • Marco Tagliasacchi, Giuseppe Valenzise, and Stefano Tubaro, "Hash-Based Identification of Sparse Image Tampering" IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 11, NOVEMBER 2009 2491
  • Chi-Shiang Chan, "An image authentication method by applying Hamming code on rearranged bits", Pattern Recognition Letters 32 (2011) 1679–1690 http://dx. doi. org/10. 1016/j. patrec. 2011. 07. 023
  • Gemma Piella, "A general framework for multiresolution image fusion: from pixels to regions", Information Fusion 4 (2003) 259–280 http://dx. doi. org/10. 1016/S1566-2535(03)00046-0
  • Chin-Chuan Han , "A hand-based personal authentication using a coarse-to-fine strategy", Image and Vision Computing 22 (2004) 909–918 http://dx. doi. org/10. 1016/j. imavis. 2004. 05. 008
  • Maycel-Isaac Faraj , Josef Bigun, "Audio–visual person authentication using lip-motion from orientation maps", Pattern Recognition Letters 28 (2007) 1368–1382 http://dx. doi. org/10. 1016/j. patrec. 2007. 02. 017
  • Andrew Teoh Beng Jina, David Ngo Chek Linga, Alwyn Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenized random number", Pattern Recognition 37 (2004) 2245 – 2255 http://dx. doi. org/10. 1016/j. patcog. 2004. 04. 011
  • Loris Nanni, Alessandra Lumini, "Fusion of color spaces for ear authentication", Pattern Recognition 42 (2009) 1906 – 1913 http://dx. doi. org/10. 1016/j. patcog. 2008. 10. 016
  • Hyun-Ae Park, Kang R young Park, "Iris recognition based on score level fusion by using SVM", Pattern Recognition Letters 28 (2007) 2019–2028 http://dx. doi. org/10. 1016/j. patrec. 2007. 05. 017
  • Jiansheng Chen, Yiu-Sang Moon , Ming-Fai Wong , Guangda Su, "Palmprint authentication using a symbolic representation of images", Image and Vision Computing 28 (2010) 343–351 http://dx. doi. org/10. 1016/j. imavis. 2010. 03. 003 http://dx. doi. org/10. 1016/j. imavis. 2009. 04. 012
  • Ajay Kumar, David C. M. Wong, Helen C. Shen, Anil K. Jain, "Personal authentication using hand images", Pattern Recognition Letters 27 (2006) 1478–1486 http://dx. doi. org/10. 1016/j. patrec. 2006. 02. 021
  • Girija Chetty, Michael Wagner, "Robust face-voice based speaker identity verification using multilevel fusion", Image and Vision Computing 26 (2008) 1249–1260 http://dx. doi. org/10. 1016/j. imavis. 2008. 02. 009
  • Rongrong Nia, Qiuqi Ruana, H. D. Cheng, "Secure semi-blind watermarking based on iteration mapping and image features" Pattern Recognition 38 (2005) 357 – 368 http://dx. doi. org/10. 1016/j. patcog. 2004. 08. 006
  • K. Somasundaram, N. Palaniappan, "Cryptographic Image Fusion for Personal ID Image Authentication". , available on http://www. ruraluniv. ac. in/papers/89. pdf
  • Yi Zheng Goh , Andrew Beng Jin Teoh , Michael Kah Ong Goh, "Wavelet local binary patterns fusion as illuminated facial image preprocessing for face verification", Expert Systems with Applications 38 (2011) 3959–3972 http://dx. doi. org/10. 1016/j. eswa. 2010. 09. 057
  • Jun-ying Gan , Yu Liang, "A Method for Face and Iris Feature Fusion in Identity Authentication", IJCSNS International Journal of Computer Science and Network Security, VOL. 6 No. 2B, February 2006 135
  • Dakshina Ranjan Kisku, Ajita Rattani, Phalguni Gupta, Jamuna Kanta Sing, C. Jinshong Hwang, "Human Identity Verification Using Multispectral Palmprint Fusion", Journal of Signal and Information Processing, 2012, 3, 263-273 http://dx. doi. org/10. 4236/jsip. 2012. 32036
