SlideShare a Scribd company logo
Digital Image
Forgery
Mohamed Talaat
1
Agenda
• What is Digital Image Forgery?
• Types of Digital Image Forgery
– Image Retouching
– Image Splicing
– Image Cloning
• Forgery Detection Mechanisms
– Active Methods
– Passive Methods
2
3
What is Digital Image Forgery?
• The process of creating fake image has been
tremendously simple with the introduction of powerful
computer graphics editing software such as Adobe
Photoshop, GIMP, and Corel Paint Shop, some of which
are available for free.
• Alteration of the semantic components of a digital
image:
– Removing Contents from the image
– Adding Data to the image
4
Types of Digital Image Forgery
• There are many cases of digital image forgery.
• All of these cases can be categorized into three major
groups, based on the process involved in creating the
fake image:
– Image Retouching
– Image Splicing (Copy-Paste)
– Image Cloning (Copy-Move)
5
Image Retouching?
• It is one of the oldest types of image forgery:
– Image features are tampered with.
– Used to enhance or reduce digital image features.
– Considered less dangerous type of image forgery.
6
Image Splicing (Copy-Paste)
• Fragments of 2 or more images are combined to form an image.
• This operation is fundamental in digital photo montaging and in turn
is a mechanism for image forgery creation.
• Image splicing technique may change the visual message of digital
images more aggressively than image retouching.
7
Image Cloning (Copy-Move)
• Considered as a special case of image splicing, where the tampering
occurs within a single image and no need for multiple images.
• Part of the image is copied and then pasted in a desired location
within the same image.
• The purpose of such tampering is to duplicate or conceal a certain
object in that image.
8
Image Cloning (Copy-Move)
• Blurring is usually used to reduce the expected irregularity along the
border of the pasted regions.
• The similarity of texture, color, noise and other information inside the
image make it very difficult to detect this kind of tampering via visual
inspection.
• Moreover, performing of post-processing operations such as blurring,
adding noise and JPEG compression or geometric operations such as
scaling, shifting and rotation increase the hardness of detection
task.
9
Forgery Detection Mechanisms
• Forgery detection mechanisms can be classified into
two types:
– Active Methods
– Passive Methods
• Active Methods
– Hidden Information inside the Digital Image.
– Done at the time of Data Acquisition or before disseminated to
the public.
– Embedded information can be used to identify the source of
such image or to detect possible modification to that image.
10
Forgery Detection Mechanisms
(Active Methods)
• Two major types:
– Digital Signature
– Digital Watermarking
11
Forgery Detection Mechanisms
(Passive Methods)
• Use traces left by the processing steps in different phases of
acquisition and storage of digital images.
• These traces can be treated as a fingerprint of the image source
device.
• Passive methods work in the absence of protecting techniques.
• They do not use any pre-image distribution information inserted
into digital image.
• They work by analyzing the binary information of digital image in
order to detect forgery traces, if any
• Limitation is the number of false positives.
Thanks 
12

More Related Content

What's hot

Image recognition
Image recognitionImage recognition
Image recognition
Nikhil Singh
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
Akshay Gujarathi
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
A B Shinde
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
Pooja R
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
Mathankumar S
 
Image Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain FiltersImage Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain Filters
Suhaila Afzana
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
SavitaHanchinal
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
lavanya marichamy
 
Image processing (Signal Processing)
Image processing (Signal Processing)Image processing (Signal Processing)
Image processing (Signal Processing)
Muhammad Waqas
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingSamir Sabry
 
digital image processing
digital image processingdigital image processing
digital image processing
Abinaya B
 
Color fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingColor fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image Processing
Amna
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
Kalyan Acharjya
 
Character generation techniques
Character generation techniquesCharacter generation techniques
Character generation techniques
Mani Kanth
 
Image processing presentation
Image processing presentationImage processing presentation
Image processing presentation
Bibus Poudel
 
Image processing second unit Notes
Image processing second unit NotesImage processing second unit Notes
Image processing second unit Notes
AAKANKSHA JAIN
 
Computer vision
Computer visionComputer vision
Computer vision
Sheikh Hussnain
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slides
Srinath Dhayalamoorthy
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
kiruthiammu
 
image compression ppt
image compression pptimage compression ppt
image compression pptShivangi Saxena
 

What's hot (20)

Image recognition
Image recognitionImage recognition
Image recognition
 
Object Detection & Tracking
Object Detection & TrackingObject Detection & Tracking
Object Detection & Tracking
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
Image Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain FiltersImage Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain Filters
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
 
