• Title/Summary/Keyword: Forgery detection

Search Result 80, Processing Time 0.027 seconds

Color Image Splicing Detection using Benford's Law and color Difference (밴포드 법칙과 색차를 이용한 컬러 영상 접합 검출)

  • Moon, Sang-Hwan;Han, Jong-Goo;Moon, Yong-Ho;Eom, Il-Kyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.160-167
    • /
    • 2014
  • This paper presents a spliced color image detection method using Benford' Law and color difference. For a suspicious image, after color conversion, the discrete wavelet transform and the discrete cosine transform are performed. We extract the difference between the ideal Benford distribution and the empirical Benford distribution of the suspicious image as features. The difference between Benford distributions for each color component were also used as features. Our method shows superior splicing detection performance using only 13 features. After training the extracted feature vector using SVM classifier, we determine whether the presence of the image splicing forgery. Experimental results show that the proposed method outperforms the existing methods with smaller number of features in terms of splicing detection accuracy.

Median Filtering Detection of Digital Images Using Pixel Gradients

  • RHEE, Kang Hyeon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.4
    • /
    • pp.195-201
    • /
    • 2015
  • For median filtering (MF) detection in altered digital images, this paper presents a new feature vector that is formed from autoregressive (AR) coefficients via an AR model of the gradients between the neighboring row and column lines in an image. Subsequently, the defined 10-D feature vector is trained in a support vector machine (SVM) for MF detection among forged images. The MF classification is compared to the median filter residual (MFR) scheme that had the same 10-D feature vector. In the experiment, three kinds of test items are area under receiver operating characteristic (ROC) curve (AUC), classification ratio, and minimal average decision error. The performance is excellent for unaltered (ORI) or once-altered images, such as $3{\times}3$ average filtering (AVE3), QF=90 JPEG (JPG90), 90% down, and 110% up to scale (DN0.9 and Up1.1) images, versus $3{\times}3$ and $5{\times}5$ median filtering (MF3 and MF5, respectively) and MF3 and MF5 composite images (MF35). When the forged image was post-altered with AVE3, DN0.9, UP1.1 and JPG70 after MF3, MF5 and MF35, the performance of the proposed scheme is lower than the MFR scheme. In particular, the feature vector in this paper has a superior classification ratio compared to AVE3. However, in the measured performances with unaltered, once-altered and post-altered images versus MF3, MF5 and MF35, the resultant AUC by 'sensitivity' (TP: true positive rate) and '1-specificity' (FN: false negative rate) is achieved closer to 1. Thus, it is confirmed that the grade evaluation of the proposed scheme can be rated as 'Excellent (A)'.

Median Filtering Detection using Latent Growth Modeling (잠재성장모델링을 이용한 미디언 필터링 검출)

  • Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.61-68
    • /
    • 2015
  • In recent times, the median filtering (MF) detector as a forensic tool for the recovery of forgery images' processing history has concerned broad interest. For the classification of MF image, MF detector should be designed with smaller feature set and higher detection ratio. This paper presents a novel method for the detection of MF in altered images. It is transformed from BMP to several kinds of MF image by the median window size. The difference distribution values are computed according to the window sizes and then the values construct the feature set same as the MF window size. For the MF detector, the feature set transformed to the model specification which is computed using latent growth modeling (LGM). Through experiments, the test image is classified by the discriminant into two classes: the true positive (TP) and the false negative (FN). It confirms that the proposed algorithm is to be outstanding performance when the minimum distance average is 0.119 in the confusion of TP and FN for the effectivity of classification.

Detection of Spliced Image Using Run-length of Wavelet Coefficients and Statistical Moments (웨이블릿 계수의 런-길이와 통계적 모멘트를 이용한 접합 영상 검출)

  • Kim, Tae-Hyung;Han, Jong-Goo;Park, Tae-Hee;Eom, Il-Kyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.152-159
    • /
    • 2014
  • In this paper, we introduce a run-length for wavelet coefficients and present a image splicing detection method using the statistical moments for the wavelet run-length. Various pre-processings for the suspicious image are performed to emphasize the discontinuous edges caused by the image splicing. The proposed scheme has the merit that can exploit the various statistical characteristics of the wavelet transform. We extracted up to 72 features, and performed training and testing using SVM(support vector machine). Experimental results showed that the proposed method generates similar detection results compared to the existing methods. In addition, we showed the wavelet domain run-length is useful to detect the spliced image.

