• Title/Summary/Keyword: Forged image

Search Result 35, Processing Time 0.023 seconds

Detection of Forged Regions and Filtering Regions of Digital Images Using the Characteristics of Re-interpolation (재보간의 특성을 이용한 디지털 이미지의 합성 영역 및 필터링 영역 검출)

  • Hwang, Min-Gu;Har, Dong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.179-194
    • /
    • 2012
  • Digital image forgery is becoming a topic of great interest with regard to honesty in imaging. We can often see forged digital images in a variety of places, such as the internet, and magazines, and in images used in political ads, etc. These can reduce the reliability and factual basis of the information contained in image. Therefore, objectivity is needed to determine if the image is forged so as to prevent confusion in the viewing public. Most digital forgeries consist of image resizing, rotating including the following interpolations. To find evidence of interpolation in forged images, this paper proposes a new method for detecting digital image forgery using general interpolation factors analyzed through re-interpolation algorithm of the forged images in order to determine the differences in the patterns. Through the re-interpolation algorithm we could detect the forged region and filtering region used image retouching included to interpolation.

Detection of Forged Signatures Using Directional Gradient Spectrum of Image Outline and Weighted Fuzzy Classifier

  • Kim, Chang-Kyu;Han, Soo-Whan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.12
    • /
    • pp.1639-1649
    • /
    • 2004
  • In this paper, a method for detection of forged signatures based on spectral analysis of directional gradient density function and a weighted fuzzy classifier is proposed. The well defined outline of an incoming signature image is extracted in a preprocessing stage which includes noise reduction, automatic thresholding, image restoration and erosion process. The directional gradient density function derived from extracted signature outline is highly related to the overall shape of signature image, and thus its frequency spectrum is used as a feature set. With this spectral feature set, having a property to be invariant in size, shift, and rotation, a weighted fuzzy classifier is evaluated for the verification of freehand and random forgeries. Experiments show that less than 5% averaged error rate can be achieved on a database of 500 signature samples.

  • PDF

Intelligent Immigration Control System by Using Passport Recognition and Face Verification

  • Kim, Kwang-Beak
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.240-246
    • /
    • 2006
  • This paper proposes the intelligent immigration control system that authorizes the traveler through immigration and detects forged passports by using automatic recognition of passport codes, the passport photo and face verification. The proposed system extracts and deskewes the areas of passport codes from the passport image. This paper proposes the novel ART algorithm creating the adaptive clusters to the variations of input patterns and it is applied to the extracted code areas for the code recognition. After compensating heuristically the recognition result, the detection of forged passports is achieved by using the picture and face verification between the passport photo extracted from the passport image and the picture retrieved from the database based on the recognized codes. Due to the proposed ART algorithm and the heuristic refinement, the proposed system relatively shows better performance.

Identification Method of Geometric and Filtering Change Regions in Modified Digital Images (수정된 디지털 이미지에서 기하학적 변형 및 필터링 변형 영역을 식별하는 기법)

  • Hwang, Min-Gu;Cho, Byung-Joo;Har, Dong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1292-1304
    • /
    • 2012
  • Recently, digital images are extremely forged by editors or advertisers. Also, amateurs can modify images throughout easy editing programs. In this study, we propose identification and analytical methods for the modified images to figure out those problems. In modified image analysis, we classify two parts; a filtering change and a geometric change. Those changes have an algorithm based on interpolation so that we propose the algorithm which is able to analyze a trace on a modified area. With this algorithm, we implement a detection map of interpolation using minimum filter, laplacian algorithm, and maximum filter. We apply the proposed algorithm to modified image and are able to analyze its modified trace using the detection map.

Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors

  • Zhang, Zhi;Wang, Dongyan;Wang, Chengyou;Zhou, Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4567-4587
    • /
    • 2017
  • With the growth of the Internet and the extensive applications of image editing software, it has become easier to manipulate digital images without leaving obvious traces. Copy-move is one of the most common techniques for image forgery. Image blind forensics is an effective technique for detecting tampered images. This paper proposes an improved copy-move forgery detection method based on the discrete cosine transform (DCT). The quantized DCT coefficients, which are feature representations of image blocks, are truncated using a truncation factor to reduce the feature dimensions. A method for judging whether two image blocks are similar is proposed to improve the accuracy of similarity judgments. The main transfer vectors whose frequencies exceed a threshold are found to locate the copied and pasted regions in forged images. Several experiments are conducted to test the practicability of the proposed algorithm using images from copy-move databases and to evaluate its robustness against post-processing methods such as additive white Gaussian noise (AWGN), Gaussian blurring, and JPEG compression. The results of experiments show that the proposed scheme effectively detects both copied region and pasted region of forged images and that it is robust to the post-processing methods mentioned above.

