Image Tampering with Evidence Algorithm Based on Copy and Paste

Article Preview

Abstract:

Authenticity, integrity and authentication primitive technology for digital image content case of digital image forensics, as one branch of information security technology, is not pre-embedded image watermarks to forensic identification. In this paper, a common digital image tampering copy and paste operations have been studied and proposed detection method for this operation to improve the robustness of the algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1044-1045)

Pages:

1178-1181

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Alin C PoPeseu and Hany Faridy: Exposing Digital Forgeries by Deteeting Duplieated Image Regions, regions. Teehnical Report TR2004-515, Departmeni of ComPuter Seienee, Dartmouth College, (2004).

Google Scholar

[2] Jessiea Fridrich, David Soukal, and Jan Lukas: Detection of Copy-Move Forgery in Digital Images.

Google Scholar

[3] Hany Farid, Creating and Deteeting Doctored and Virtual Images: Implieations to The Child Pornography Prevention Act, (2004).

Google Scholar

[4] J. Lukas,J. Fridrieh, and M. Goljan. Detecting digital image forgeries using sensor pattern noise. In Proeeedings of theSPIE, volume 6072, (2006).

Google Scholar

[5] T. -T. Ng,S. -F. Chang, and Q. Sun, Blind Deteetion of Photomontage Using Higher Order Statistics, IEEE International SymPosium on Cireuits and Systems , Vaneouver , Canada, May23-26, 2004, Vol. 5: 688-691.

DOI: 10.1109/iscas.2004.1329901

Google Scholar