  • P. S. Revenkar, Anisa Anjum, W . Z. Gandhare, "Secure Iris Authentication Using Visual Cryptography", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 3, 2010
  • Shiguo Lian, "Image Authentication Based on Neural Networks" available on arxiv. org/ftp/arxiv/papers/0707/0707. 4524. pdf
  • Chih-Hung Lin, Tzung-Her Chen , Chun-Wei Chiu, "Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern", Displays 34 (2013) 59–68 http://dx. doi. org/10. 1016/j. displa. 2012. 11. 004
  • Piyu Tsaia ,Yu-Chen Hub, Chin-Chen Changa, "Using set partitioning in hierarchical trees to authenticate digital images", Signal Processing: Image Communication 18 (2003) 813–822 http://dx. doi. org/10. 1016/j. image. 2003. 06. 001
  • S. M. Elshoura, D. B. Megherbi, "A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments", Signal Processing: Image Communication 28 (2013)531–552 http://dx. doi. org/10. 1016/j. image. 2012. 12. 005
  • Wien Hong, "Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique", Information Sciences 221 (2013) 473–489 http://dx. doi. org/10. 1016/j. ins. 2012. 09. 013
  • Cheng-Hsing Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution", Pattern Recognition 41 (2008) 2674 – 2683 http://dx. doi. org/10. 1016/j. patcog. 2008. 01. 019
  • Chang-Lung Tsai, Huei-Fen Chiang, Kuo-Chin Fan, Char-Dir Chung, "Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism", Pattern Recognition 38 (2005) 1993 – 2006 http://dx. doi. org/10. 1016/j. patcog. 2005. 03. 001
  • Suresh N. Mali, Pradeep M. Patil, Rajesh M. Jalnekar, "Robust and secured image-adaptive data hiding", Digital Signal Processing 22 (2012) 314–323 http://dx. doi. org/10. 1016/j. dsp. 2011. 09. 003
  • Da-Chun Wu, Wen-Hsiang Tsai, "A steganographic method for images by pixel-value differencing", Pattern Recognition Letters 24 (2003) 1613–1626 http://dx. doi. org/10. 1016/S0167-8655(02)00402-6
  • Cheng-HsingYang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution", Pattern Recognition 41 (2008) 2674 – 2683 http://dx. doi. org/10. 1016/j. patcog. 2008. 01. 019
  • Norman Poh, Samy Bengio, "Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication", Pattern Recognition 39 (2006) 223 – 233 http://dx. doi. org/10. 1016/j. patcog. 2005. 06. 011
  • Suresh N. Mali, Pradeep M. Patil, Rajesh M. Jalnekar, "Robust and secured image-adaptive data hiding", Digital Signal Processing 22 (2012) 314–323 http://dx. doi. org/10. 1016/j. dsp. 2011. 09. 003
  • Guangjie Liu, Junwen Wanga, Shiguo Lian, Zhiquan Wanga, "A passive image authentication scheme for detecting region-duplication forgery with rotation", Journal of Network and Computer Applications 34 (2011) 1557–1565http://dx. doi. org/10. 1016/j. jnca. 2011. 01. 012 ; http://dx. doi. org/10. 1016/j. jnca. 2010. 12. 004
  • Jun-Chou Chuang, Yu-Chen Hu, "An adaptive image authentication scheme for vector quantization compressed image", J. Vis. Commun. Image R. 22 (2011) 440–449 http://dx. doi. org/10. 1016/j. jvcir. 2011. 03. 011
  • Hong-Jie He, Jia-Shu Zhang , Fan Chen , "Adjacent-block based statistical detection method for self-embedding watermarking techniques", Signal Processing 89 (2009) 1557–1566 http://dx. doi. org/10. 1016/j. sigpro. 2009. 02. 009
  • Sergio Bravo- Solorio, Asoke K. Nandi, "Secure fragile watermarking method for image authentication with improved tampering localization and self- recovery capabilities", Signal Processing 91 (2011) 728–739 http://dx. doi. org/10. 1016/j. sigpro. 2011. 01. 022; http://dx. doi. org/10. 1016/j. sigpro. 2010. 07. 019