Image processing (Signal Processing)
Image processing (Signal Processing)Image processing (Signal Processing)
Image processing (Signal Processing)
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Color fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingColor fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image Processing
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
 
Character generation techniques
Character generation techniquesCharacter generation techniques
Character generation techniques
 
Image processing presentation
Image processing presentationImage processing presentation
Image processing presentation
 
Image processing second unit Notes
Image processing second unit NotesImage processing second unit Notes
Image processing second unit Notes
 
Computer vision
Computer visionComputer vision
Computer vision
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slides
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 

Similar to Digital Image Forgery

Image processing and compression.pptx
Image processing and compression.pptxImage processing and compression.pptx
Image processing and compression.pptx
dudoo1
 
Computer vision and robotics
Computer vision and roboticsComputer vision and robotics
Computer vision and robotics
Biniam Asnake
 
2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx
2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx
2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx
VikashiniG
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
IRJET Journal
 
A Review Paper On Image Forgery Detection In Image Processing
A Review Paper On Image Forgery Detection In Image ProcessingA Review Paper On Image Forgery Detection In Image Processing
A Review Paper On Image Forgery Detection In Image Processing
Jennifer Daniel
 
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
IRJET Journal
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
ijsrd.com
 
Computer Graphics Unit 5 notes for Manonmanium Sundaranar University
Computer Graphics  Unit 5 notes for Manonmanium Sundaranar UniversityComputer Graphics  Unit 5 notes for Manonmanium Sundaranar University
Computer Graphics Unit 5 notes for Manonmanium Sundaranar University
RajeswariR45
 
Digital image processing & computer graphics
Digital image processing & computer graphicsDigital image processing & computer graphics
Digital image processing & computer graphics
Ankit Garg
 
BEC007 -Digital image processing.pdf
BEC007  -Digital image processing.pdfBEC007  -Digital image processing.pdf
BEC007 -Digital image processing.pdf
gopikahari7
 
46.-Applications-of-AI-Image-Processing.pdf
46.-Applications-of-AI-Image-Processing.pdf46.-Applications-of-AI-Image-Processing.pdf
46.-Applications-of-AI-Image-Processing.pdf
monikag2613
 
G010245056
G010245056G010245056
G010245056
IOSR Journals
 
Image restoration and enhancement #2
Image restoration and enhancement #2 Image restoration and enhancement #2
Image restoration and enhancement #2
Gera Paulos
 
DIP
DIPDIP
jessica TY Digital image processing.pptx
jessica  TY Digital image processing.pptxjessica  TY Digital image processing.pptx
jessica TY Digital image processing.pptx
jessicaparekh03
 
Image processing
Image processing Image processing
Image processing
Madhushree Ghosh
 
Face recognition
Face recognitionFace recognition
Face recognitionNaman Ahuja
 
Review of Digital Image Forgery Detection
Review of Digital Image Forgery DetectionReview of Digital Image Forgery Detection
Review of Digital Image Forgery Detection
rahulmonikasharma
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
IRJET Journal
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
ragsahao2
 

Similar to Digital Image Forgery (20)

Image processing and compression.pptx
Image processing and compression.pptxImage processing and compression.pptx
Image processing and compression.pptx
 
Computer vision and robotics
Computer vision and roboticsComputer vision and robotics
Computer vision and robotics
 
2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx
2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx
2.FUNDAMENTALS OF DIGITAL IMAGE PROCESSING.pptx
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
 
A Review Paper On Image Forgery Detection In Image Processing
A Review Paper On Image Forgery Detection In Image ProcessingA Review Paper On Image Forgery Detection In Image Processing
A Review Paper On Image Forgery Detection In Image Processing
 
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
Computer Graphics Unit 5 notes for Manonmanium Sundaranar University
Computer Graphics  Unit 5 notes for Manonmanium Sundaranar UniversityComputer Graphics  Unit 5 notes for Manonmanium Sundaranar University
Computer Graphics Unit 5 notes for Manonmanium Sundaranar University
 
Digital image processing & computer graphics
Digital image processing & computer graphicsDigital image processing & computer graphics
Digital image processing & computer graphics
 
BEC007 -Digital image processing.pdf
BEC007  -Digital image processing.pdfBEC007  -Digital image processing.pdf
BEC007 -Digital image processing.pdf
 
46.-Applications-of-AI-Image-Processing.pdf
46.-Applications-of-AI-Image-Processing.pdf46.-Applications-of-AI-Image-Processing.pdf
46.-Applications-of-AI-Image-Processing.pdf
 
G010245056
G010245056G010245056
G010245056
 
Image restoration and enhancement #2
Image restoration and enhancement #2 Image restoration and enhancement #2
Image restoration and enhancement #2
 
