CFP last date
20 January 2025
Reseach Article

Image Tampering Detection and Repairing

by Jyoti Rao, Sarika Jankar, Ashwini Jarali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 17
Year of Publication: 2014
Authors: Jyoti Rao, Sarika Jankar, Ashwini Jarali
10.5120/14932-3468

Jyoti Rao, Sarika Jankar, Ashwini Jarali . Image Tampering Detection and Repairing. International Journal of Computer Applications. 85, 17 ( January 2014), 11-15. DOI=10.5120/14932-3468

@article{ 10.5120/14932-3468,
author = { Jyoti Rao, Sarika Jankar, Ashwini Jarali },
title = { Image Tampering Detection and Repairing },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 17 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number17/14932-3468/ },
doi = { 10.5120/14932-3468 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:42.005948+05:30
%A Jyoti Rao
%A Sarika Jankar
%A Ashwini Jarali
%T Image Tampering Detection and Repairing
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 17
%P 11-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is very crucial to design efficient methods to provide authentication to document images mainly for images whose security must be protected. In digital media the authentication, tampering detection and repairing of the tampered data is main concern. Nowadays many digital documents are transferred on the internet regularly e. g. circuit diagrams, scanned cheques, signed documents, drawings, design drafts etc. Here the method of image authentication, tampering detection and repairing is explained. The grayscale image document image authentication with self repair method is provided. The authentication signal is calculated from binary image of the original document image. Secret sharing scheme is used to calculate this authentication signal. The extra alpha channel is embedded in the original grayscale document image. The calculated authentication signal is then embedded in this alpha channel. This is one of the way of visual cryptography in which image is visible but authentication signal will not be recognized. Then this authentic image is encrypted for better security. this whole procedure is done at sender side. In second module i. e. receiver side the image is decrypted. Then the embedded authentication signal is extracted from the received authentic image. The new authentication signal is calculated from the binary image of the received authentic image. This new authentication signal is compared with the extracted signal and the integrity check is provided. If data modification is detected, then the method is proved to repair the tampered pixels using the reverse secret sharing method. The tampering of data is detected successfully in this method without any original image backup. This type of secret sharing scheme is helpful for reducing the risk of incidental partial data loss. This method is also applicable to the color image. Algorithm for color image is also same as grayscale images. In this paper the result is provided only for the grayscale images and supposed to expand for color images as well.

References
  1. Shyamalendu Kandar, Bibhas Chandra Dhara , "K-n Secrete Sharing Visual Cryptography Scheme on Color Image using Random Sequence",IJCA (0975-8887)Volume 25-No. 11 July 2011.
  2. Che-Wei Lee, And Wen-Hsiang Tsai, "Secret-Sharing-Based Method For Authentication Of Grayscale Document Images Via the Use Of The PNG Image With A Data Repair Capability "At IEEE Transactions on Image Processing, Vol. 21, No. 1, January 2012.
  3. Che Wei Lee, Wen Hsiang Tsai "A Grayscale Image Authentication Method with a Pixel-level Self-Recovering Capability against Image Tampering" MVA2011 IAPR Conference on Machine Vision Applications, June 13-15, 2011, Nara, JAPAN.
  4. H. Yang And A. C. Kot, "Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature And Block Identifier,"IEEE Signal Processing Letters, Vol. 13, No. 12,Pp. 741-744, Dec. 2006.
  5. Chang-Chou Lin, Wen- Hsiang Tsai, "Secret Image Sharing With Steganography And Authentication" Department Of Computer And Information Science, National Chiao Tung University, Hsinchu 300,Taiwan,;Accepted 20 July 2003.
  6. Ching-Nung Yang , Tse- Shih Chen, Kun Hsuan Yu, Chung-Chun Wang "Improvements Of Image Sharing With Steganography And Authentication" Department Of Computer Science And Information Engineering, National Dong Hwa University, Sec. 2, Da Hsueh Rd. , Hualien, Taiwan Received 22 October 2005;
  7. W. H. Tsai, "Moment-Preserving Thresholding: A New Approach," Comput. Vis. Graph. Image Process. Vol. 29, No. 3, Pp. 377-393, Mar. 1985.
  8. Shamir, "How To Share A Secret," Commun. ACM,Vol. 22, No. 11,Pp. 612-13,Nov. 1979.
  9. H. Yang And A. C. Kot, "Pattern-Based Data Hiding For Binary Images Authentication by Connectivity- Preserving," IEEE Trans. On Multimedia, Vol. 9, No. 3, Pp. 475-486, April 2007
Index Terms

Computer Science
Information Sciences

Keywords

Data repair Encryption Alpha Channel Secrete sharing scheme greyscale image.