  • Radu O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain", Measurement 46 (2013) 367–373 http://dx. doi. org/10. 1016/j. measurement. 2012. 07. 010
  • Zhongwei He, WeiLu , WeiSun , JiwuHuang, "Digital image splicing detection based on Markov features in DCT and DWT domain", Pattern Recognition 45 (2012) 4292–4299 http://dx. doi. org/10. 1016/j. patcog. 2012. 05. 014; http://dx. doi. org/10. 1016/j. patcog. 2012. 03. 009
  • Sergio Bravo-Solorio, Asoke K. Nandi, "Automated detection and localization of duplicated regions affected by reflection, rotation and scaling in image forensics", Signal Processing 91 (2011) 1759–1770 http://dx. doi. org/10. 1016/j. sigpro. 2011. 01. 022; http://dx. doi. org/10. 1016/j. sigpro. 2010. 07. 019
  • Guangjie Liu, Junwen Wang, Shiguo Lian, Yuewei Dai, "Detect image splicing with artificial blurred boundary", Mathematical and Computer Modelling 57 (2013) 2647–2659 http://dx. doi. org/10. 1016/j. mcm. 2012. 09. 012 http://dx. doi. org/10. 1016/j. mcm. 2012. 09. 019 http://dx. doi. org/10. 1016/j. mcm. 2012. 12. 006
  • Yu Qian Zhaoa, Miao Liaoa, Frank Y. Shihb, Yun Q. Shic, "Tampered region detection of in painting JPEG images", Optik 124 (2013) 2487– 2492 http://dx. doi. org/10. 1016/j. ijleo. 2012. 08. 018
  • Chuan Qin, Chin-Chen Chang , Kuo-Nan Chen, "Adaptive self-recovery for tampered images based on VQ indexing and inpainting", Signal Processing 93 (2013) 933–946 http://dx. doi. org/10. 1016/j. sigpro. 2013. 03. 036 http://dx. doi. org/10. 1016/j. sigpro. 2012. 11. 013
  • Kyung-Su Kim, Min-Jeong Lee, Ji-Won Lee, Tae-Woo Oh, Hae-Yeoun Lee, "Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging", Computer Vision and Image Understanding 115 (2011) 1308–1323 http://dx. doi. org/10. 1016/j. cviu. 2011. 05. 001
  • Xunyu Pan, Siwei Lyu, "Region Duplication Detection Using Image Feature Matching", IEEE Transactions on Information Forensics and Security, VOL. X, NO. X, XX 2010
  • Pradyumna Deshpande , Prashasti Kanikar, "Pixel Based Digital Image Forgery Detection Techniques", Pradyumna Deshpande , Prashasti Kanikar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 3, May-Jun 2012, pp. 539-543 539
  • Ashwin Swaminathan, Min Wu and K. J. Ray Liu, "Image Tampering Identification using Blind Deconvolution", 1-4244-0481-9/06/C2006 IEEE
  • M. Barni, A. Costanzo, "A fuzzy approach to deal with uncertainty in image forensics", Signal Processing: Image Communication 27 (2012)998–1010 http://dx. doi. org/10. 1016/j. image. 2012. 07. 006
  • Amit Phadikar, Santi P. Maity, Mrinal Mandal, "Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images", J. Vis. Commun. Image R. 23 (2012) 454–466 http://dx. doi. org/10. 1016/j. jvcir. 2012. 01. 005
  • Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, and Giuseppe Serra, "A SIFT-based forensic method for copy-move attack detection and transformation recovery," IEEE Transactions on Information Forensics and Security.
  • Likai Chen, Wei Lu, Jiangqun Ni, Wei Sun, Jiwu Huang, "Region duplication detection based on Harris corner points and step sector statistics", J. Vis. Commun. Image R. 24 (2013) 244–254 http://dx. doi. org/10. 1016/j. jvcir. 2013. 01. 008 http://dx. doi. org/10. 1016/j. jvcir. 2013. 09. 006 http://dx. doi. org/10. 1016/j. jvcir. 2013. 10. 003 http://dx. doi. org/10. 1016/j. jvcir. 2013. 05. 010
  • Frank Van Riper, "Manipulating Truth Losing Credibility @ The Washington Post"; http://www. washingtonpost. com/wpsrv/photo/essays/vanRiper/030409. htm