DIP
DIPDIP
DIP
 
jessica TY Digital image processing.pptx
jessica  TY Digital image processing.pptxjessica  TY Digital image processing.pptx
jessica TY Digital image processing.pptx
 
Image processing
Image processing Image processing
Image processing
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Review of Digital Image Forgery Detection
Review of Digital Image Forgery DetectionReview of Digital Image Forgery Detection
Review of Digital Image Forgery Detection
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation RecoveryAn Approach for Copy-Move Attack Detection and Transformation Recovery
An Approach for Copy-Move Attack Detection and Transformation Recovery
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 

More from Mohamed Talaat

Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
Mohamed Talaat
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACO
Mohamed Talaat
 
Genetic Algorithms - GAs
Genetic Algorithms - GAsGenetic Algorithms - GAs
Genetic Algorithms - GAs
Mohamed Talaat
 
Artificial Neural Networks - ANN
Artificial Neural Networks - ANNArtificial Neural Networks - ANN
Artificial Neural Networks - ANN
Mohamed Talaat
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Mohamed Talaat
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 

More from Mohamed Talaat (7)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
 
Ant Colony Optimization - ACO
Ant Colony Optimization - ACOAnt Colony Optimization - ACO
Ant Colony Optimization - ACO
 
Genetic Algorithms - GAs
Genetic Algorithms - GAsGenetic Algorithms - GAs
Genetic Algorithms - GAs
 
Artificial Neural Networks - ANN
Artificial Neural Networks - ANNArtificial Neural Networks - ANN
Artificial Neural Networks - ANN
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 

Recently uploaded

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni GarcĂ­a
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 

Recently uploaded (20)

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 

Digital Image Forgery

  • 2. Agenda • What is Digital Image Forgery? • Types of Digital Image Forgery – Image Retouching – Image Splicing – Image Cloning • Forgery Detection Mechanisms – Active Methods – Passive Methods 2
  • 3. 3 What is Digital Image Forgery? • The process of creating fake image has been tremendously simple with the introduction of powerful computer graphics editing software such as Adobe Photoshop, GIMP, and Corel Paint Shop, some of which are available for free. • Alteration of the semantic components of a digital image: – Removing Contents from the image – Adding Data to the image
  • 4. 4 Types of Digital Image Forgery • There are many cases of digital image forgery. • All of these cases can be categorized into three major groups, based on the process involved in creating the fake image: – Image Retouching – Image Splicing (Copy-Paste) – Image Cloning (Copy-Move)
  • 5. 5 Image Retouching? • It is one of the oldest types of image forgery: – Image features are tampered with. – Used to enhance or reduce digital image features. – Considered less dangerous type of image forgery.
  • 6. 6 Image Splicing (Copy-Paste) • Fragments of 2 or more images are combined to form an image. • This operation is fundamental in digital photo montaging and in turn is a mechanism for image forgery creation. • Image splicing technique may change the visual message of digital images more aggressively than image retouching.
  • 7. 7 Image Cloning (Copy-Move) • Considered as a special case of image splicing, where the tampering occurs within a single image and no need for multiple images. • Part of the image is copied and then pasted in a desired location within the same image. • The purpose of such tampering is to duplicate or conceal a certain object in that image.
  • 8. 8 Image Cloning (Copy-Move) • Blurring is usually used to reduce the expected irregularity along the border of the pasted regions. • The similarity of texture, color, noise and other information inside the image make it very difficult to detect this kind of tampering via visual inspection. • Moreover, performing of post-processing operations such as blurring, adding noise and JPEG compression or geometric operations such as scaling, shifting and rotation increase the hardness of detection task.
  • 9. 9 Forgery Detection Mechanisms • Forgery detection mechanisms can be classified into two types: – Active Methods – Passive Methods • Active Methods – Hidden Information inside the Digital Image. – Done at the time of Data Acquisition or before disseminated to the public. – Embedded information can be used to identify the source of such image or to detect possible modification to that image.
  • 10. 10 Forgery Detection Mechanisms (Active Methods) • Two major types: – Digital Signature – Digital Watermarking
  • 11. 11 Forgery Detection Mechanisms (Passive Methods) • Use traces left by the processing steps in different phases of acquisition and storage of digital images. • These traces can be treated as a fingerprint of the image source device. • Passive methods work in the absence of protecting techniques. • They do not use any pre-image distribution information inserted into digital image. • They work by analyzing the binary information of digital image in order to detect forgery traces, if any • Limitation is the number of false positives.