SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 4 (July-Aug. 2012), PP 01-06
www.iosrjournals.org
www.iosrjournals.org 1 | Page
Fraud and Tamper Detection in Authenticity Verification through
Gradient Based Image Reconstruction Technique for Security
Systems
1
Sonal Sharma, 2
Preeti Tuli
1, 2
(Computer Science & Engineering, DIMAT,India)
Abstract : Authenticity verification for security systems is a very important research problem with respect to
information security. One of the principal problems in image forensics is determining if a particular image is
authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like,
for example, in a court of law. Image editing software like Adobe Photoshop, Maya etc. and technically
advanced digital photography are used to edit, manipulate or tamper the images easily without living obvious
visual clues. The abusive use of digital forgeries has become a serious problem in various fields like authenticity
verification, medical imaging, digital forensic, journalism, scientific publications etc. To carry out such forensic
analysis, various technological instruments have been developed in the literature. In this paper the problem of
detecting if an image has been forged is investigated. To detect tampering and forging, a novel methodology
based on gradient based image reconstruction is proposed. Our method verifies the authenticity of image in two
phases- modeling phase; where the image is reconstructed from its gradients by solving a poisson equation and
forming a knowledge based model and simulation phase; where the absolute difference method and histogram
matching criterion between the original and test image is used. Such a method allows concluding that if a
tampering has occurred. Experimental results are presented to demonstrate the performance of our gradient-
based image reconstruction approach and confirm that the technique is able to verify whether a forged image is
presented to a security system for authenticity verification. Through this unique mechanism, one can secure the
most reliable information and forging or tampering of images for gaining false authentication and hence fraud
can be detected.
Keywords: Gradient, Poisson equation, Region of interest (ROI), Digital image forensics, Authenticity
verification.
I. INTRODUCTION
In recent times most of the researchers are working on mechanisms adopted for information security,
because it is always of great concern for human kind. Digital crime and increasing fraud in security systems
along with constantly emerging software technologies, is growing at a very faster rate. By observing a digital
content as a digital clue, multimedia forensics aims to introduce novel methodologies to support clue analysis
and to provide an aid for making a decision about a crime. Multimedia forensics [1], [2], [3] deals with
developing technological instruments operating in the absence of watermarks [4], [5] or signatures inserted in
the image. In fact, different from digital watermarking, forensics means are defined as “passive” because they
can formulate an assessment on a digital document by resorting only to the digital asset itself. These techniques
basically allow the user to determine if particular content has been tampered with [6], [7] or which was the
acquisition device used [8], [9]. In particular, by focusing on the task of acquisition device identification, two
main aspects must be studied: the first is to understand which kind of device has generated a digital image (e.g.
a scanner, a digital camera or is a computer graphics product) [10], [11], while the second is to determine which
specific camera or scanner (by recognizing model and brand) acquired that specific content [8], [9].
The other main multimedia forensics topic is image tampering detection [6] that is assessing the
authenticity of a digital image. Information integrity is fundamental in a trial, but it is clear that the advent of
digital pictures and relative ease of digital image processing today makes this authenticity uncertain. Modifying
a digital image to change the meaning of what is represented in it can be crucial when used in a court of law
where images are presented as basic evidence to influence the judgment. Furthermore, it is interesting, once
established that something has been manipulated, to understand exactly what happened: if an object or a person
has been covered, if a part of the image has been cloned, if something has been copied from another image, or if
a combination of these processes has been carried out. In this paper, this issue is investigated, and the proposed
method is able to detect that whether tampering has taken place.
The rest of the paper is organized as follows: Section 2 reviews the problem formulation and solution
methodology. Section 3 presents the experimental results and outcomes. Section 4 deals with the conclusion and
future work.
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
www.iosrjournals.org 2 | Page
II. PROBLEM FORMULATION AND SOLUTION METHODOLOGY
The problem of fraud detection has been faced by proposing different approaches each of these based
on the same concept: a forgery introduces a correlation between the original image and the tampered one.
Several methods search for this dependence by analyzing the image and then applying a feature extraction
process. Reconstruction of the original test image has not been so far used for tamper detection.
In [12] grayscale reconstruction has been formally defined for discrete images. Its authors have
underscored relations to binary reconstruction and morphological geodesic transformations. In [13] another
approach for image reconstruction from local phase vectors in the monogenic scale space is presented. In [14]
fan-beam image reconstruction algorithm is presented by the authors who reconstruct an image via filtering a
back projection image of differentiated projection data. In [15] a new method for the exact image reconstruction
from projections is proposed. The original image is projected into several view angles and the projection
samples are stored in an accumulator array. In [16] another novel approach is presented which consists first in
using an off-the-shelf image database to find patches visually similar to each region of interest of the unknown
input image, according to associated local descriptors which are then warped into input image domain according
to interest region geometry and seamlessly stitched together. Final completion of still missing texture-free
regions is obtained by smooth interpolation.
None of these approaches [12, 13, 14, 15, and 16] conducts gradient maps in the image reconstruction.
The approach presented in this paper verifies the authentication in two phases: in phase one (modeling phase),
the image is reconstructed from the image gradients by solving a Poisson equation and in the phase two
(simulation phase) absolute difference method and histogram matching criterion between the original and test
image is used.
1.1 Poisson Image Reconstruction Using Image Gradients
Image reconstruction from gradient fields is a very active research area. The gradient-based image
processing techniques and the poisson equation solving techniques have been addressed in several related areas