Medical Image Watermarking Using Mallat Wavelet Transform (Mallat 웨이브릿 변환을 이용한 의료 영상 워터마킹)

  • 고창림;조진호
    • Journal of Biomedical Engineering Research
    • /
    • v.23 no.2
    • /
    • pp.81-85
    • /
    • 2002
  • In this paper, a new fragi1e watermarking algorithm for medical images is proposed. It makes possible to resolve the security and forgery problem of the medical images. In the proposed algorithm. the singularity which represents the inherent characteristic of the medical image is extracted and used as watermark. To extract the singularity point. we adopted Mallat wavelet transform because it can describe the edge of image exactly. Mallat wavelet transform produces horizontal and vertical subbands of the same resolution with the original image. The magnitude and phase components of the edge are obtained using these subbands. Based on the magnitude and phase components. LMM which will be used as watermark is determined. As LMM is the inherent singularity of image, if any forgery is applied to medical image, LMM of original and forged image are different each other Detecting the changes of LMM for the two images makes it possible whether any image is undergone forgery or not From the experimental results, we conformed that the proposed algorithm detects the forged area of the image very well.

A Study on Invisibility Improvement of Watermarking Image (워터마킹 영상의 비가시성 개선에 관한 연구)

  • Min, Hye-Lan;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.910-913
    • /
    • 2005
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

  • PDF

Invisibility Improvement of Watermarking Image Based on Wavelet (웨이브릿 기반의 워터마킹 영상의 비가시성 개선)

  • Kim Hyeong-Gyun;Kim Yong-Ho;Lee Sang-Beom;Bae Yong-Guen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.717-720
    • /
    • 2006
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. for the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

  • PDF

Median Filtering Detection of Digital Images Using Pixel Gradients

  • RHEE, Kang Hyeon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.4
    • /
    • pp.195-201
    • /
    • 2015
  • For median filtering (MF) detection in altered digital images, this paper presents a new feature vector that is formed from autoregressive (AR) coefficients via an AR model of the gradients between the neighboring row and column lines in an image. Subsequently, the defined 10-D feature vector is trained in a support vector machine (SVM) for MF detection among forged images. The MF classification is compared to the median filter residual (MFR) scheme that had the same 10-D feature vector. In the experiment, three kinds of test items are area under receiver operating characteristic (ROC) curve (AUC), classification ratio, and minimal average decision error. The performance is excellent for unaltered (ORI) or once-altered images, such as $3{\times}3$ average filtering (AVE3), QF=90 JPEG (JPG90), 90% down, and 110% up to scale (DN0.9 and Up1.1) images, versus $3{\times}3$ and $5{\times}5$ median filtering (MF3 and MF5, respectively) and MF3 and MF5 composite images (MF35). When the forged image was post-altered with AVE3, DN0.9, UP1.1 and JPG70 after MF3, MF5 and MF35, the performance of the proposed scheme is lower than the MFR scheme. In particular, the feature vector in this paper has a superior classification ratio compared to AVE3. However, in the measured performances with unaltered, once-altered and post-altered images versus MF3, MF5 and MF35, the resultant AUC by 'sensitivity' (TP: true positive rate) and '1-specificity' (FN: false negative rate) is achieved closer to 1. Thus, it is confirmed that the grade evaluation of the proposed scheme can be rated as 'Excellent (A)'.

Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm (L0 Norm 기반의 LE(Local Effect) 연산자를 이용한 디지털 이미지 위변조 검출 기술 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.153-162
    • /
    • 2020
  • Digital image forgery detection is one of very important fields in the field of digital forensics. As the forged images change naturally through the advancement of technology, it has made it difficult to detect forged images. In this paper, we use passive forgery detection for copy paste forgery in digital images. In addition, it detects copy-paste forgery using the L0 Norm-based LE operator, and compares the detection accuracy with the forgery detection using the existing L2, L1 Norm-based LE operator. In comparison of detection rates, the proposed lower triangular(Ayalneh and Choi) window was more robust to BAG mismatch detection than the conventional window filter. In addition, in the case of using the lower triangular window, the performance of image forgery detection was measured increasingly higher as the L2, L1 and L0 Norm LE operator was performed.