We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Survey on Image Tampering Detection and Recovery Techniques

by Maria Johnson, Resmi Cherian and
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 4
Year of Publication: 2017
Authors: Maria Johnson, Resmi Cherian and
10.5120/ijca2017913172

Maria Johnson, Resmi Cherian and . Survey on Image Tampering Detection and Recovery Techniques. International Journal of Computer Applications. 161, 4 ( Mar 2017), 18-20. DOI=10.5120/ijca2017913172

@article{ 10.5120/ijca2017913172,
author = { Maria Johnson, Resmi Cherian and },
title = { Survey on Image Tampering Detection and Recovery Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 4 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 18-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number4/27137-2017913172/ },
doi = { 10.5120/ijca2017913172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:33.239793+05:30
%A Maria Johnson
%A Resmi Cherian and
%T Survey on Image Tampering Detection and Recovery Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 4
%P 18-20
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The applications of digital images are increasing exponentially in the field of image processing. Many image editing tools and computer applications are available to manipulate the images. Hence image tampering has been increasingly easy to perform. It is very difficult to say whether an image is original or a manipulated version by just looking it. As a result of such modifications digital images have almost lost their reliability. Watermarking can be used to identify such modifications. Watermark can be hash values of the image, compressed content of the image etc. This paper discusses about various image tampering detection and recovery techniques.

References
  1. Xinpeng Zhang and Shuozhong Wang, “Fragile Watermarking With Error-Free Restoration Capability, " IEEE Transactions on multimedia, vol. 10, no.8, December 2008.
  2. Hongjie He, Fan Chen, Heng-Ming Tai, Ton Kalker and Jiashu Zhang, “Performance Analysis of a Block-Neighborhood- Based Self-Recovery Fragile Watermarking Scheme," IEEE Transcations on information forensics and security,VOL. 7, NO. 1, February 2012.
  3. Xinpeng Zhang, Zhenxing Qian, Yanli Ren, and Guorui Feng, “Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction," IEEE Transcations on information forensics and security, VOL. 6, NO. 4, December 2011.
  4. Mehmet Utku Celik, Gaurav Sharma, and A. Murat Tekalp, “Lossless Watermarking for Image Authentication: A New Framework and an Implementation," IEEE Transcations on image processing, vol. 15, NO. 4, April 2006.
  5. Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, and Guorui Feng, “Reference Sharing Mechanism for Watermark Self-Embedding, " IEEE Transcationson image processing, vol. 20, no. 2, February 2011.
  6. Pawe Korus and Andrzej Dziech, “Efficient Method for Content Reconstruction With Self-Embedding, "IEEE Transcations on image processing, vol. 22, no. 3, March 2013.
  7. Pawe Korus, Jarosaw Biaas and Andrzej Dziech, “Towards Practical Self- Embedding for JPEG-Compressed Digital Images," IEEE Transactions on multimedia, vol. 17, no. 2, February 2015.
  8. Dekun Zou, Yun Q. Shi, Zhicheng Ni and Wei Su, “A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform," IEEE Transactions on circuits and systems for video technology, vol. 16, no. 10, October 2006.
  9. Adnan M. Alattar, “Reversible Watermark Using the Difference Expansion of Generalized Integer Transform, "IEEE Transcations on image processing, vol. 13, no. 8, August 2004.
  10. Pawel Korus and Andrzej Dziech, “Adaptive Self-Embedding Scheme With Controlled Reconstruction-Performance," IEEE Transcations on information forensics and security, vol. 9, no. 2, February 2014.
  11. Saeed Sarreshtedari and Mohammad Ali Akhaee, “A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery, " IEEE Transcations on image processing, vol. 24, no. 7, July 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Image Tampering Tampering Detection Image Reconstruction Watermarking.