such as high dynamic range compression [17], Poisson image editing [18], image fusion for context
enhancement [19], interactive photomontage [20], Poisson image matting [21] and photography artifacts
removal [22].
In our approach, a new criterion is developed, where the image is reconstructed from its gradients by
solving a poisson equation and hence used for authenticity verification.
In 2D, a modified gradient vector field:
G’ = [G’x, G’y] (1)
may not be integrable.
Let I’ denote the image reconstructed from G’, we employ one of the direct methods recently proposed in [17]
to minimize:
||∇I’ – G || (2)
so that:
G ≈ ∇I’ (3)
By introducing a Laplacian and a divergence operator, I’ can be obtained by solving the Poisson differential
equation: [24, 25]
∇2
I’ = div([G’x,G’y]) (4)
Since both the Laplacian and div are linear operators, approximating those using standard finite
differences yields a large system of linear equations. We use the full multigrid method [23] to solve the
Laplacian equation with Gaussian-Seidel smoothing iterations [25]. For solving the Poisson equation more
efficiently, an alternative is to use a rapid Poisson solver [25], which uses a sine transform based on the method
[24] to invert the Laplacian operator. However, the complexity with the rapid Poisson solver will be
O(n(log(n))). Therefore, the full multigrid method [23] is employed in our implementation. The image is zero-
padded on all sides to reconstruct the image
.
1.2 Absolute Difference
In the present work our approach is to find the absolute difference between the original and the
reconstructed image. Subtraction gives the difference between the two images, but the result may have a
negative sign and can be lost. The function that finds how different the two images are- regardless of the
arithmetic sign- is the absolute difference:
N(x, y) = |O1(x, y) – O2(x, y)| (5)
where, O1 (x, y) and O2(x, y) are pixels in the original images, |x| is the absolute difference operator, and N(x,
y) is the resultant new pixel. The absolute difference operator returns +x whether the argument is –x or +x.
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
www.iosrjournals.org 3 | Page
1.3 Histogram Normalization
Histogram is a graphical representation of the intensity distribution of an image. It quantifies the
number of pixels for each intensity value considered. Histogram Equalization is a method that improves the
contrast in an image, in order to stretch out the intensity range. Equalization implies mapping one distribution
(the given histogram) to another distribution (a wider and more uniform distribution of intensity values) so that
the intensity values are spread over the whole range.
To accomplish the equalization effect, the remapping should be the cumulative distribution function (CDF)
For the histogram H(i), its cumulative distribution H’(i) is:
H’(i) = Σ H(j), where 0 ≤ j < i (6)
To use this as a remapping function, we have to normalize H’(i) such that the maximum value is 255
or the maximum value for the intensity of the image ). Finally, we use a simple remapping procedure to obtain
the intensity values of the equalized image:
equalized(x, y) = H’(src(x,y)) (7)
In our work first we perform the histogram normalization and then the histogram equalization criteria is
used where the normalized histogram values of the original and test image are utilized for matching the two
images. The proposed research work has two different phases: modeling phase and simulation phase. The
schematic workflow diagram for the modeling phase has been shown in the Fig. 1.
Figure 1: Schematic diagram for Modeling and Simulation Phase
In the modeling phase, first an input image (IO) is enhanced and scaled for the removal of distortion
with loss-less information, and then the poisson image reconstruction from image gradients technique is applied
to obtain the reconstructed image(IO’). Now the absolute difference (AO) of the image and reconstructed image
is obtained and the results are stored in corpus for matching the test data. In the simulation phase, the model has
been utilized for simulating trained and test patterns. To summarize this simulation process first a test image (IT)
is studied with proper enhancement. In the enhancement stage removal of noise from the image has been carried
out and then it is reconstructed using the proposed reconstruction technique to obtain reconstructed image (IT’)
and then the absolute difference between IT and IT’ is calculated to obtain AT. (For a particular subject AO is
stored in the corpus which is retrieved during simulation phase for the comparison). Finally, AT is compared
with AO and the results are obtained which may allow or reject the subject and hence his authenticity
verification is completed.
2.4 Algorithm used
The methodology adopted in the present paper has been depicted below:
Algorithm 1: Modeling and Simulation of original and reconstructed image
Modeling phase
Step 1: Read an image (IO).
Step 2: Convert into grayscale image, say R.
(Enhancement stage)
Step 3: Perform Scaling on the image.
Step 4: Enhance the image using median filtering and convolution theorem (IO).
Step 5: Reconstruct the image using proposed methodology (IO’).
Step 6: Find the absolute difference between original and reconstructed image (AO).
Step 7: Store the original image, reconstructed image and absolute difference (IO, IO’, AO)
Simulation phase
Step 8: Input a test image (IT)
Step 9: Reconstruct IT to obtain IT’ and find the absolute difference (AT) between IT and IT’
Step 10: Compare AT and AO to find a match and hence allow or reject the subject accordingly.
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
www.iosrjournals.org 4 | Page
A. Modeling and Simulating
In the modeling phase, let IO be the original image of a subject which has to be modeled for the
formation of knowledge based corpus. After enhancing and proper scaling of the original image IO, the image is
poisson reconstructed from its gradients as:
IO’ = Poisson_reconstruction (IO) (8)
Now the absolute difference between the original and reconstructed image is calculated as :
AO = Absolute_difference (IO, IO’) (9)
Now store the triplet (IO, IO’, AO) in the corpus so as to form the knowledge based model (corpus). The
equations (8) and (9) can be repeatedly used to register n number of subjects, and store their details for
authentication verification.
In the simulation phase, when the tampered or forged image will be presented to the security system for
authentication, the system will reconstruct the test image (IT) as:
IT’ = Poisson_reconstruction (IT) (10)
And then the absolute difference between the original test image (IT) and reconstructed test image (IT’) is
calculated as:
AT = Absolute_difference (IT, IT’) (11)
Now the resultant AT is compared with AO (the absolute difference stored in corpus of the original and
reconstructed original image in modeling phase)
If (AT == AO)
“Authenticity Verified as TRUE!”
Else
“Authenticity Verified as FALSE!”
Hence, the result will reject the subject due to a mismatch and the images obtained by forgery or tampering
for authenticity verification will be regarded as fake or invalid and any hidden data (for destroying the security
system or secret communication) will be clearly identified.
III. EXPERIMENTAL RESULTS AND OUTCOMES
