Survey On Fake Image Detection Using Image Processing
Survey On Fake Image Detection Using Image Processing
noises for individual camera identification and tampering In this digital world we come across many image
detection. The work in estimates the demosaicing processing software that produce doctored Images with high
parameters for non-intrusive component forensic analysis on sophistication, which are manipulated in such a way that the
different camera models. Our proposed framework employs tampering is not easily visible to naked eye. The authenticity
a partial second-order image derivative correlation model, of a digital image has become a challenging task due to the
which detects both the intra-color channel and the cross- various tools present in the photo editing software packages.
channel demosaicing correlation. A reverse classification There are number of ways of tampering an Image, such as
scheme is incorporated to precisely classify the demosaiced splicing two different images together, removal of objects
samples into small categories, which best reveal the original from the image, addition of objects in the image, change of
demosaicing grouping. The simulation results show that our appearance of objects in the image or resizing the image.
proposed demosaicing features confidently outperform 2 This Image Morphing detection technique detects traces of
existing demosaicing detection methods in identifying 16 digital tampering in the complete absence of any form of
demosaicing algorithms in the presence of various common digital watermark or signature and is therefore referred as
post-demosaicing processes. Our proposed features are also passive. So there is a need for developing techniques to
highly effective in distinguishing different post-processes distinguish the original images from the manipulated ones,
and are more sensitive to small scenery variations.[1] the genuine ones from the doctored ones. In this paper we
Image morphing techniques can generate describe a novel approach for detecting Image morphing.
compelling 2D transitions between images. However, The new scheme is designed to detect any changes to a
differences in object pose or viewpoint often cause signal. We recognize that images from digital cameras
unnatural distortions in image morphs that are difficult to contain traces of re-sampling as a result of using a color
correct manually. Demosaicing of Color Filter Array filter array with demosaicing algorithms. Our results show
Captured Images Using Gradient Edge Detection Masks and that the proposed scheme has a good accuracy in locating
Adaptive Heterogeneity-Projection based on spectral-spatial tampered pixels.[4]
correlation, a novel adaptive heterogeneity-projection with The multimedia applications are rapidly increasing.
proper mask size for each pixel is presented. Combining the It is essential to ensure the authenticity of multimedia
extracted gradient/edge information and the adaptive components. The image is one of the integrated components
heterogeneity-projection values, a new edge-sensing of the multimedia. In this paper ,we designing a model
demosaicing algorithm is presented. Based on 24 popular based on customized filter mask to ensure the authenticity of
testing images, experimental results demonstrated that our image that means the image forgery detection based on
proposed high-quality demosaicing algorithm has the best customized filter mask. We have satisfactory results for our
image quality performance when compared with several dataset. Image compositing is most popular image forgery.
recently published algorithms. It presents a new approach to The figure 1 shows the creation of image compositing. The
extract more accurate gradient information on mosaic photo compositing is the result of cutting and joining a two
images directly. In what follows, the luminance estimation or more photographs with seamless transition without
technique for mosaic images is first introduced. Then, leaving any visual clues about the joining from other
combining the luminance estimation technique and Sobel photographs. The image compositing is also known as
operator , our proposed new approach to extract more photomontage and image splicing. The image compositing
gradient information on mosaic images is presented. [2] detection assumes that the image scene authenticity
A novel manipulation detection framework for properties and conditions such as illuminations, object
image patches using a fusion procedure, called FusionBoost, surface properties, shadow, noise, inter-reflections.
in conjunction with accurately detected derivative Perspective and projective views etc. are rare and difficult
correlation features. By first dividing all demosaiced match in a composite image. The image composite detection
samples of a color image into a number of categories, we techniques are able to detect the above inconsistent
estimate their underlying demosaicing formulas based on properties in different parts of the same images, the image
partial derivative correlation models and extract several edges, boundaries and colors, and image qualities may be
types of derivative correlation features. The features are affected by image compositing. The image forgery can be
organized into small subsets according to both the identified by the specific patterns relating to image attributes
demosaicing category and the feature type. For each subset, which disturbed by the forgery operations. Particularly
we train a lightweight manipulation detector using image composting is created by the two or more images
probabilistic support vector machines. FusionBoost is then sources, naturally all the different images are taken from the
proposed to learn the weights of an ensemble detector for different devices and at different world view conditions. The
achieving the minimum error rate. By applying the ensemble host image conditions are expected to reflect in image
detector on cropped photo patches from different image portions of the altered images. The abrupt and unnatural
sources, large-scale experiments show that our proposed luminance levels, colors and edges are able to detect the
method achieves low average detection error rates of 2.0% image forgeries.[5]
