CFP last date
20 December 2024
Reseach Article

Survey on Retargeting Techniques used in Multimedia Forensic of Mobile devices

Published on May 2012 by Shashikant S. Dumbare, Sulbha Patil
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 7
May 2012
Authors: Shashikant S. Dumbare, Sulbha Patil
a3b3eafe-f2a9-4a6c-b395-7756f9447953

Shashikant S. Dumbare, Sulbha Patil . Survey on Retargeting Techniques used in Multimedia Forensic of Mobile devices. National Conference on Recent Trends in Computing. NCRTC, 7 (May 2012), 5-10.

@article{
author = { Shashikant S. Dumbare, Sulbha Patil },
title = { Survey on Retargeting Techniques used in Multimedia Forensic of Mobile devices },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 7 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 5-10 },
numpages = 6,
url = { /proceedings/ncrtc/number7/6562-1052/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Shashikant S. Dumbare
%A Sulbha Patil
%T Survey on Retargeting Techniques used in Multimedia Forensic of Mobile devices
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 7
%P 5-10
%D 2012
%I International Journal of Computer Applications
Abstract

This is a survey paper on Multimedia forensic in mobile device. By observing numbers of multimedia forensic technique, this paper focuses on Seam carving technique. Seam carving is an adaptive multimedia retargeting technique to resize multimedia data for different display sizes. This technique has found promising applications in media consumption on mobile devices such as tablets and smart phones. However, seam carving can also be used to maliciously alter image content and when combined with other tampering operations, makes tampering detection very difficult by traditional multimedia forensic techniques. In this paper, we study the problem of seam carving estimation and tampering localization using very compact side information called forensic hash. The forensic hash technique bridges two related areas, namely robust image hashing and blind multimedia forensics, to answer a broader scope of forensic questions in a more efficient and accurate manner. We show that our recently proposed forensic hash construction can be extended to accurately estimate seam carving and detect local tampering.

References
  1. S. Avidan and A. Shamir. Seam carving forcontent-aware image resizing. ACM Trans. onGraphics, (Proceedings SIGGRAPH 2007), 26(3), 2007.
  2. E. Delp, N. Memon, and M. W. (eds). Special issue on forensics analysis of digital evidence. IEEE Signal Processing Magazine, 26(2), March 2009.
  3. C. Fillion and G. Sharma. Detecting content adaptive scaling of images for forensic applications. In Proc. SPIE: Media Forensics and Security, volume 7541, pages 7541{36, 2010.
  4. D. Lowe. Distinctive image features fromscale-invariant keypoints. International Journal of Computer Vision, 60(2):91{110, 2004.
  5. W. Lu, A. Varna, and M. Wu. Forensic hash for multimedia information. In SPIE Media Forensics and Security, 2010.
  6. W. Lu and M. Wu. Multimedia forensic hash based on visual words. In Proc. of IEEE ICIP, 2010. M. Rubinstein, D. Gutierrez, O. Sorkine, and
  7. A. Shamir. A comparative study of image retargeting. ACM Trans. on Graphics, Proceedings Siggraph Asia, 29(5), 2010.
  8. M. Rubinstein, D. Gutierrez, O. Sorkine, and A. Shamir. A comparative study of image retargeting. ACM Transactions on Graphics (Proc. SIGGRAPH Asia), 29(5), 2010.
  9. A. Sarkar, L. Nataraj, and B. S. Manjunath. Detection of seam carving and localization of seam insertions in digital images. In Proceedings of the 11th ACM workshop on Multimedia and security, pages 107{116, 2009.
  10. H. Sencar and N. Memon. Overview of state-of-the-art in digital image forensics. World Scienti_c Press, 2008.
  11. A. Swaminathan, Y. Mao, and M. Wu. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on, 1(2):215{230, 2006
Index Terms

Computer Science
Information Sciences

Keywords

Forensic Hash Seam Carving Visual Words Sift