Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Survey on Retargeting Techniques used in Multimedia Forensic of Mobile devices

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 7
Year of Publication: 2012
Authors:
Shashikant S. Dumbare
Sulbha Patil

Shashikant S Dumbare and Sulbha Patil. Article: Survey on Retargeting Techniques used in Multimedia Forensic of Mobile devices. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(7):5-10, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Shashikant S. Dumbare and Sulbha Patil},
	title = {Article: Survey on Retargeting Techniques used in Multimedia Forensic of Mobile devices},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {7},
	pages = {5-10},
	month = {May},
	note = {Full text available}
}

Abstract

This is a survey paper on Multimedia forensic in mobile device. By observing numbers of multimedia forensic technique, this paper focuses on Seam carving technique. Seam carving is an adaptive multimedia retargeting technique to resize multimedia data for different display sizes. This technique has found promising applications in media consumption on mobile devices such as tablets and smart phones. However, seam carving can also be used to maliciously alter image content and when combined with other tampering operations, makes tampering detection very difficult by traditional multimedia forensic techniques. In this paper, we study the problem of seam carving estimation and tampering localization using very compact side information called forensic hash. The forensic hash technique bridges two related areas, namely robust image hashing and blind multimedia forensics, to answer a broader scope of forensic questions in a more efficient and accurate manner. We show that our recently proposed forensic hash construction can be extended to accurately estimate seam carving and detect local tampering.

References

  • S. Avidan and A. Shamir. Seam carving forcontent-aware image resizing. ACM Trans. onGraphics, (Proceedings SIGGRAPH 2007), 26(3), 2007.
  • E. Delp, N. Memon, and M. W. (eds). Special issue on forensics analysis of digital evidence. IEEE Signal Processing Magazine, 26(2), March 2009.
  • C. Fillion and G. Sharma. Detecting content adaptive scaling of images for forensic applications. In Proc. SPIE: Media Forensics and Security, volume 7541, pages 7541{36, 2010.
  • D. Lowe. Distinctive image features fromscale-invariant keypoints. International Journal of Computer Vision, 60(2):91{110, 2004.
  • W. Lu, A. Varna, and M. Wu. Forensic hash for multimedia information. In SPIE Media Forensics and Security, 2010.
  • W. Lu and M. Wu. Multimedia forensic hash based on visual words. In Proc. of IEEE ICIP, 2010. M. Rubinstein, D. Gutierrez, O. Sorkine, and
  • A. Shamir. A comparative study of image retargeting. ACM Trans. on Graphics, Proceedings Siggraph Asia, 29(5), 2010.
  • M. Rubinstein, D. Gutierrez, O. Sorkine, and A. Shamir. A comparative study of image retargeting. ACM Transactions on Graphics (Proc. SIGGRAPH Asia), 29(5), 2010.
  • A. Sarkar, L. Nataraj, and B. S. Manjunath. Detection of seam carving and localization of seam insertions in digital images. In Proceedings of the 11th ACM workshop on Multimedia and security, pages 107{116, 2009.
  • H. Sencar and N. Memon. Overview of state-of-the-art in digital image forensics. World Scienti_c Press, 2008.
  • A. Swaminathan, Y. Mao, and M. Wu. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on, 1(2):215{230, 2006