• Title/Summary/Keyword: Digital Forgery

Search Result 99, Processing Time 0.022 seconds

Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms

  • Thajeel, Salam A.;Mahmood, Ali Shakir;Humood, Waleed Rasheed;Sulong, Ghazali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4005-4025
    • /
    • 2019
  • Copy-move forgery (CMF) in digital images is a detrimental tampering of artefacts that requires precise detection and analysis. CMF is performed by copying and pasting a part of an image into other portions of it. Despite several efforts to detect CMF, accurate identification of noise, blur and rotated region-mediated forged image areas is still difficult. A novel algorithm is developed on the basis of quaternion polar complex exponential transform (QPCET) to detect CMF and is conducted involving a few steps. Firstly, the suspicious image is divided into overlapping blocks. Secondly, invariant features for each block are extracted using QPCET. Thirdly, the duplicated image blocks are determined using k-dimensional tree (kd-tree) block matching. Lastly, a new technique is introduced to reduce the flat region-mediated false matches. Experiments are performed on numerous images selected from the CoMoFoD database. MATLAB 2017b is used to employ the proposed method. Metrics such as correct and false detection ratios are utilised to evaluate the performance of the proposed CMF detection method. Experimental results demonstrate the precise and efficient CMF detection capacity of the proposed approach even under image distortion including rotation, scaling, additive noise, blurring, brightness, colour reduction and JPEG compression. Furthermore, our method can solve the false match problem and outperform existing ones in terms of precision and false positive rate. The proposed approach may serve as a basis for accurate digital image forensic investigations.

LPM-Based Digital Watermarking for Forgery Protection in Printed Materials (인쇄물의 위조 방지를 위한 LPM기반의 디지털 워터마킹)

  • Bae Jong-Wook;Lee Sin-Joo;Jung Sung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1510-1519
    • /
    • 2005
  • We proposed a digital watermarking method that it is possible to identify the copyright because the watermark is detected in the first print-scan and to protect a forgery because the watermark is not detected in the second print-scan. The proposed algorithm uses LPM and DFT transform for the robustness to the distortion of pixel value and geometrical distortion. This methods could improve watermark detection performance and image quality by selecting maximum sampling radius in LPM transform. After analyzing the characteristics of print-scan process, we inserted the watermark in the experimentally selected frequency bands that survives robustly to the first print-scan and is not detected in the second print-scan, using the characteristic of relatively large distortion in high frequency bands of DFT As the experimental result, the original proof is possible because average similarity degree 5.13 is more than the critical value 4.0 in the first print-scan. And the detection of forgery image is also possible because average similarity degree 2.76 is less than the critical value 4.0 in the second print-scan.

  • PDF

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

Online Digital Content Distribution Model and System Design for Interindividual Content Transferability (개인간 콘텐츠 양도기능을 제공하는 온라인 디지털 콘텐츠 유통 모델 및 시스템 설계)

  • Lee, Hye-Joo;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.953-961
    • /
    • 2009
  • The usage of DRM-applied digital contents reduces user's convenience, thus it leads the many users to avoid using DRM-applied digital contents. In this paper, therefore, we propose the new distribution model in which the users, who purchase the DRM-applied digital contents, can resale freely those contents to the other users. As a result, the proposed model induces the users to distribute contents soundly by including them in one of distribution objects. For the purpose of this, in this paper, we propose that a packaged content and usage rights are transferred to another user by using a method which based on some existing digital ticket or coupon. In addition, the security of the proposed system is discussed for the double transfer, the forgery and the modification of usage rights, and the reproduction of contents and usage rights.

  • PDF

Microphone Type Classification for Digital Audio Forgery Detection (디지털 오디오 위조검출을 위한 마이크로폰 타입 인식)

  • Seok, Jongwon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.323-329
    • /
    • 2015
  • In this paper we applied pattern recognition approach to detect audio forgery. Classification of the microphone types and models can help determining the authenticity of the recordings. Canonical correlation analysis was applied to extract feature for microphone classification. We utilized the linear dependence between two near-silence regions. To utilize the advantage of multi-feature based canonical correlation analysis, we selected three commonly used features to capture the temporal and spectral characteristics. Using three different microphones, we tested the usefulness of multi-feature based characteristics of canonical correlation analysis and compared the results with single feature based method. The performance of classification rate was carried out using the backpropagation neural network. Experimental results show the promise of canonical correlation features for microphone classification.

Block based Smart Carving System for Forgery Analysis and Fragmented File Identification

  • Lee, Hanseong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.93-102
    • /
    • 2020
  • In order for data obtained through all stages of digital crime investigation to be recognized as evidence capability, it must satisfy legal / technical requirements. In this paper, we propose a mechanism and implement software to provide digital forensic evidence by automatically recovering files by scanning / inspecting the unallocated area inside the storage disk block without relying on information provided by the file system. The proposed technique checks / analyzes the RAW disk data of the system under analysis in 512-byte block units based on information on the storage format / file structure of various files stored on the disk without referring to the file system-related information provided by the operating system. The file carving process was implemented, and a smart carving mechanism was proposed to intelligently restore deleted or damaged files in the storage device. As a result, we have provided a block based smart carving method to intelligently identify fragmented and damaged files in storage efficiently for forgery analysis on digital forensic investigation.

Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors

  • Zhang, Zhi;Wang, Dongyan;Wang, Chengyou;Zhou, Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4567-4587
    • /
    • 2017
  • With the growth of the Internet and the extensive applications of image editing software, it has become easier to manipulate digital images without leaving obvious traces. Copy-move is one of the most common techniques for image forgery. Image blind forensics is an effective technique for detecting tampered images. This paper proposes an improved copy-move forgery detection method based on the discrete cosine transform (DCT). The quantized DCT coefficients, which are feature representations of image blocks, are truncated using a truncation factor to reduce the feature dimensions. A method for judging whether two image blocks are similar is proposed to improve the accuracy of similarity judgments. The main transfer vectors whose frequencies exceed a threshold are found to locate the copied and pasted regions in forged images. Several experiments are conducted to test the practicability of the proposed algorithm using images from copy-move databases and to evaluate its robustness against post-processing methods such as additive white Gaussian noise (AWGN), Gaussian blurring, and JPEG compression. The results of experiments show that the proposed scheme effectively detects both copied region and pasted region of forged images and that it is robust to the post-processing methods mentioned above.

Detection of Forged Regions and Filtering Regions of Digital Images Using the Characteristics of Re-interpolation (재보간의 특성을 이용한 디지털 이미지의 합성 영역 및 필터링 영역 검출)

  • Hwang, Min-Gu;Har, Dong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.179-194
    • /
    • 2012
  • Digital image forgery is becoming a topic of great interest with regard to honesty in imaging. We can often see forged digital images in a variety of places, such as the internet, and magazines, and in images used in political ads, etc. These can reduce the reliability and factual basis of the information contained in image. Therefore, objectivity is needed to determine if the image is forged so as to prevent confusion in the viewing public. Most digital forgeries consist of image resizing, rotating including the following interpolations. To find evidence of interpolation in forged images, this paper proposes a new method for detecting digital image forgery using general interpolation factors analyzed through re-interpolation algorithm of the forged images in order to determine the differences in the patterns. Through the re-interpolation algorithm we could detect the forged region and filtering region used image retouching included to interpolation.

Forensic Classification of Median Filtering by Hough Transform of Digital Image (디지털 영상의 허프 변환에 의한 미디언 필터링 포렌식 분류)

  • RHEE, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.5
    • /
    • pp.42-47
    • /
    • 2017
  • In the distribution of digital image, the median filtering is used for a forgery. This paper proposed the algorithm of a image forensics detection for the classification of median filtering. For the solution of this grave problem, the feature vector is composed of 42-Dim. The detected quantity 32, 64 and 128 of forgery image edges, respectively, which are processed by the Hough transform, then it extracted from the start-end point coordinates of the Hough Lines. Also, the Hough Peaks of the Angle-Distance plane are extracted. Subsequently, both of the feature vectors are composed of the proposed scheme. The defined 42-Dim. feature vector is trained in SVM (Support Vector Machine) classifier for the MF classification of the forged images. The experimental results of the proposed MF detection algorithm is compared between the 10-Dim. MFR and the 686-Dim. SPAM. It confirmed that the MF forensic classification ratio of the evaluated performance is 99% above with the whole test image types: the unaltered, the average filtering ($3{\times}3$), the JPEG (QF=90 and 70)) compression, the Gaussian filtered ($3{\times}3$ and $5{\times}5$) images, respectively.

Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image (위·변조 영상의 에지 에너지 정보를 이용한 영상 포렌식 판정 알고리즘)

  • Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.75-81
    • /
    • 2014
  • In a distribution of the digital image, there is a serious problem that is distributed an illegal forgery image by pirates. For the problem solution, this paper proposes an image forensic decision algorithm using an edge energy information of forgery image. The algorithm uses SA (Streaking Artifacts) and SPAM (Subtractive Pixel Adjacency Matrix) to extract the edge energy informations of original image according to JPEG compression rate(QF=90, 70, 50 and 30) and the query image. And then it decides the forge whether or not by comparing the edge informations between the original and query image each other. According to each threshold in TCJCR (Threshold by Combination of JPEG Compression Ratios), the matching of the edge informations of original and query image is excused. Through the matching experiments, TP (True Positive) and FN (False Negative) is 87.2% and 13.8% respectively. Thus, the minimum average decision error is 0.1349. Also, it is confirmed that the performed class evaluation of the proposed algorithm is 'Excellent(A)' because of the AUROC (Area Under Receiver Operating Characteristic) curve is 0.9388 by sensitivity and 1-specificity.