4 research outputs found

    Image Hash Minimization for Tamper Detection

    Full text link
    Tamper detection using image hash is a very common problem of modern days. Several research and advancements have already been done to address this problem. However, most of the existing methods lack the accuracy of tamper detection when the tampered area is low, as well as requiring long image hashes. In this paper, we propose a novel method objectively to minimize the hash length while enhancing the performance at low tampered area.Comment: Published at the 9th International Conference on Advances in Pattern Recognition, 201

    Novel framework for optimized digital forensic for mitigating complex image attacks

    Get PDF
    Digital Image Forensic is significantly becoming popular owing to the increasing usage of the images as a media of information propagation. However, owing to the presence of various image editing tools and softwares, there is also an increasing threats over image content security. Reviewing the existing approaches of identify the traces or artifacts states that there is a large scope of optimization to be implmentation to further enhance teh processing. Therfore, this paper presents a novel framework that performs cost effective optmization of digital forensic tehnqiue with an idea of accurately localizing teh area of tampering as well as offers a capability to mitigate the attacks of various form. The study outcome shows that propsoed system offers better outcome in contrast to existing system to a significant scale to prove that minor novelty in design attribute could induce better improvement with respect to accuracy as well as resilience toward all potential image threats

    Reviewing the Effectivity Factor in Existing Techniques of Image Forensics

    Get PDF
    Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered regions using different forms of research methodologies. However, it is still an open-end question about the effectiveness of existing image forgery detection techniques as there is no reported benchmarked outcome till date about it. Therefore, the present manuscript discusses about the most frequently addressed image attacks e.g. image splicing and copy-move attack and elaborates the existing techniques presented by research community to resist it. The paper also contributes to explore the direction of present research trend with respect to tool adoption, database adoption, and technique adoption, and frequently used attack scenario. Finally, significant open research gap are explored after reviewing effectiveness of existing techniques

    Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection

    No full text
    corecore