472 research outputs found

    STUDI IMAGE FORENSIC PADA TOOLS FOTO FORENSICS

    Get PDF
    Di era digital sekarang ini, orang dengan mudah mengambil foto dari kamera digital dan dengan bantuan aplikasi edit foto digital, memanipulasi sebuah foto atau menggabungkan berbagai foto menjadi sebuah foto baru seakan yang terlihat sangat natural atau seperti sebuah foto asli tanpa terlihat adanya hasil editan. Dan dengan bantuan internet, foto tersebut bisa dengan mudah tersebar luas dan cepat. Terkadang, foto yang tersebar di internet bisa menimbulkan kontroversi terutama bila foto tersebut merupakan foto orang terkenal sebut saja misalnya foto artis yang tampil penuh sensasi. Akibat kemudahan memanipulasi foto tersebut, kita jadi ragu untuk mempercayai keaslian foto yang tersebar di internet, apalagi sekarang ini juga sudah banyak aplikasi edit foto online yang semakin memudahkan orang memodifikasi foto. Untuk membuktikan keaslian sebuah foto di lakukan pengujiannya dengan menggunakan bantuan software FOTO FORENSICS. Ilmu yang akan di dapat yaitu kita bias mengetahui keaslian foto yang akan diuji, kemudian kita bias mengetahui proses pemeriksaan gambar dengan menggunakan software FOTO FORENSICS. Kata kunci : Forensics, Reverse Engginering, Foto, Informasi

    Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks

    Full text link
    Due to the wide diffusion of JPEG coding standard, the image forensic community has devoted significant attention to the development of double JPEG (DJPEG) compression detectors through the years. The ability of detecting whether an image has been compressed twice provides paramount information toward image authenticity assessment. Given the trend recently gained by convolutional neural networks (CNN) in many computer vision tasks, in this paper we propose to use CNNs for aligned and non-aligned double JPEG compression detection. In particular, we explore the capability of CNNs to capture DJPEG artifacts directly from images. Results show that the proposed CNN-based detectors achieve good performance even with small size images (i.e., 64x64), outperforming state-of-the-art solutions, especially in the non-aligned case. Besides, good results are also achieved in the commonly-recognized challenging case in which the first quality factor is larger than the second one.Comment: Submitted to Journal of Visual Communication and Image Representation (first submission: March 20, 2017; second submission: August 2, 2017

    Forensic Technique for Detection of Image Forgery

    Full text link
    Todays digital image plays an important role in all areas such as baking, communication, business etc. Due to the availability of manipulation software it is very easy to manipulate the original image. The contents in an original image can be copy-paste to hide some information or to create tampering. The new area introduces to detect the forgery is an image forensic. In this paper proposes the new image forensic technique to detect the presence of forgery in the compressed images and in other format images. The proposed method is based on the no subsampled contoured transform (NSCT). The proposed method is made up of three parts as preprocessing, nsct transform and forgery detection. The proposed forensic method is flexible, multiscale, multidirectional, and image decomposition is shift invariant that can be efficiently implemented via the Ă  trous algorithm. The proposed a design framework based on the mapping approach. This method allows for a fast implementation based on a lifting or ladder structure. The proposed method ensures that the frame elements are regular, symmetric, and the frame is close to a tight one. The NSCT compares with and dct method in this paper

    An Image Forensic Scheme with Robust and Fragile Watermarking for Business Documents

    Get PDF
    This paper proposes an image forensic scheme with both robust and fragile watermarking techniques for business documents. Through a dual watermarking approach, the proposed scheme can achieve image forensics objectives of (a) identification of source; (b) authentication of documents; and (c) locating the tempered areas of documents due to attacks. An example is presented to prove the concepts of the proposed scheme. Keywords: Image Forensics, Fragile and Robust Watermarking, Business Document

    A Wild Manhunt for Stego Images Created by Modbile Apps.

    Get PDF
    Background: As mobile Internet and telecommunication technology develops at high speed, the digital image forensics academic community is facing a growing challenge. • Mobile applications (Apps) allow a user to easily edit/process an image for a variety of purposes. • Thanks to the improved cameras and editing apps on smartphones, the volume of images presented to digital image forensic practitioners increases every day. • Unfortunately, terrorists, spies and child pornography predators are also taking the advantage of the mobile app ecosystem to exchange illegal files and photos
    • …
    corecore