Methodology for Evidence Reconstruction in Digital Image Forensics

1
Kalpana Manudhane
Kalpana Manudhane
2
Mr. M.M. Bartere
Mr. M.M. Bartere
1 G.H. Riasoni College of Engineering & Management

Send Message

To: Author

GJCST Volume 13 Issue F9

Article Fingerprint

ReserarchID

CSTGV9G2HC

Methodology for Evidence Reconstruction in Digital Image Forensics Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

This paper reveals basics of Digital (Image) Forensics. The paper describes the ways to manipulate image, namely, copy-move forgery (copy region in image & paste into another region in same image), image splicing (copy region in image & paste into another image) and image retouching. The paper mainly focuses on copy move forgery detection methods that are classified mainly into two broad approaches -block-based and key-point. Methodology (generalized as well as approach specific) of copy move forgery detection is presented in detail. Copied region is not directly pasted but manipulated (scale, rotation, adding Gaussian noise or combining these transformations) before pasting. The method for detection should robust to these transformations. The paper also presents methodology for reconstruction (if possible) of forged image based on detection result.

21 Cites in Articles

References

  1. Xunyu Pan (2011). Digital Forensics Using Local Signal Statistics.
  2. B Shivakumar1 Lt,S Dr,Santhosh,Baboo (2010). Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Current Methods.
  3. Matthias Kirchner (2012). Notes on Digital Image Forensics & counter forensics.
  4. Somayeh Sadeghi,Hamid Jalab,Sajjad Dadkhah (2012). Efficient Copy-Move Forgery Detection for Digital Images.
  5. Christian Vincent Christlein,Johannes Riess,Corinna Jordan,Elli Riess,Angelopoulou (2012). An Evaluation of Popular Copy-Move Forgery Detection Approaches.
  6. D Fridrich,J Soukal,Lukas (2003). Detection of copy-move forgery in digital images.
  7. Babak Mahdian,Stanislav Saic (2007). Detection of copy–move forgery using a method based on blur moment invariants.
  8. S Ryu,M Lee,H Lee (2010). Detection of Copy-Rotate-Move Forgery using Zernike Moments.
  9. B Shivakumar,S Baboo (2011). Automated Forensic Method for CopyMove Forgery Detection based on Harris Interest Points and SIFT Descriptors.
  10. I Amerini,L Ballan,R Caldelli,A Del Bimbo,G Serra (2011). A SIFT-Based Forensic Method for Copy–Move Attack Detection and Transformation Recovery.
  11. David Lowe (2004). Distinctive Image Features from Scale-Invariant Keypoints.
  12. Xunyu Pan,Siwei Lyu (2011). Detecting image region duplication using SIFT features.
  13. James Bezdek,Robert Ehrlich,William Full (1984). FCM: The Fuzzy c-means clustering algorithm.
  14. Ajith Abraham,Swagatam Das,Sandip Roy Swarm Intelligence Algorithms for Data Clustering.
  15. C Rafael,Richard Gonzalez,Woods (2009). Digital Image Processing.
  16. Sevinc Bayram,Taha Sencar,Nasir Memon (2009). An efficient and robust method for detecting copymove forgery.
  17. Hwei-Jen Lin,Chun-Wei Wang,Yang-Ta Kao (2009). Fast Copy-Move Forgery Detection.
  18. M Barni,A Costanzo (2012). A fuzzy approach to deal with uncertainty in image forensics.
  19. Deguang Wang,Baochang Han,Ming Huang (2012). Application of Fuzzy C-Means Clustering Algorithm Based on Particle Swarm Optimization in Computer Forensics.
  20. Gonzalo Vaca-Castano (2010). Satlab tutorial session-2.
  21. Hany Farid (2009). Image forgery detection A survey.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Kalpana Manudhane. 2014. \u201cMethodology for Evidence Reconstruction in Digital Image Forensics\u201d. Global Journal of Computer Science and Technology - F: Graphics & Vision GJCST-F Volume 13 (GJCST Volume 13 Issue F9): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

February 3, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8858
Total Downloads: 2370
2026 Trends
Research Identity (RIN)
Related Research

Published Article

This paper reveals basics of Digital (Image) Forensics. The paper describes the ways to manipulate image, namely, copy-move forgery (copy region in image & paste into another region in same image), image splicing (copy region in image & paste into another image) and image retouching. The paper mainly focuses on copy move forgery detection methods that are classified mainly into two broad approaches -block-based and key-point. Methodology (generalized as well as approach specific) of copy move forgery detection is presented in detail. Copied region is not directly pasted but manipulated (scale, rotation, adding Gaussian noise or combining these transformations) before pasting. The method for detection should robust to these transformations. The paper also presents methodology for reconstruction (if possible) of forged image based on detection result.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Methodology for Evidence Reconstruction in Digital Image Forensics

Kalpana Manudhane
Kalpana Manudhane G.H. Riasoni College of Engineering & Management
Mr. M.M. Bartere
Mr. M.M. Bartere

Research Journals