472 research outputs found
STUDI IMAGE FORENSIC PADA TOOLS FOTO FORENSICS
Di era digital sekarang ini, orang dengan mudah mengambil foto dari kamera
digital dan dengan bantuan aplikasi edit foto digital, memanipulasi sebuah foto atau
menggabungkan berbagai foto menjadi sebuah foto baru seakan yang terlihat sangat
natural atau seperti sebuah foto asli tanpa terlihat adanya hasil editan. Dan dengan bantuan
internet, foto tersebut bisa dengan mudah tersebar luas dan cepat. Terkadang, foto yang
tersebar di internet bisa menimbulkan kontroversi terutama bila foto tersebut merupakan
foto orang terkenal sebut saja misalnya foto artis yang tampil penuh sensasi.
Akibat kemudahan memanipulasi foto tersebut, kita jadi ragu untuk mempercayai
keaslian foto yang tersebar di internet, apalagi sekarang ini juga sudah banyak aplikasi edit
foto online yang semakin memudahkan orang memodifikasi foto. Untuk membuktikan
keaslian sebuah foto di lakukan pengujiannya dengan menggunakan bantuan software
FOTO FORENSICS.
Ilmu yang akan di dapat yaitu kita bias mengetahui keaslian foto yang akan diuji,
kemudian kita bias mengetahui proses pemeriksaan gambar dengan menggunakan
software FOTO FORENSICS.
Kata kunci : Forensics, Reverse Engginering, Foto, Informasi
Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks
Due to the wide diffusion of JPEG coding standard, the image forensic
community has devoted significant attention to the development of double JPEG
(DJPEG) compression detectors through the years. The ability of detecting
whether an image has been compressed twice provides paramount information
toward image authenticity assessment. Given the trend recently gained by
convolutional neural networks (CNN) in many computer vision tasks, in this
paper we propose to use CNNs for aligned and non-aligned double JPEG
compression detection. In particular, we explore the capability of CNNs to
capture DJPEG artifacts directly from images. Results show that the proposed
CNN-based detectors achieve good performance even with small size images (i.e.,
64x64), outperforming state-of-the-art solutions, especially in the non-aligned
case. Besides, good results are also achieved in the commonly-recognized
challenging case in which the first quality factor is larger than the second
one.Comment: Submitted to Journal of Visual Communication and Image Representation
(first submission: March 20, 2017; second submission: August 2, 2017
Forensic Technique for Detection of Image Forgery
Todays digital image plays an important role in all areas such as baking, communication, business etc. Due to the availability of manipulation software it is very easy to manipulate the original image. The contents in an original image can be copy-paste to hide some information or to create tampering. The new area introduces to detect the forgery is an image forensic. In this paper proposes the new image forensic technique to detect the presence of forgery in the compressed images and in other format images. The proposed method is based on the no subsampled contoured transform (NSCT). The proposed method is made up of three parts as preprocessing, nsct transform and forgery detection. The proposed forensic method is flexible, multiscale, multidirectional, and image decomposition is shift invariant that can be efficiently implemented via the Ă trous algorithm. The proposed a design framework based on the mapping approach. This method allows for a fast implementation based on a lifting or ladder structure. The proposed method ensures that the frame elements are regular, symmetric, and the frame is close to a tight one. The NSCT compares with and dct method in this paper
An Image Forensic Scheme with Robust and Fragile Watermarking for Business Documents
This paper proposes an image forensic scheme with both robust and fragile watermarking techniques for business documents. Through a dual watermarking approach, the proposed scheme can achieve image forensics objectives of (a) identification of source; (b) authentication of documents; and (c) locating the tempered areas of documents due to attacks. An example is presented to prove the concepts of the proposed scheme.
Keywords: Image Forensics, Fragile and Robust Watermarking, Business Document
A Wild Manhunt for Stego Images Created by Modbile Apps.
Background: As mobile Internet and telecommunication technology develops at high speed, the digital image forensics academic community is facing a growing challenge. • Mobile applications (Apps) allow a user to easily edit/process an image for a variety of purposes. • Thanks to the improved cameras and editing apps on smartphones, the volume of images presented to digital image forensic practitioners increases every day. • Unfortunately, terrorists, spies and child pornography predators are also taking the advantage of the mobile app ecosystem to exchange illegal files and photos
- …