0% found this document useful (0 votes)
209 views2 pages

Digital Image Forgery Detection

Computer-based criminal activities cost billions annually. Digital image forgery involves tampering, compositing, or copy-move techniques to manipulate photographs. Passive forgery detection analyzes image integrity without prior information, while active detection uses watermarking or signatures. The copy-move algorithm detects cloning by comparing vector values of divided image blocks.

Uploaded by

karthiveera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
209 views2 pages

Digital Image Forgery Detection

Computer-based criminal activities cost billions annually. Digital image forgery involves tampering, compositing, or copy-move techniques to manipulate photographs. Passive forgery detection analyzes image integrity without prior information, while active detection uses watermarking or signatures. The copy-move algorithm detects cloning by comparing vector values of divided image blocks.

Uploaded by

karthiveera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Digital image forgery

Computer forensics is one of the largest growth professions of the 21 st century. The rapid
growth in computer technology with the constant computerization of business processes has
created new opportunities for computer criminals. Study after study has revealed that
computer-based criminal activities are costing business and government organizations
billions of dollars every year. Even though lot of advancement has been around the world to
fight back, it is still a challenge to the law enforcement agencies.
Types
Tampering
Tampering is manipulation of an image to achieve a specific result. Figure 4 is a good
example of tampering.

Figure 4: The photo on left (original) shows five persons, whereas the photo on right
(tampered) shows only four persons.
Compositing
Compositing is a common form of photographic manipulation in which the digital splicing of
two or more images into a single composite (Figure 5).

Figure 5: The original image on the left shows John Kerry without Jane Fonda. Jane Fonda
appears alone in another original image on the centre. However, the composite image in the
right brings these two images together into a message-telling composite.
Copy and move
One of the most common image manipulations is to clone (copy and paste) portions of the
image to conceal a person or object in the scene (Figure 6a and 6b). Copying the features
from one part to hide or alter other part of the original is another approach to document
forgery. When cloning is done with care it is difficult to detect visually.

This portion is copied here ( so the vector value will be same)

Figure 6a: The photo on left (original) shows two vehicles. The photo on right (forged)
Shows one of the vehicle is hidden.

Figure 6b: The photo on left (original) shows a dustbin in a garden, which is not present in
the photo in the right (forged).
Digital Image Forgery Detection
The preceding sections explain how it is relatively easy to create manipulated image.
However, despite a forgers best efforts, current editing techniques can be used for detecting
forgeries. Even with these techniques determining whether or not an image is authentic or not
is still challenging job. Digital image forgery detection methods are classified into active and
passive approaches. Passive approaches are also called as blind approach. The active
approaches are mainly based on digital water marking and signatures. In passive approach the
integrity of a digital image is checked passively to detect forgery. Passive approaches do not
rely on pre-registration or pre-embedded information like the active approach. The technique
employed depends upon whether or not prior knowledge of the image is available.

Copy Move Forgery detection Algorithm


1.
2.
3.
4.
5.
6.

Accept the image


Divide the image into n blocks of size 3x3
Convert each block into vector
Compare each block with the other block using vector value
If the vector value of two blocks are identical, mark the block as copied
Repeat step 4 thru step 5 until all the blocks are compared

You might also like