The solution methodology for the above stated problem is implemented using soft computing tools and
the experimental outcomes are shown in Fig. 2.
As show in Fig. 2, the original image is passed through the modeling phase steps mentioned in
Algorithm 1 and the results are shown in Fig. 2 (2.1) to (2.6). Now the corpus contains the triplet (IO, IO’, AO)
for the registered subject’s original image.
Image
10 20 30 40 50 60 70 80 90
20
40
60
80
100
120
140
0
50
100
150
200
(2.1) (2.2) (2.3)
Reconstructed
10 20 30 40 50 60 70 80 90
20
40
60
80
100
120
140 20
40
60
80
100
120
140
160
180
200
220
Absolute Difference of the original image and reconstructed image
(2.4) (2.5)
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
www.iosrjournals.org 5 | Page
Absolute Difference of the original image and reconstructed image
0 50 100 150 200 250 300
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
(2.6)
Figure 2: Results for modeling phase (Original Image): (2.1) Original Image (IO), (2.2) Grayscale Image, (2.3)
Enhanced and Scaled Image, (2.4) Reconstructed Image (IO’), (2.5) Absolute difference (AO) of IO and IO’,
(2.6) Normalized Histogram of absolute difference shown in (2.5).
Image
20 40 60 80 100
20
40
60
80
100
120
140
160
20
40
60
80
100
120
140
160
180
200
220
(3.1) (3.2) (3.3)
Reconstructed
20 40 60 80 100
20
40
60
80
100
120
140
160
20
40
60
80
100
120
140
160
180
200
220
(3.4) (3.5)
0 50 100 150 200 250 300
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
(3.6)
Fig. 3: Results for simulation phase [Test (tampered) Image]: (3.1) Original Image (IT), (3.2) Grayscale Image,
(3.3) Enhanced and Scaled Image, (3.4) Reconstructed Image (IT’), (3.5) Absolute difference of IT and IT’,
(3.6) Normalized Histogram of absolute difference shown in (3.5).
As shown in Fig. 3, the test image (tampered) is passed through the steps of simulation phase
mentioned in Algorithm 1and the results are shown in Fig. 3 (3.1) to (3.6). Next the histogram of absolute
difference obtained in Fig. 3 (3.6) is normalized and compared with the normalized histogram of original image
shown in Fig. 2 (2.6), and the so obtained result is inequality, since, the value of the difference is not zero and
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
www.iosrjournals.org 6 | Page
comes to be 0.0049, and hence the image is declared as tampered and finally rejected. If the image was not
tampered then, the so obtained difference (between the normalized histogram of absolute difference of the test
image and reconstructed test image (Fig. 3.6) and the normalized histogram of absolute difference of the
original image and reconstructed original image (Fig. 2.6) would be 0.00
In this manner the authenticity of the individual’s can be verified and the test images can be classified
as tampered (or forged) or original, and hence the tampering can be detected.
IV. CONCLUSION AND FURTHER WORK
A novel gradient-based image reconstruction algorithm by solving poisson equation for detecting
image tampering in authenticity verification has been proposed in this paper. Our authenticity verification
approach is conducted in two phases. At first, the image is reconstructed from the gradients by solving a poisson
equation, and next normalized histogram criterion and absolute difference method is used to match the original
and test image. Experimental results demonstrate both the feasibility and the efficiency of our algorithm.
REFERENCES
[1] S. Lyu and H. Farid, “How realistic is photorealistic?,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 845–850, 2005.
[2] H. Farid, “Photo fakery and forensics,” Advances in Computers, vol. 77, pp. 1–55, 2009.
[3] J. A. Redi, W. Taktak, and J. L. Dugelay, “Digital image forensics: a booklet for beginners,” Multimedia Tools and Applications,
vol. 51, no. 1, pp. 133–162, 2011.
[4] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking. San Francisco, CA: Morgan Kaufmann, 2002.
[5] M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel
Dekker, 2004.
[6] H. Farid, “A survey of image forgery detection,” IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 16–25, 2009.
[7] A. Popescu and H. Farid, “Statistical tools for digital forensics,” in Proc of Int.’l Workshop on Information Hiding, Toronto,
Canada, 2005.
[8] A. Swaminathan, M. Wu, and K. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Transactions on Information
Forensics and Security, vol. 3, no. 1, pp. 101–117, 2008.
[9] M. Chen, J. Fridrich, M. Goljan, and J. Lukas, “Determining image origin and integrity using sensor noise,” IEEE Transactions on
Information Forensics and Security, vol. 3, no. 1, pp. 74–90, 2008.
[10] N. Khanna, G. T.-C. Chiu, J. P. Allebach, and E. J. Delp, “Forensic techniques for classifying scanner, computer generated and
digital camera images,” in Proc. of IEEE ICASSP, Las Vegas, USA, 2008.
[11] R. Caldelli, I. Amerini, and F. Picchioni, “A DFT-based analysis to discern between camera and scanned images,” International
Journal of Digital Crime and Forensics, vol. 2, no. 1, pp. 21–29, 2010.
[12] Luc Vincent, “Morphological Grayscale Reconstruction in Image Analysis: Applications and Efficient Algorithms” IEEE
Transactions on Image Processing, vol. 2, no. 2, 1993.
[13] Di Zang and G. Sommer, “Phase Based Image Reconstruction in the Monogenic Scale Space” DAGM-Symposium, 2004.
[14] S. Leng, T. Zhuang, B. Nett and Guang-Hong Chen, “Exact fan-beam image reconstruction algorithm for truncated projection data
acquired from an asymmetric half-size detector” Phys. Med. Biol. 50 (2005) 1805–1820.
[15] A. L. Kesidis, N. Papamarkos, “Exact image reconstruction from a limited number of projections” J. Vis. Commun. Image R. 19
(2008) 285–298.
[16] P. Weinzaepfel, H. Jegou, P. Perez, “Reconstructing an image from its local descriptors ” Computer Vision and Pattern Recognition
(2011).
[17] R. Fatta, D. Lischinski, M. Werman, “Gradient domain high dynamic range compression” ACM Transactions on Graphics
2002;21(3):249-256.
[18] P. P´erez ,M. Gangnet , A. Blake, “ Poisson image editing” ACM Transactions on Graphics 2003;22(3):313-318.
[19] R. Raskar, A. Ilie , J.Yu, “ Image fusion for context enhancement and video surrealism”, In: Proceedings of Non-Photorealistic
Animation and Rendering ’04, France, 2004. p. 85-95.
[20] A. Agarwala , M. Dontcheva, M. Agrawala , S. Drucker, A.Colburn, B. Curless, D Salesin , M. Cohen M, “ Interactive digital
photomontage. ACM Transactions on Graphics” 2004;23(3):294-302.
[21] J. Sun, J. Jia, CK. Tang , HY Shum , “Poisson matting. ACM Transactions on Graphics” 2004;23(3):315-321.
[22] A. Agrawal , R. Raskar, SK. Nayar , Y. Li, “Removing flash artifacts using gradient analysis” ACM Transactions on Graphics
2005;24(3):828-835.
[23] W. Press, S. Teukolsky, W. Vetterling, B. Flannery “Numerical Recipes in C: The Art of Scientific Computing” Cambridge
University Press; 1992.
[24] R. Raskar, K. Tan, R. Feris , J. Yu, M. Turk “Non-photorealistic camera: depth edge detection and stylized rendering using multi-
flash imaging” ACM Transactions on Graphics 2004;23(3):679-688.
[25] J. Shen, X. Jin, C. Zhou, Charlie C. L. Wang, “Gradient based image completion by solving the Poisson equation,” PCM’05
Proceedings of the 6th
Pacific-Rim conference on Advances in Multimedia Information Processing – Volume Part I 257-268