Current status of food safety detection methods for Smart-HACCP system (스마트-해섭(Smart-HACCP) 적용을 위한 식품안전 검시기술 동향)

  • Lim, Min-Cheol;Woo, Min-Ah;Choi, Sung-Wook
    • Food Science and Industry
    • /
    • v.54 no.4
    • /
    • pp.293-300
    • /
    • 2021
  • Food safety accidents have been increasing by 2% over 5,000 cases every year since 2009. Most people know that the best method to prevent food safety accidents is a quick inspection, but there is a lack of inspection technology that can be used at the non-analytic level to food production and distribution sites. Among the recent on-site diagnostic technologies, the methods for testing gene-based food poisoning bacteria were introduced with the STA technology, which can range from sample to detection. If food safety information can be generated without forgery by directly inspecting food hazard factors by remote, unmanned, not human, pollution sources can be managed by predicting risks more accurately from current big-data and artificial intelligence technology. Since this information processing can be used on smartphones using the current cloud technology, it is judged that it can be used for food safety to small food businesses or catering services.

A Blockchain-Based Cheating Detection System for Online Examination (블록체인 기반 온라인 시험 부정행위 탐지 시스템)

  • Nam, Goo Mo;Park, Ji Su;Shon, Jin Gon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.6
    • /
    • pp.267-272
    • /
    • 2022
  • Online exams are not limited by time and space. It has the advantage that it does not require a separate exam site for examinees, and there is no time and cost required to move to the exam site. However, the online exam has the disadvantage that various cheating is possible because the exam is conducted in an individual environment. In addition, there is a difficulty in detecting cheating due to the lack of exam supervision methods. In addition, since the exam process and result data exist only as digital data, it is inconvenient to check directly on the server where the exam result is stored in order to check whether the exam result is forged or not. If the data related to the exam is maliciously changed, the authenticity cannot be verified. In this study, we tried to increase the reliability of the online exam by developing a blockchain-based online exam cheating detection system that stores exam progress-related data in the blockchain to detect cheating. Through the experiment, it was confirmed that forgery and falsification are detected as a result of the exam.

Broken Integrity Detection of Video Files in Video Event Data Recorders

  • Lee, Choongin;Lee, Jehyun;Pyo, Youngbin;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3943-3957
    • /
    • 2016
  • As digital evidence has a highly influential role in proving the innocence of suspects, methods for integrity verification of such digital evidence have become essential in the digital forensic field. Most surveillance camera systems are not equipped with proper built-in integrity protection functions. Because digital forgery techniques are becoming increasingly sophisticated, manually determining whether digital content has been falsified is becoming extremely difficult for investigators. Hence, systematic approaches to forensic integrity verification are essential for ascertaining truth or falsehood. We propose an integrity determination method that utilizes the structure of the video content in a Video Event Data Recorder (VEDR). The proposed method identifies the difference in frame index fields between a forged file and an original file. Experiments conducted using real VEDRs in the market and video files forged by a video editing tool demonstrate that the proposed integrity verification scheme can detect broken integrity in video content.

An Automatic Method of Detecting Audio Signal Tampering in Forensic Phonetics (법음성학에서의 오디오 신호의 위변조 구간 자동 검출 방법 연구)

  • Yang, Il-Ho;Kim, Kyung-Wha;Kim, Myung-Jae;Baek, Rock-Seon;Heo, Hee-Soo;Yu, Ha-Jin
    • Phonetics and Speech Sciences
    • /
    • v.6 no.2
    • /
    • pp.21-28
    • /
    • 2014
  • We propose a novel scheme for digital audio authentication of given audio files which are edited by inserting small audio segments from different environmental sources. The purpose of this research is to detect inserted sections from given audio files. We expect that the proposed method will assist human investigators by notifying suspected audio section which considered to be recorded or transmitted on different environments. GMM-UBM and GSV-SVM are applied for modeling the dominant environment of a given audio file. Four kinds of likelihood ratio based scores and SVM score are used to measure the likelihood for a dominant environment model. We also use an ensemble score which is a combination of the aforementioned five kinds of scores. In the experimental results, the proposed method shows the lowest average equal error rate when we use the ensemble score. Even when dominant environments were unknown, the proposed method gives a similar accuracy.

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

A Method of Forensic Authentication via File Structure and Media Log Analysis of Digital Images Captured by iPhone (아이폰으로 촬영된 디지털 이미지의 파일 구조 및 미디어 로그 분석을 통한 법과학적 진본 확인 방법)

  • Park, Nam In;Lee, Ji Woo;Jeon, Oc-Yeub;Kim, Yong Jin;Lee, Jung Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.4
    • /
    • pp.558-568
    • /
    • 2021
  • The digital image to be accepted as legal evidence, it is important to verify the authentication of the digital image. This study proposes a method of authenticating digital images through three steps of comparing the file structure of digital images taken with iPhone, analyzing the encoding information as well as media logs of the iPhone storing the digital images. For the experiment, digital image samples were acquired from nine iPhones through a camera application built into the iPhone. And the characteristics of file structure and media log were compared between digital images generated on the iPhone and digital images edited through a variety of image editing tools. As a result of examining those registered during the digital image creation process, it was confirmed that differences from the original characteristics occurred in file structure and media logs when manipulating digital images on the iPhone, and digital images take with the iPhone. In this way, it shows that it can prove its forensic authentication in iPhone.