to 4.3% in simultaneously detecting a large variety of Image processing is often not necessary for image
common manipulation attempts for image patches from manipulation detection. For instance, a picture supposed to
several different source models. Our framework shows good be taken in India that shows the China monument in the
learning efficiency for highly imbalanced tasks. In several background will be suspect by inspection. Detection of
patch-based detection examples, we demonstrate the incongruous textural features, however, may require
efficacy of the proposed method in detecting image substantial image processing. The manipulation are
manipulations on local patches.[3] sometimes not noticeable by human eye, they do affect the
statistics of the image, because of detection of tampering is forgeries, and then save the result in the NTSC format on an
possible. Thus it becomes very important to develop ordinary videotape. Digital watermarks have been proposed
efficient techniques which may detect these forgeries which as a means for fragile authentication, content authentication,
are addition of an object in image, removal of object from detection of tampering, localization of changes, and
image and change of appearance of the object in image. The recovery of original content. While digital watermarks can
process of Image morphing detection can involve several provide useful information about the image integrity and its
works. These work include, but are not limited to, processing history, the watermark must be present in the
evaluation of image structure issues include discovery of image before the tampering occurs.In a Copy-Move forgery,
artifacts consistent with image manipulation or degradation, a part of the image itself is copied and pasted into another
metadata analysis, and indications of provenance and Image part of the same image. Textured areas, such as grass,
content issues include continuity issues, evidence of foliage, or fabric with irregular patterns, are ideal for this
manipulation, evidence of staging, and misplacing. There purpose because the copied areas will likely blend with the
are several possible techniques for detecting manipulation in background and the human eye cannot easily understand any
the source of a digital image. Image can be authenticated by suspicious artifacts. Because the copied parts come from
Digital watermarking. Digital watermarking has two classes the same image, its noise component, color palette, dynamic
of watermarks, fragile and robust. Robust watermarks range, and most other important properties will be
techniques are designed to be detected even after attempts compatible with the rest of the image and thus will not be
are made to remove them. Fragile watermarks techniques detectable using methods that look for incompatibilities in
are used for authentication purposes and are capable of statistical measures in different parts of the image.[7]
detecting even minute changes of the watermarked content.
But, neither type of watermark is ideal when considering
"information preserving transformations (such as
compression) which keep the meaning or expression of the
content and "information altering" transformations (such as
feature replacement) which modify the expression of the
content.[6]
have demonstrated the importance of jointly exploiting International Journal on Computational Sciences &
spatial and spectral correlations especially for images with Applications (IJCSA) Vo2, No.6, December 2012
high-saturation and varying-hue. We have also observed that [9] Hany Farid, “Image Forgery Detection”, IEEE Signal
even ad-hoc fusion by averaging different demosaiced Processing Magazine [16] MARCH 2009
images could lead to further improvement. There are three
directions along which further studies are definitely needed.
First, demosaicing of images with weak spectral correlation
remains a challenging task. Our understanding about the
tradeoff between spatial and spectral correlation is still
primitive though some attention has been paid to this issue
by one group of contributing authors to this session. Last but
not the least, the performance evaluation of demosaicing
algorithms needs more careful investigation.
Complementing the current proposed approach to identify
different image software processing pipelines, additional
features such as sensor noise pattern are needed in
identification of individual cameras of the same model.
Further investigation effort also includes verifying the
effectiveness of our proposed demosaicing features on the
camera models of non-Bayer CFAs.
ACKNOWLEDGMENT
The authors would like to thank the referees for their
valuable comments which helped improve the quality of the
paper greatly.
REFERENCES
[1] Hong CAO, student member, IEEE, and Alex C. KOT,
Fellow, IEEE, “Accurate Detection of Demosaicing
Regularity for Digital Image Forensics”,
[2] Kuo-Liang Chung, Senior Member, IEEE, Wei-Jen
Yang, Wen-Ming Yan, and Chung-Chou Wang,
“Demosaicing of Color Filter Array Captured Images
Using Gradient Edge Detection Masks and Adaptive
Heterogeneity-Projection”, IEEE Transactions On
Image Processing, VOL. 17, NO. 12, DECEMBER
2008
[3] Hong Cao, Member, IEEE, and Alex C. Kot, Fellow,
IEEE, “Manipulation Detection on Image Patches
Using FusionBoost”, IEEE Transactions On
Information Forensics And Security, VOL. 7, NO. 3,
JUNE 2012
[4] Nilesh P Ghatol, Rahul Paigude, Aniket Shirke “Image
Morphing Detection by Locating Tampered Pixels with
Demosaicing Algorithms”, International Journal of
Computer Applications (0975 – 8887) Volume 66–
No.8, March 2013
[5] Shrishail Math , R.C.Tripathi “Images Image composite
detection using customized”, International Journal of
Computer Graphics & Animation (IJCGA) Vol.1, No.3,
October 2011
[6] Mr. Vinayak K. Shingote, Prof. Ruhi Kabara, “Image
Authentication by Detecting Demosaicing ”, IJARCCE
Vol. 4, Issue 5, May 2015
[7] Jessica Fridrich, David Soukal, and Jan Lukáš
Detection of Copy-Move Forgery in Digital Images
“”,SUNY Binghamton, Binghamton, NY 13902-6000
[8] S.Murali1 , Govindraj B. Chittapur2 , Prabhakara H. S 1
and Basavaraj S. Anami3, “Comparison and analysis of
photo image forgery detection techniques” ,