image tampering

Upload: shubham-goel

Post on 01-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Image Tampering

    1/17

    DIGITAL IMAGETAMPERING

    PRESENTED BYPRIYA SINGHM. TECH. 2 ND YEAR C.S.E. (1306810718)

  • 8/9/2019 Image Tampering

    2/17

    POINTs TO PRESENT

    IntroductionDigital Image TamperingTypes of Image TamperingImage Tampering Detection Approaches

    Need for Tampering DetectionConclusion and Future ScopeReferences

  • 8/9/2019 Image Tampering

    3/17

    INTRODUCTION

    In todays world it is easy to manipulate the image by adding or remo ing some elements from the

    image which result in a high number of imageforgeries!"sing the manipulation tools that are a ailable

    on internet it is easy to tamper the digital images

    without any trace! Therefore# erification oforiginality of images has become a challengingtas$!

  • 8/9/2019 Image Tampering

    4/17

    DIGITAL IMAGE TAMPERING

    The term image tampering refers to the processof manipulation of image information that is not

    acceptable!

    %i$e changing the ob&ects in the image#retouching the image# combining two images# etc!

    The e'ample is shown below(

  • 8/9/2019 Image Tampering

    5/17

    DIGITAL IMAGE TAMPERING(c !"#!$%&')

    )a* the original image with three missiles)b* The forged image with four missiles

  • 8/9/2019 Image Tampering

    6/17

    TYPES O IMAGE TAMPERING

    Composite Image )Splicing*

  • 8/9/2019 Image Tampering

    7/17

    TYPES O IMAGE TAMPERING(c !"#!$%&')

    IMAGE RETOUCHING

    Image retouching is a slight change in the imagefor arious artistic and commercial purposes# notnecessarily conforming to the standards ofmorality!

    The retouching is mostly used to enhance orreduce the image features!

  • 8/9/2019 Image Tampering

    8/17

    TYPES O IMAGE TAMPERING(c !"#!$%&')

    E *+,-% #+*/% %" $c #!/

    Retouching by a maga+ine in which the real face on right is

    replaced with the left one

  • 8/9/2019 Image Tampering

    9/17

    TYPES O IMAGE TAMPERING(c !"#!$%&')

    COPY MO EA portion of an image is copied somewhere else in the

    same image!

  • 8/9/2019 Image Tampering

    10/17

    TYPES O IMAGE TAMPERING(c !"#!$%&')

    COMPOSITE IMAGE OR SPLICING

    A common form of photographic manipulation is thedigital splicing of two or more images into a singlecomposite image!

    The photo compositing is the result of cutting and &oining of two or more photographs with seamlesstransition without lea ing any isual clues about the

    &oining from other photographs!

  • 8/9/2019 Image Tampering

    11/17

    TYPES O IMAGE TAMPERING(c !"#!$%&')

    E *+,-% C +, s#"% I+*/%

  • 8/9/2019 Image Tampering

    12/17

    IMAGE TAMPERING DETECTION

    APPROACHESACTI E APPROACH

    The area of acti e methods simply can be di ided intothe data hiding approaches! ,y data hiding we refer tomethods embedding secondary data into the image!

    Acti e approaches assumes an inserting of a digitaldata at the source side )e!g!# Scanner* and erifying themar$ integrity at the detection side!

    -'ample( Digital Signature# .ater /ar$ing# etc!

  • 8/9/2019 Image Tampering

    13/17

    IMAGE TAMPERING DETECTION

    APPROACHES (c !"#!$%&')PASSI E APPROACH

    0assi e methods are mostly based on the fact thatforgeries can bring into the image specific detectablechanges!

    0assi e techni1ues for image forensics operate in the

    absence of any watermar$ or signature! These wor$ onthe assumption that although digital forgeries may lea eno isual clues that indicate tampering# but they mayalter the attributes and statistics of an image!

  • 8/9/2019 Image Tampering

    14/17

    NEED OR IMAGE TAMPERING

    DETECTIONDigital images are playing e ery important role in our

    daily life! The digital images are omnipresent right from

    the co er pages of &ournals# newspapers# maga+ines etc! toe idences in court rooms# teaching aids etc! Images areused e erywhere either as a personal memory e idencesor for official purposes!

    Recently# the low cost cameras# sophisticated high endimage processing# computer graphics software# madeediting and manipulating images easier# hence it isessential to detect the forgeries in the images!

  • 8/9/2019 Image Tampering

    15/17

  • 8/9/2019 Image Tampering

    16/17

    RE ERENCES

    [1] Shrishail Math and R.C. Tripathi Image Compositedetection using Customized Filtering International ournalo! Computer "raphics # $nimation %I C"$& 'ol.1( )o.*(

    +cto,er - 11.[-] /rad0umna eshpande and /rashasti 2ani3ar /i4el 5ased igital Image Forger0 etection Techni6ues International ournal o! 7ngineering Research and $pplications %I 7R$& ( 'ol. -( Issue *( Ma08 un - 1-( pg. 9*:89;*

  • 8/9/2019 Image Tampering

    17/17

    THANYOU