More Related Content

What's hot

Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
IJARTES
 
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERSRECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
ijcsit
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
ijait
 
Disparity Estimation by a Real Time Approximation Algorithm
Disparity Estimation by a Real Time Approximation AlgorithmDisparity Estimation by a Real Time Approximation Algorithm
Disparity Estimation by a Real Time Approximation Algorithm
CSCJournals
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
IRJET Journal
 
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmPaper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
MDABDULMANNANMONDAL
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
ijcga
 
Issues in Image Registration and Image similarity based on mutual information
Issues in Image Registration and Image similarity based on mutual informationIssues in Image Registration and Image similarity based on mutual information
Issues in Image Registration and Image similarity based on mutual information
Darshana Mistry
 
A Fuzzy Set Approach for Edge Detection
A Fuzzy Set Approach for Edge DetectionA Fuzzy Set Approach for Edge Detection
A Fuzzy Set Approach for Edge Detection
CSCJournals
 
A UGMENT R EALITY IN V OLUMETRIC M EDICAL I MAGING U SING S TEREOSCOPIC...
A UGMENT  R EALITY IN  V OLUMETRIC  M EDICAL  I MAGING  U SING  S TEREOSCOPIC...A UGMENT  R EALITY IN  V OLUMETRIC  M EDICAL  I MAGING  U SING  S TEREOSCOPIC...
A UGMENT R EALITY IN V OLUMETRIC M EDICAL I MAGING U SING S TEREOSCOPIC...
ijcga
 
L0816166
L0816166L0816166
L0816166
IOSR Journals
 
I017417176
I017417176I017417176
I017417176
IOSR Journals
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
IAEME Publication
 
Vol2no2 17
Vol2no2 17Vol2no2 17
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
IJCI JOURNAL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
ijcsit
 
Study of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV ModelStudy of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV Model
ijsrd.com
 

What's hot (18)

Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
 
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERSRECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
RECOGNIZING AND TRACKING OUTDOOR OBJECTS BY USING ARTOOLKIT MARKERS
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
 
Disparity Estimation by a Real Time Approximation Algorithm
Disparity Estimation by a Real Time Approximation AlgorithmDisparity Estimation by a Real Time Approximation Algorithm
Disparity Estimation by a Real Time Approximation Algorithm
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
 
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmPaper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
 
Issues in Image Registration and Image similarity based on mutual information
Issues in Image Registration and Image similarity based on mutual informationIssues in Image Registration and Image similarity based on mutual information
Issues in Image Registration and Image similarity based on mutual information
 
A Fuzzy Set Approach for Edge Detection
A Fuzzy Set Approach for Edge DetectionA Fuzzy Set Approach for Edge Detection
A Fuzzy Set Approach for Edge Detection
 
A UGMENT R EALITY IN V OLUMETRIC M EDICAL I MAGING U SING S TEREOSCOPIC...
A UGMENT  R EALITY IN  V OLUMETRIC  M EDICAL  I MAGING  U SING  S TEREOSCOPIC...A UGMENT  R EALITY IN  V OLUMETRIC  M EDICAL  I MAGING  U SING  S TEREOSCOPIC...
A UGMENT R EALITY IN V OLUMETRIC M EDICAL I MAGING U SING S TEREOSCOPIC...
 
