CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Inspection on the Art of Diverse Image Tampering Approach: A Survey

Published on August 2016 by Sumalatha A.
National Conference on “Recent Trends in Information Technology"
Foundation of Computer Science USA
NCRTIT2016 - Number 1
August 2016
Authors: Sumalatha A.
fd726c5b-aed9-48b8-a554-fcac89547b24

Sumalatha A. . Inspection on the Art of Diverse Image Tampering Approach: A Survey. National Conference on “Recent Trends in Information Technology". NCRTIT2016, 1 (August 2016), 33-38.

@article{
author = { Sumalatha A. },
title = { Inspection on the Art of Diverse Image Tampering Approach: A Survey },
journal = { National Conference on “Recent Trends in Information Technology" },
issue_date = { August 2016 },
volume = { NCRTIT2016 },
number = { 1 },
month = { August },
year = { 2016 },
issn = 0975-8887,
pages = { 33-38 },
numpages = 6,
url = { /proceedings/ncrtit2016/number1/25584-1624/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on “Recent Trends in Information Technology"
%A Sumalatha A.
%T Inspection on the Art of Diverse Image Tampering Approach: A Survey
%J National Conference on “Recent Trends in Information Technology"
%@ 0975-8887
%V NCRTIT2016
%N 1
%P 33-38
%D 2016
%I International Journal of Computer Applications
Abstract

Nowadays image authenticity plays a vital role. With the advancement in smartphones and other sophisticated software tools and graphical editors, image tampering detection has become very crucial. Images play a vital role in various fields such as Forensic Investigation, Fashion Industry, Journalism,to gain justice in courtrooms, Tabloid in Magazines etc. This paper reviews all the approaches for various image tampering techniques and provides brief insight knowledge on how these techniques contribute to the detection and tampering.

References
  1. Friedman, 1993. Trustworthy digital camera: restoring credibility to the photographic image, IEEE Transactions on Consumer Electronics, 39, 4, (1993), 905-910.
  2. Blythe and Fridrich, 2004. Secure digital camera, In Proceedings of the Digital Forensic Research Workshop, (2004), 17-19.
  3. Mahdian B. and Saic S, 2010. A bibliography on blind methods for identifying image forgery, J. Signal Processing: Image Communication, Elseveir, 25, 6, (2010), 389-399.
  4. M. P. Queluz, "Authentication of Digital Images and Video: Generic models and a new contribution" Signal Processing: Image Communication 16(2001), 461-475.
  5. Shan Suthaharan, "Fragile Image Watermarking using a gradient image for improved localization and security", Pattern Recognition Letters 25(2004) 1893-1903.
  6. Xunzhan Zhua, Anthony T. S. Hob, Pina Marziliano, " A new semi-fragile image watermarking with robust tampering restoration using irregular sampling", Signal Processing: Image Communication 22(2007), 512-528.
  7. X. Zhou, X. Duan, And D. Wang, "A Semifragile Watermark Scheme For Image Authentication," In Multimedia Modelling Conference, 2004. Proceedings. 10th International, 2004, Pp. 374-377.
  8. Deguilluame et al. 2003. Secure hybrid robust watermarking resistant against tampering and copy attack, J. signal Processing, Elseveir, 83, 10(2003), 2133-2170.
  9. Tzeng and Tsai. 2001. A new technique for authentication of image/video for multimedia applications, In Proceedings of Workshop on Multimedia and Security, ACM Press, new York, USA, (2001), 23-26.
  10. R. Bausvs And A. Kriukovas, "Digital Signature Approach For Image Authentication," Electronics & Electrical Engineering, 2008.
  11. Dr. S. d. Chede, Prof. P. R. Lakhe "Forgery of Copy Move Image Detection Technique by Integrating Block and Feature Based Method" International Journal of Advanced Research in Computer and Communication engineering Vol 4, Issue 1, January 2015.
  12. Hany Farid, "Image Forgery Detection", IEEE SIGNAL PROCESSING MAGAZINE, pp. 16-25, March 2009.
  13. H. Shah, P. Shinde and J. Kukreja, "Retouching Detection and Steganalysis", IJEIR, Vol. 2, pp. 487-490, 2013.
  14. M. Sridevi, C. Mala, And S. Sanyam, "Comparative Study Of Image Forgery And Copy-Move Techniques," In Advances In Computer Science, Engineering & Applications, Ed: Springer, 2012, Pp. 715-723.
  15. N. D. Wandji, S. Xingming, And M. F. Kue, "Detection Of Copy-Move Forgery In Digital Images Based On Dct," International Journal Of Computer Science Issues (Ijcsi), Vol. 10, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Active Technology Passive Technology Digital Watermarking Digital Signature