The role of forensics in digital image forgery detection
Keywords:
digital image; forgery; double JPEG; digital forensicsAbstract
Considering that the development of information technology has completely changed the way of accessing, processing and sharing of information, and that nowadays, thanks to the Internet, the vast amount of information is literally at our fingertips, negative consequences of this phenomenon increasingly come to the fore, especially when it comes to multimedia data. Thanks to the sophisticated software's, it has become relatively easy to preform manipulation of the image, audio or video material in order to undermine their integrity and authenticity without leaving any trace that man can visually notice. This paper analyses the current problem of manipulation of the digital image which role may be to hide, emphasize or to completely change some specific information in the image, with consequences ranged from trivial to catastrophic ones. Moreover, the focus of this paper is the role of digital forensics in detecting and proving performed manipulations. Regarding to this, the paper briefly describes the most common manipulations that can be performed on the image, copy-move or cloning and splicing or photomontage. Copy-move manipulation is achieved by copying a specified region of the original image and pasting it to another part of the same image in order to conceal useful information, while splicing manipulation is achieved by combining parts of two different images into one, final image. This paper also presents concrete examples of copy-move manipulations done in Corel Photo Paint X5 program, as well as changes in the image histograms caused by the manipulation, which proves that the image has undergone some changes. However, every manipulation of the image leads to disrupting of certain regularities that each image owns and which originate from the natural environment, the camera and the image itself. It is exactly these regularities and their deviations that detection techniques are based on. Accordingly, we distinguish detection techniques based on statistics, geometry and physics, then detection techniques based on sensor and noise of the camera that is used, and lastly detection techniques based on the format and quality of the image, compression and so on. The paper also discusses the active and passive approach of digital forensics in accordance with ability to modify the process of generating images itself by inserting specific identification marks such as watermark or digital signature. At the end, the process of forensic technique based on the image format, so-called double JPEG, is described. It is shown how the double compression, which is almost inevitable in the process of manipulation, introduces some specific effects that do not exist in the single compressed image. The aim of this paper is to highlight the need and importance to preserve the identity and authenticity of digital images, as well as to point to the possibilities of manipulation of the image, and finally, if the manipulation has been performed, to reveal it and irrefutably prove it, and digital forensics certainly plays the main role in it.
Downloads
References
Al-Qershi, M. O., and E. B. Khoo. 2013. "Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-Art." Forensic Science International 231: 284–295. Elsevier, Ireland. https://doi.org/10.1016/j.forsciint.2013.05.027
Ansari, D. M., P. S. Ghrera, and V. Tyagi. 2014. "Pixel-Based Image Forgery Detection: A Review." IETE Journal of Education 55 (1): 1–10. November. https://doi.org/10.1080/09747338.2014.921415
Bayram, S., T. H. Sencar, and N. Memon. 2008. "A Survey of Copy-Move Forgery Detection Techniques." IEEE Western New York Image Processing Workshop. September.
Bergslien, E. 2012. "Chapter 1, A Brief History of Forensic Science and Crime Scene Basics." In An Introduction to Forensic Geoscience, 1st ed. Wiley. http://media.wiley.com/product_data/excerpt/56/11182279/1118227956–16.pdf.
Cardwell, K., and team. 2007. The Best Damn Cybercrime and Digital Forensics. Syngress Publishing.
Bharti, N. C., and P. Tandel. 2016. "A Survey of Image Forgery Detection Techniques." IEEE WiSPNET Conference. https://doi.org/10.1109/WiSPNET.2016.7566257
Dukić, L. M. 2008. Principi telekomunikacija. Akademska misao, Belgrade.
Farid, H. 2016. "Digital Image Forensics." http://www.cs.dartmouth.edu/farid/downloads/tutorials/digitalimageforensics.pdf. December 20.
Farid, H. 2009. "Image Forgery Detection – A Survey." IEEE Signal Processing Magazine 16 (March): 14–25. https://doi.org/10.1109/MSP.2008.931079
Redi, Judith A., Wiem Taktak, and Jean-Luc Dugelay. 2011. "Digital Image Forensics: A Booklet for Beginners." Multimedia Tools and Applications 51: 133–162. https://doi.org/10.1007/s11042-010-0620-1
Kamble, R. D., and Nilakshi Jain. 2015. "Digital Forensic Tools: A Comparative Approach." International Journal of Advance Research in Science and Engineering 4 (2): 47–52. February.
Kirchner, M. 2011. "Notes on Digital Image Forensics and Counter-Forensic." The Department of Computer Science, TU Dresden, Germany.
Marcella, J. M., and D. Menendez. 2008. CYBER FORENSICS – A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. 2nd ed. Auerbach Publications.
Mushtaq, S., and H. M. Mir. 2014. "Digital Image Forgeries and Passive Image Authentication Techniques: A Survey." International Journal of Advanced Science and Technology 73: 1–10. https://doi.org/10.14257/ijast.2014.73.02
Nardoni, D., and C. So. 2005. Introduction to Computer Forensics. http://www-scf.usc.edu/~itp499cf/Lectures/USC.Introduction.to.Computer.Forensics.Day.1.pdf.
Nampoothiri, P., and N. Sugitha. 2016. "Digital Image Forgery – A Threat to Digital Forensics." International Conference on Circuit, Power and Computing Technologies. https://doi.org/10.1109/ICCPCT.2016.7530370
Parashar, N., and N. Tiwari. 2015. "A Survey of Digital Image Tempering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8 (10): 13–22. https://doi.org/10.14257/ijsip.2015.8.10.10
"Photo Tampering Throughout History." 2017. http://www.cc.gatech.edu/~beki/cs4001/history.pdf. January 10.
Reith, M., C. Carr, and G. Gunsch. 2002. "An Examination of Digital Forensic Models." International Journal of Digital Evidence 1 (3).
Reljin, I., and A. Gavrovska. 2013. Telemedicina. Akademska misao, Belgrade. https://doi.org/10.1155/2013/376152
Sarma, B., and G. Nandi. 2014. "A Study on Digital Image Forgery Detection." International Journal of Advanced Research in Computer Science and Software Engineering 4 (11): 12–17. November.
Sencar, T. H., and N. Memon. 2013. Digital Image Forensics. Springer Science + Business Media, New York. https://doi.org/10.1007/978-1-4614-0757-7
Singhal, N., and G. Gandhani. 2015. "Analysis of Copy-Move Forgery Image Forensics: A Review." International Journal of Signal Processing and Pattern Recognition 8 (7): 77–86. https://doi.org/10.14257/ijsip.2015.8.7.25
Thajeel, A. T., and G. Sulong. 2014. "A Survey of Copy-Move Forgery Detection Techniques." Journal of Theoretical and Applied Information Security 70 (1): 89–95. December.
Yang, J., J. Xie, G. Zhu, S. Kwong, and Y.-Q. Shi. 2014. "An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix." IEEE Transactions on Information Forensics and Security 9 (11): 1867–1876. November. https://doi.org/10.1109/TIFS.2014.2359368
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Ranko Petrović, Irini Reljin
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors retain copyright and grant the journal the right of first publication, allowing others to share the work with proper attribution to the authors and acknowledgment of its original publication in this journal.