L0816166
L0816166L0816166
L0816166
 
I017417176
I017417176I017417176
I017417176
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
Vol2no2 17
Vol2no2 17Vol2no2 17
Vol2no2 17
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
 
Study of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV ModelStudy of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV Model
 

Viewers also liked

F0344451
F0344451F0344451
F0344451
IOSR Journals
 
Designing Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual WorldDesigning Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual World
CADET - Center for Advances in Digital Entertainment Technologies
 
A0930105
A0930105A0930105
A0930105
IOSR Journals
 
Introducing a Gennext Banking with a Direct Banking Solution
Introducing a Gennext Banking with a Direct Banking SolutionIntroducing a Gennext Banking with a Direct Banking Solution
Introducing a Gennext Banking with a Direct Banking Solution
IOSR Journals
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
IOSR Journals
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
IOSR Journals
 
International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...
International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...
International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...
Odyssey Recruitment
 
Shock and bleeding
Shock and bleedingShock and bleeding
Shock and bleeding
VASS Yukon
 
Threshold Secure B2B Model
Threshold Secure B2B ModelThreshold Secure B2B Model
Threshold Secure B2B Model
IOSR Journals
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
IOSR Journals
 
Diapos staditik
Diapos staditikDiapos staditik
Diapos staditik
llopezy
 
Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013
iamdz2
 
Media pitch
Media pitchMedia pitch
Media pitch
HMonan
 
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
IOSR Journals
 
Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?
believe52
 
Proyecto ingles
Proyecto inglesProyecto ingles
Proyecto ingles
leidy
 
I0925259
I0925259I0925259
I0925259
IOSR Journals
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
IOSR Journals
 
Transport1
Transport1Transport1
Transport1
Aralc Eiob
 
G0434045
G0434045G0434045
G0434045
IOSR Journals
 

Viewers also liked (20)

F0344451
F0344451F0344451
F0344451
 
Designing Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual WorldDesigning Interactions at the Nexus of the Physical and Virtual World
Designing Interactions at the Nexus of the Physical and Virtual World
 
A0930105
A0930105A0930105
A0930105
 
Introducing a Gennext Banking with a Direct Banking Solution
Introducing a Gennext Banking with a Direct Banking SolutionIntroducing a Gennext Banking with a Direct Banking Solution
Introducing a Gennext Banking with a Direct Banking Solution
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...
International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...
International Medical Careers Forum Oct 15 2016 Sharing My Own Trip Dr Ameed ...
 
Shock and bleeding
Shock and bleedingShock and bleeding
Shock and bleeding
 
Threshold Secure B2B Model
Threshold Secure B2B ModelThreshold Secure B2B Model
Threshold Secure B2B Model
 
De-virtualizing virtual Function Calls using various Type Analysis Technique...
De-virtualizing virtual Function Calls using various Type  Analysis Technique...De-virtualizing virtual Function Calls using various Type  Analysis Technique...
De-virtualizing virtual Function Calls using various Type Analysis Technique...
 
Diapos staditik
Diapos staditikDiapos staditik
Diapos staditik
 
Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013Dimitri Biological Lights: Science Fair 2013
Dimitri Biological Lights: Science Fair 2013
 
Media pitch
Media pitchMedia pitch
Media pitch
 
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
Design and Implementation of Single Leg Reduce Switch Count Dual Output Inver...
 
Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?
 
Proyecto ingles
Proyecto inglesProyecto ingles
Proyecto ingles
 
I0925259
I0925259I0925259
I0925259
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
 
Transport1
Transport1Transport1
Transport1
 
G0434045
G0434045G0434045
G0434045
 

Similar to Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems

IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
iosrjce
 
F017374752
F017374752F017374752
F017374752
IOSR Journals
 
G010245056
G010245056G010245056
G010245056
IOSR Journals
 
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSEXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
ijma
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
ijsrd.com
 
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IJCSEA Journal
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
AB Rizvi
 
General Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image SegmentationGeneral Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image Segmentation
Melissa Moore
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
sipij
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
sipij
 
Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...
IJECEIAES
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
ijcsit
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learning
TELKOMNIKA JOURNAL
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
IRJET Journal
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET Journal
 
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
IJCSIS Research Publications
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering Detection
IRJET Journal
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
IRJET Journal
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
Kapil Tiwari
 

Similar to Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems (20)

IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
G010245056
G010245056G010245056
G010245056
 
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSEXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
General Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image SegmentationGeneral Review Of Algorithms Presented For Image Segmentation
General Review Of Algorithms Presented For Image Segmentation
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
 
Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learning
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering Detection
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 4 (July-Aug. 2012), PP 01-06 www.iosrjournals.org www.iosrjournals.org 1 | Page Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems 1 Sonal Sharma, 2 Preeti Tuli 1, 2 (Computer Science & Engineering, DIMAT,India) Abstract : Authenticity verification for security systems is a very important research problem with respect to information security. One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. Image editing software like Adobe Photoshop, Maya etc. and technically advanced digital photography are used to edit, manipulate or tamper the images easily without living obvious visual clues. The abusive use of digital forgeries has become a serious problem in various fields like authenticity verification, medical imaging, digital forensic, journalism, scientific publications etc. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper the problem of detecting if an image has been forged is investigated. To detect tampering and forging, a novel methodology based on gradient based image reconstruction is proposed. Our method verifies the authenticity of image in two phases- modeling phase; where the image is reconstructed from its gradients by solving a poisson equation and forming a knowledge based model and simulation phase; where the absolute difference method and histogram matching criterion between the original and test image is used. Such a method allows concluding that if a tampering has occurred. Experimental results are presented to demonstrate the performance of our gradient- based image reconstruction approach and confirm that the technique is able to verify whether a forged image is presented to a security system for authenticity verification. Through this unique mechanism, one can secure the most reliable information and forging or tampering of images for gaining false authentication and hence fraud can be detected. Keywords: Gradient, Poisson equation, Region of interest (ROI), Digital image forensics, Authenticity verification. I. INTRODUCTION In recent times most of the researchers are working on mechanisms adopted for information security, because it is always of great concern for human kind. Digital crime and increasing fraud in security systems along with constantly emerging software technologies, is growing at a very faster rate. By observing a digital content as a digital clue, multimedia forensics aims to introduce novel methodologies to support clue analysis and to provide an aid for making a decision about a crime. Multimedia forensics [1], [2], [3] deals with developing technological instruments operating in the absence of watermarks [4], [5] or signatures inserted in the image. In fact, different from digital watermarking, forensics means are defined as “passive” because they can formulate an assessment on a digital document by resorting only to the digital asset itself. These techniques basically allow the user to determine if particular content has been tampered with [6], [7] or which was the acquisition device used [8], [9]. In particular, by focusing on the task of acquisition device identification, two main aspects must be studied: the first is to understand which kind of device has generated a digital image (e.g. a scanner, a digital camera or is a computer graphics product) [10], [11], while the second is to determine which specific camera or scanner (by recognizing model and brand) acquired that specific content [8], [9]. The other main multimedia forensics topic is image tampering detection [6] that is assessing the authenticity of a digital image. Information integrity is fundamental in a trial, but it is clear that the advent of digital pictures and relative ease of digital image processing today makes this authenticity uncertain. Modifying a digital image to change the meaning of what is represented in it can be crucial when used in a court of law where images are presented as basic evidence to influence the judgment. Furthermore, it is interesting, once established that something has been manipulated, to understand exactly what happened: if an object or a person has been covered, if a part of the image has been cloned, if something has been copied from another image, or if a combination of these processes has been carried out. In this paper, this issue is investigated, and the proposed method is able to detect that whether tampering has taken place. The rest of the paper is organized as follows: Section 2 reviews the problem formulation and solution methodology. Section 3 presents the experimental results and outcomes. Section 4 deals with the conclusion and future work.
  • 2. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image www.iosrjournals.org 2 | Page II. PROBLEM FORMULATION AND SOLUTION METHODOLOGY The problem of fraud detection has been faced by proposing different approaches each of these based on the same concept: a forgery introduces a correlation between the original image and the tampered one. Several methods search for this dependence by analyzing the image and then applying a feature extraction process. Reconstruction of the original test image has not been so far used for tamper detection. In [12] grayscale reconstruction has been formally defined for discrete images. Its authors have underscored relations to binary reconstruction and morphological geodesic transformations. In [13] another approach for image reconstruction from local phase vectors in the monogenic scale space is presented. In [14] fan-beam image reconstruction algorithm is presented by the authors who reconstruct an image via filtering a back projection image of differentiated projection data. In [15] a new method for the exact image reconstruction from projections is proposed. The original image is projected into several view angles and the projection samples are stored in an accumulator array. In [16] another novel approach is presented which consists first in using an off-the-shelf image database to find patches visually similar to each region of interest of the unknown input image, according to associated local descriptors which are then warped into input image domain according to interest region geometry and seamlessly stitched together. Final completion of still missing texture-free regions is obtained by smooth interpolation. None of these approaches [12, 13, 14, 15, and 16] conducts gradient maps in the image reconstruction. The approach presented in this paper verifies the authentication in two phases: in phase one (modeling phase), the image is reconstructed from the image gradients by solving a Poisson equation and in the phase two (simulation phase) absolute difference method and histogram matching criterion between the original and test image is used. 1.1 Poisson Image Reconstruction Using Image Gradients Image reconstruction from gradient fields is a very active research area. The gradient-based image processing techniques and the poisson equation solving techniques have been addressed in several related areas such as high dynamic range compression [17], Poisson image editing [18], image fusion