image tampering
TRANSCRIPT
-
8/9/2019 Image Tampering
1/17
DIGITAL IMAGETAMPERING
PRESENTED BYPRIYA SINGHM. TECH. 2 ND YEAR C.S.E. (1306810718)
-
8/9/2019 Image Tampering
2/17
POINTs TO PRESENT
IntroductionDigital Image TamperingTypes of Image TamperingImage Tampering Detection Approaches
Need for Tampering DetectionConclusion and Future ScopeReferences
-
8/9/2019 Image Tampering
3/17
INTRODUCTION
In todays world it is easy to manipulate the image by adding or remo ing some elements from the
image which result in a high number of imageforgeries!"sing the manipulation tools that are a ailable
on internet it is easy to tamper the digital images
without any trace! Therefore# erification oforiginality of images has become a challengingtas$!
-
8/9/2019 Image Tampering
4/17
DIGITAL IMAGE TAMPERING
The term image tampering refers to the processof manipulation of image information that is not
acceptable!
%i$e changing the ob&ects in the image#retouching the image# combining two images# etc!
The e'ample is shown below(
-
8/9/2019 Image Tampering
5/17
DIGITAL IMAGE TAMPERING(c !"#!$%&')
)a* the original image with three missiles)b* The forged image with four missiles
-
8/9/2019 Image Tampering
6/17
TYPES O IMAGE TAMPERING
Composite Image )Splicing*
-
8/9/2019 Image Tampering
7/17
TYPES O IMAGE TAMPERING(c !"#!$%&')
IMAGE RETOUCHING
Image retouching is a slight change in the imagefor arious artistic and commercial purposes# notnecessarily conforming to the standards ofmorality!
The retouching is mostly used to enhance orreduce the image features!
-
8/9/2019 Image Tampering
8/17
TYPES O IMAGE TAMPERING(c !"#!$%&')
E *+,-% #+*/% %" $c #!/
Retouching by a maga+ine in which the real face on right is
replaced with the left one
-
8/9/2019 Image Tampering
9/17
TYPES O IMAGE TAMPERING(c !"#!$%&')
COPY MO EA portion of an image is copied somewhere else in the
same image!
-
8/9/2019 Image Tampering
10/17
TYPES O IMAGE TAMPERING(c !"#!$%&')
COMPOSITE IMAGE OR SPLICING
A common form of photographic manipulation is thedigital splicing of two or more images into a singlecomposite image!
The photo compositing is the result of cutting and &oining of two or more photographs with seamlesstransition without lea ing any isual clues about the
&oining from other photographs!
-
8/9/2019 Image Tampering
11/17
TYPES O IMAGE TAMPERING(c !"#!$%&')
E *+,-% C +, s#"% I+*/%
-
8/9/2019 Image Tampering
12/17
IMAGE TAMPERING DETECTION
APPROACHESACTI E APPROACH
The area of acti e methods simply can be di ided intothe data hiding approaches! ,y data hiding we refer tomethods embedding secondary data into the image!
Acti e approaches assumes an inserting of a digitaldata at the source side )e!g!# Scanner* and erifying themar$ integrity at the detection side!
-'ample( Digital Signature# .ater /ar$ing# etc!
-
8/9/2019 Image Tampering
13/17
IMAGE TAMPERING DETECTION
APPROACHES (c !"#!$%&')PASSI E APPROACH
0assi e methods are mostly based on the fact thatforgeries can bring into the image specific detectablechanges!
0assi e techni1ues for image forensics operate in the
absence of any watermar$ or signature! These wor$ onthe assumption that although digital forgeries may lea eno isual clues that indicate tampering# but they mayalter the attributes and statistics of an image!
-
8/9/2019 Image Tampering
14/17
NEED OR IMAGE TAMPERING
DETECTIONDigital images are playing e ery important role in our
daily life! The digital images are omnipresent right from
the co er pages of &ournals# newspapers# maga+ines etc! toe idences in court rooms# teaching aids etc! Images areused e erywhere either as a personal memory e idencesor for official purposes!
Recently# the low cost cameras# sophisticated high endimage processing# computer graphics software# madeediting and manipulating images easier# hence it isessential to detect the forgeries in the images!
-
8/9/2019 Image Tampering
15/17
-
8/9/2019 Image Tampering
16/17
RE ERENCES
[1] Shrishail Math and R.C. Tripathi Image Compositedetection using Customized Filtering International ournalo! Computer "raphics # $nimation %I C"$& 'ol.1( )o.*(
+cto,er - 11.[-] /rad0umna eshpande and /rashasti 2ani3ar /i4el 5ased igital Image Forger0 etection Techni6ues International ournal o! 7ngineering Research and $pplications %I 7R$& ( 'ol. -( Issue *( Ma08 un - 1-( pg. 9*:89;*
-
8/9/2019 Image Tampering
17/17
THANYOU