CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Analysis of Different Techniques of Image Forgery Detection

Published on May 2012 by G. R. Talmale, R. W. Jasutkar
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 3
May 2012
Authors: G. R. Talmale, R. W. Jasutkar
9eaa5a6d-2953-481a-a524-d8d1d3fd333c

G. R. Talmale, R. W. Jasutkar . Analysis of Different Techniques of Image Forgery Detection. National Conference on Recent Trends in Computing. NCRTC, 3 (May 2012), 13-18.

@article{
author = { G. R. Talmale, R. W. Jasutkar },
title = { Analysis of Different Techniques of Image Forgery Detection },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 3 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 13-18 },
numpages = 6,
url = { /proceedings/ncrtc/number3/6531-1021/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A G. R. Talmale
%A R. W. Jasutkar
%T Analysis of Different Techniques of Image Forgery Detection
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 3
%P 13-18
%D 2012
%I International Journal of Computer Applications
Abstract

Multimedia Forensics has become important in the last few years. There are two main interests, namely source identification and forgery detection. Source identification focuses on identifying the source digital devices (cameras, mobile phones, camcorders, etc) using the media produced by them, while forgery detection attempts to discover evidence of tampering by assessing the authenticity of the digital media (audio clips, video clips, images, etc) . Digital images have seen increased use in applications where their authenticity is of prime importance Digital images can be forged easily with today's widely available image processing software In this paper we describe a passive approach to detect digital forgeries by techniques of image forgery.

References
  1. J. Fridrich, "Methods for "Methods for Tamper Detection in Digital Images", Proc. ACM Workshop on Multimedia and Security, Orlando, FL, October 30?31, 1999, pp. 19?23.
  2. S. Saic, J. Flusser, B. Zitová, and J. Lukáš, "Methods for Detection of Additional Manipulations with Digital Images", Research Report, Project RN19992001003 "Detection of Deliberate Changes in Digital Images", ÚTIA AV ?R, Prague, December 1999 (partially in Czech).
  3. J. Lukáš, "Digital Image Authentication", Workshop of Czech Technical University 2001,
  4. M. Arnold, M. Schmucker, and S. D. Wolthusen. Techniques and Applications of Digital Watermarking and Content Protection. Artech House, Inc. , Norwood, MA, USA, 2003.
  5. H. Farid. Creating and detecting doctored and virtual images: Implications to the child pornography prevention act. Department of Computer Science, Dartmouth College, TR2004-518:13, 2004.
  6. J. Fridrich and J. Lukas. Estimation of primary quantization matrix in double compressed jpeg images. In Proceedings of DFRWS, volume 2, Cleveland, OH, USA, August 2003.
  7. J. Fridrich, D. Soukal, and J. Lukas. Detection of copy– move forgery in digital images. In Proceedings of Digital Forensic Research Workshop, pages 55–61, Cleveland, OH, USA, August 2003. IEEE Computer Society Prague, Czech Republic, February 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Multimedia Forensic image Forgery copymove Blind