for context enhancement [19], interactive photomontage [20], Poisson image matting [21] and photography artifacts removal [22]. In our approach, a new criterion is developed, where the image is reconstructed from its gradients by solving a poisson equation and hence used for authenticity verification. In 2D, a modified gradient vector field: G’ = [G’x, G’y] (1) may not be integrable. Let I’ denote the image reconstructed from G’, we employ one of the direct methods recently proposed in [17] to minimize: ||∇I’ – G || (2) so that: G ≈ ∇I’ (3) By introducing a Laplacian and a divergence operator, I’ can be obtained by solving the Poisson differential equation: [24, 25] ∇2 I’ = div([G’x,G’y]) (4) Since both the Laplacian and div are linear operators, approximating those using standard finite differences yields a large system of linear equations. We use the full multigrid method [23] to solve the Laplacian equation with Gaussian-Seidel smoothing iterations [25]. For solving the Poisson equation more efficiently, an alternative is to use a rapid Poisson solver [25], which uses a sine transform based on the method [24] to invert the Laplacian operator. However, the complexity with the rapid Poisson solver will be O(n(log(n))). Therefore, the full multigrid method [23] is employed in our implementation. The image is zero- padded on all sides to reconstruct the image . 1.2 Absolute Difference In the present work our approach is to find the absolute difference between the original and the reconstructed image. Subtraction gives the difference between the two images, but the result may have a negative sign and can be lost. The function that finds how different the two images are- regardless of the arithmetic sign- is the absolute difference: N(x, y) = |O1(x, y) – O2(x, y)| (5) where, O1 (x, y) and O2(x, y) are pixels in the original images, |x| is the absolute difference operator, and N(x, y) is the resultant new pixel. The absolute difference operator returns +x whether the argument is –x or +x.
  • 3. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image www.iosrjournals.org 3 | Page 1.3 Histogram Normalization Histogram is a graphical representation of the intensity distribution of an image. It quantifies the number of pixels for each intensity value considered. Histogram Equalization is a method that improves the contrast in an image, in order to stretch out the intensity range. Equalization implies mapping one distribution (the given histogram) to another distribution (a wider and more uniform distribution of intensity values) so that the intensity values are spread over the whole range. To accomplish the equalization effect, the remapping should be the cumulative distribution function (CDF) For the histogram H(i), its cumulative distribution H’(i) is: H’(i) = Σ H(j), where 0 ≤ j < i (6) To use this as a remapping function, we have to normalize H’(i) such that the maximum value is 255 or the maximum value for the intensity of the image ). Finally, we use a simple remapping procedure to obtain the intensity values of the equalized image: equalized(x, y) = H’(src(x,y)) (7) In our work first we perform the histogram normalization and then the histogram equalization criteria is used where the normalized histogram values of the original and test image are utilized for matching the two images. The proposed research work has two different phases: modeling phase and simulation phase. The schematic workflow diagram for the modeling phase has been shown in the Fig. 1. Figure 1: Schematic diagram for Modeling and Simulation Phase In the modeling phase, first an input image (IO) is enhanced and scaled for the removal of distortion with loss-less information, and then the poisson image reconstruction from image gradients technique is applied to obtain the reconstructed image(IO’). Now the absolute difference (AO) of the image and reconstructed image is obtained and the results are stored in corpus for matching the test data. In the simulation phase, the model has been utilized for simulating trained and test patterns. To summarize this simulation process first a test image (IT) is studied with proper enhancement. In the enhancement stage removal of noise from the image has been carried out and then it is reconstructed using the proposed reconstruction technique to obtain reconstructed image (IT’) and then the absolute difference between IT and IT’ is calculated to obtain AT. (For a particular subject AO is stored in the corpus which is retrieved during simulation phase for the comparison). Finally, AT is compared with AO and the results are obtained which may allow or reject the subject and hence his authenticity verification is completed. 2.4 Algorithm used The methodology adopted in the present paper has been depicted below: Algorithm 1: Modeling and Simulation of original and reconstructed image Modeling phase Step 1: Read an image (IO). Step 2: Convert into grayscale image, say R. (Enhancement stage) Step 3: Perform Scaling on the image. Step 4: Enhance the image using median filtering and convolution theorem (IO). Step 5: Reconstruct the image using proposed methodology (IO’). Step 6: Find the absolute difference between original and reconstructed image (AO). Step 7: Store the original image, reconstructed image and absolute difference (IO, IO’, AO) Simulation phase Step 8: Input a test image (IT) Step 9: Reconstruct IT to obtain IT’ and find the absolute difference (AT) between IT and IT’ Step 10: Compare AT and AO to find a match and hence allow or reject the subject accordingly.
  • 4. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image www.iosrjournals.org 4 | Page A. Modeling and Simulating In the modeling phase, let IO be the original image of a subject which has to be modeled for the formation of knowledge based corpus. After enhancing and proper scaling of the original image IO, the image is poisson reconstructed from its gradients as: IO’ = Poisson_reconstruction (IO) (8) Now the absolute difference between the original and reconstructed image is calculated as : AO = Absolute_difference (IO, IO’) (9) Now store the triplet (IO, IO’, AO) in the corpus so as to form the knowledge based model (corpus). The equations (8) and (9) can be repeatedly used to register n number of subjects, and store their details for authentication verification. In the simulation phase, when the tampered or forged image will be presented to the security system for authentication, the system will reconstruct the test image (IT) as: IT’ = Poisson_reconstruction (IT) (10) And then the absolute difference between the original test image (IT) and reconstructed test image (IT’) is calculated as: AT = Absolute_difference (IT, IT’) (11) Now the resultant AT is compared with AO (the absolute difference stored in corpus of the original and reconstructed original image in modeling phase) If (AT == AO) “Authenticity Verified as TRUE!” Else “Authenticity Verified as FALSE!” Hence, the result will reject the subject due to a mismatch and the images obtained by forgery or tampering for authenticity verification will be regarded as fake or invalid and any hidden data (for destroying the security system or secret communication) will be clearly identified. III. EXPERIMENTAL RESULTS AND OUTCOMES The solution methodology for the above stated problem is implemented using soft computing tools and the experimental outcomes are shown in Fig. 2. As show in Fig. 2, the original image is passed through the modeling phase steps mentioned in Algorithm 1 and the results are shown in Fig. 2 (2.1) to (2.6). Now the corpus contains the triplet (IO, IO’, AO) for the registered subject’s original image. Image 10 20 30 40 50 60 70 80 90 20 40 60 80 100 120 140 0 50 100 150 200 (2.1) (2.2) (2.3) Reconstructed 10 20 30 40 50 60 70 80 90 20 40 60 80 100 120 140 20 40 60 80 100 120 140 160 180 200 220 Absolute Difference of the original image and reconstructed image (2.4) (2.5)
  • 5. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image www.iosrjournals.org 5 | Page Absolute Difference of the original image and reconstructed image 0 50 100 150 200 250 300 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 (2.6) Figure 2: Results for modeling phase (Original Image): (2.1) Original Image (IO), (2.2) Grayscale Image, (2.3) Enhanced and Scaled Image, (2.4) Reconstructed Image (IO’), (2.5) Absolute difference (AO) of IO and IO’, (2.6) Normalized Histogram of absolute difference shown in (2.5). Image 20 40 60 80 100 20 40 60 80 100 120 140 160 20 40 60 80 100 120 140 160 180 200 220 (3.1) (3.2) (3.3) Reconstructed 20 40 60 80 100 20 40 60 80 100 120 140 160 20 40 60 80 100 120 140 160 180 200 220 (3.4) (3.5) 0 50 100 150 200 250 300 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 (3.6) Fig. 3: Results for simulation phase [Test (tampered) Image]: (3.1) Original Image (IT), (3.2) Grayscale Image, (3.3) Enhanced and Scaled Image, (3.4) Reconstructed Image (IT’), (3.5) Absolute difference of IT and IT’, (3.6) Normalized Histogram of absolute difference shown in (3.5). As shown in Fig. 3, the test image (tampered) is passed through the steps of simulation phase mentioned in Algorithm 1and the results are shown in Fig. 3 (3.1) to (3.6). Next the histogram of absolute difference obtained in Fig. 3 (3.6) is normalized and compared with the normalized histogram of original image shown in Fig. 2 (2.6), and the so obtained result is inequality, since, the value of the difference is not zero and
  • 6. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image www.iosrjournals.org 6 | Page comes to be 0.0049, and hence the image is declared as tampered and finally rejected. If the image was not tampered then, the so obtained difference (between the normalized histogram of absolute difference of the test image and reconstructed test image (Fig. 3.6) and the normalized histogram of absolute difference of the original image and reconstructed original image (Fig. 2.6) would be 0.00 In this manner the authenticity of the individual’s can be verified and the test images can be classified as tampered (or forged) or original, and hence the tampering can be detected. IV. CONCLUSION AND FURTHER WORK A novel gradient-based image reconstruction algorithm by solving poisson equation for detecting image tampering in authenticity verification has been proposed in this paper. Our authenticity verification approach is conducted in two phases. At first, the image is reconstructed from the gradients by solving a poisson equation, and next normalized histogram criterion and absolute difference method is used to match the original and test image. Experimental results demonstrate both the feasibility and the efficiency of our algorithm. REFERENCES [1] S. Lyu and H. Farid, “How realistic is photorealistic?,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 845–850, 2005. [2] H. Farid, “Photo fakery and forensics,” Advances in Computers, vol. 77, pp. 1–55, 2009. [3] J. A. Redi, W. Taktak, and J. L. Dugelay, “Digital image forensics: a booklet for beginners,” Multimedia Tools and Applications, vol. 51, no. 1, pp. 133–162, 2011. [4] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking. San Francisco, CA: Morgan Kaufmann, 2002. [5] M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, 2004. [6] H. Farid, “A survey of image forgery detection,” IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 16–25, 2009. [7] A. Popescu and H. Farid, “Statistical tools for digital forensics,” in Proc of Int.’l Workshop on Information Hiding, Toronto, Canada, 2005. [8] A. Swaminathan, M. Wu, and K. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101–117, 2008. [9] M. Chen, J. Fridrich, M. Goljan, and J. Lukas, “Determining image origin and integrity using sensor noise,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74–90, 2008. [10] N. Khanna, G. T.-C. Chiu, J. P. Allebach, and E. J. Delp, “Forensic techniques for classifying scanner, computer generated and digital camera images,” in Proc. of IEEE ICASSP, Las Vegas, USA, 2008. [11] R. Caldelli, I. Amerini, and F. Picchioni, “A DFT-based analysis to discern between camera and scanned images,” International Journal of Digital Crime and Forensics, vol. 2, no. 1, pp. 21–29, 2010. [12] Luc Vincent, “Morphological Grayscale Reconstruction in Image Analysis: Applications and Efficient Algorithms” IEEE Transactions on Image Processing, vol. 2, no. 2, 1993. [13] Di Zang and G. Sommer, “Phase Based Image Reconstruction in the Monogenic Scale Space” DAGM-Symposium, 2004. [14] S. Leng, T. Zhuang, B. Nett and Guang-Hong Chen, “Exact fan-beam image reconstruction algorithm for truncated projection data acquired from an asymmetric half-size detector” Phys. Med. Biol. 50 (2005) 1805–1820. [15] A. L. Kesidis, N. Papamarkos, “Exact image reconstruction from a limited number of projections” J. Vis. Commun. Image R. 19 (2008) 285–298. [16] P. Weinzaepfel, H. Jegou, P. Perez, “Reconstructing an image from its local descriptors ” Computer Vision and Pattern Recognition (2011). [17] R. Fatta, D. Lischinski, M. Werman, “Gradient domain high dynamic range compression” ACM Transactions on Graphics 2002;21(3):249-256. [18] P. P´erez ,M. Gangnet , A. Blake, “ Poisson image editing” ACM Transactions on Graphics 2003;22(3):313-318. [19] R. Raskar, A. Ilie , J.Yu, “ Image fusion for context enhancement and video surrealism”, In: Proceedings of Non-Photorealistic Animation and Rendering ’04, France, 2004. p. 85-95. [20] A. Agarwala , M. Dontcheva, M. Agrawala , S. Drucker, A.Colburn, B. Curless, D Salesin , M. Cohen M, “ Interactive digital photomontage. ACM Transactions on Graphics” 2004;23(3):294-302. [21] J. Sun, J. Jia, CK. Tang , HY Shum , “Poisson matting. ACM Transactions on Graphics” 2004;23(3):315-321. [22] A. Agrawal , R. Raskar, SK. Nayar , Y. Li, “Removing flash artifacts using gradient analysis” ACM Transactions on Graphics 2005;24(3):828-835. [23] W. Press, S. Teukolsky, W. Vetterling, B. Flannery “Numerical Recipes in C: The Art of Scientific Computing” Cambridge University Press; 1992. [24] R. Raskar, K. Tan, R. Feris , J. Yu, M. Turk “Non-photorealistic camera: depth edge detection and stylized rendering using multi- flash imaging” ACM Transactions on Graphics 2004;23(3):679-688. [25] J. Shen, X. Jin, C. Zhou, Charlie C. L. Wang, “Gradient based image completion by solving the Poisson equation,” PCM’05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing – Volume Part I 257-268