The role of forensics in digital image forgery detection

Authors

Keywords:

digital image; forgery; double JPEG; digital forensics

Abstract

Considering that the development of information technology has completely changed the way of accessing, processing and sharing of information, and that nowadays, thanks to the Internet, the vast amount of information is literally at our fingertips, negative consequences of this phenomenon increasingly come to the fore, especially when it comes to multimedia data. Thanks to the sophisticated software's, it has become relatively easy to preform manipulation of the image, audio or video material in order to undermine their integrity and authenticity without leaving any trace that man can visually notice. This paper analyses the current problem of manipulation of the digital image which role may be to hide, emphasize or to completely change some specific information in the image, with consequences ranged from trivial to catastrophic ones. Moreover, the focus of this paper is the role of digital forensics in detecting and proving performed manipulations. Regarding to this, the paper briefly describes the most common manipulations that can be performed on the image, copy-move or cloning and splicing or photomontage. Copy-move manipulation is achieved by copying a specified region of the original image and pasting it to another part of the same image in order to conceal useful information, while splicing manipulation is achieved by combining parts of two different images into one, final image. This paper also presents concrete examples of copy-move manipulations done in Corel Photo Paint X5 program, as well as changes in the image histograms caused by the manipulation, which proves that the image has undergone some changes. However, every manipulation of the image leads to disrupting of certain regularities that each image owns and which originate from the natural environment, the camera and the image itself. It is exactly these regularities and their deviations that detection techniques are based on. Accordingly, we distinguish detection techniques based on statistics, geometry and physics, then detection techniques based on sensor and noise of the camera that is used, and lastly detection techniques based on the format and quality of the image, compression and so on. The paper also discusses the active and passive approach of digital forensics in accordance with ability to modify the process of generating images itself by inserting specific identification marks such as watermark or digital signature. At the end, the process of forensic technique based on the image format, so-called double JPEG, is described. It is shown how the double compression, which is almost inevitable in the process of manipulation, introduces some specific effects that do not exist in the single compressed image. The aim of this paper is to highlight the need and importance to preserve the identity and authenticity of digital images, as well as to point to the possibilities of manipulation of the image, and finally, if the manipulation has been performed, to reveal it and irrefutably prove it, and digital forensics certainly plays the main role in it.

Downloads

Download data is not yet available.

References

Al-Qershi, M. O., and E. B. Khoo. 2013. "Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-Art." Forensic Science International 231: 284–295. Elsevier, Ireland. https://doi.org/10.1016/j.forsciint.2013.05.027

Ansari, D. M., P. S. Ghrera, and V. Tyagi. 2014. "Pixel-Based Image Forgery Detection: A Review." IETE Journal of Education 55 (1): 1–10. November. https://doi.org/10.1080/09747338.2014.921415

Bayram, S., T. H. Sencar, and N. Memon. 2008. "A Survey of Copy-Move Forgery Detection Techniques." IEEE Western New York Image Processing Workshop. September.

Bergslien, E. 2012. "Chapter 1, A Brief History of Forensic Science and Crime Scene Basics." In An Introduction to Forensic Geoscience, 1st ed. Wiley. http://media.wiley.com/product_data/excerpt/56/11182279/1118227956–16.pdf.

Cardwell, K., and team. 2007. The Best Damn Cybercrime and Digital Forensics. Syngress Publishing.

Bharti, N. C., and P. Tandel. 2016. "A Survey of Image Forgery Detection Techniques." IEEE WiSPNET Conference. https://doi.org/10.1109/WiSPNET.2016.7566257

Dukić, L. M. 2008. Principi telekomunikacija. Akademska misao, Belgrade.

Farid, H. 2016. "Digital Image Forensics." http://www.cs.dartmouth.edu/farid/downloads/tutorials/digitalimageforensics.pdf. December 20.

Farid, H. 2009. "Image Forgery Detection – A Survey." IEEE Signal Processing Magazine 16 (March): 14–25. https://doi.org/10.1109/MSP.2008.931079

Redi, Judith A., Wiem Taktak, and Jean-Luc Dugelay. 2011. "Digital Image Forensics: A Booklet for Beginners." Multimedia Tools and Applications 51: 133–162. https://doi.org/10.1007/s11042-010-0620-1

Kamble, R. D., and Nilakshi Jain. 2015. "Digital Forensic Tools: A Comparative Approach." International Journal of Advance Research in Science and Engineering 4 (2): 47–52. February.

Kirchner, M. 2011. "Notes on Digital Image Forensics and Counter-Forensic." The Department of Computer Science, TU Dresden, Germany.

Marcella, J. M., and D. Menendez. 2008. CYBER FORENSICS – A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. 2nd ed. Auerbach Publications.

Mushtaq, S., and H. M. Mir. 2014. "Digital Image Forgeries and Passive Image Authentication Techniques: A Survey." International Journal of Advanced Science and Technology 73: 1–10. https://doi.org/10.14257/ijast.2014.73.02

Nardoni, D., and C. So. 2005. Introduction to Computer Forensics. http://www-scf.usc.edu/~itp499cf/Lectures/USC.Introduction.to.Computer.Forensics.Day.1.pdf.

Nampoothiri, P., and N. Sugitha. 2016. "Digital Image Forgery – A Threat to Digital Forensics." International Conference on Circuit, Power and Computing Technologies. https://doi.org/10.1109/ICCPCT.2016.7530370

Parashar, N., and N. Tiwari. 2015. "A Survey of Digital Image Tempering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8 (10): 13–22. https://doi.org/10.14257/ijsip.2015.8.10.10

"Photo Tampering Throughout History." 2017. http://www.cc.gatech.edu/~beki/cs4001/history.pdf. January 10.

Reith, M., C. Carr, and G. Gunsch. 2002. "An Examination of Digital Forensic Models." International Journal of Digital Evidence 1 (3).

Reljin, I., and A. Gavrovska. 2013. Telemedicina. Akademska misao, Belgrade. https://doi.org/10.1155/2013/376152

Sarma, B., and G. Nandi. 2014. "A Study on Digital Image Forgery Detection." International Journal of Advanced Research in Computer Science and Software Engineering 4 (11): 12–17. November.

Sencar, T. H., and N. Memon. 2013. Digital Image Forensics. Springer Science + Business Media, New York. https://doi.org/10.1007/978-1-4614-0757-7

Singhal, N., and G. Gandhani. 2015. "Analysis of Copy-Move Forgery Image Forensics: A Review." International Journal of Signal Processing and Pattern Recognition 8 (7): 77–86. https://doi.org/10.14257/ijsip.2015.8.7.25

Thajeel, A. T., and G. Sulong. 2014. "A Survey of Copy-Move Forgery Detection Techniques." Journal of Theoretical and Applied Information Security 70 (1): 89–95. December.

Yang, J., J. Xie, G. Zhu, S. Kwong, and Y.-Q. Shi. 2014. "An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix." IEEE Transactions on Information Forensics and Security 9 (11): 1867–1876. November. https://doi.org/10.1109/TIFS.2014.2359368

Downloads

Published

29.06.2017

How to Cite

Petrović, Ranko, and Irini Reljin. 2017. “The Role of Forensics in Digital Image Forgery Detection ”. Crimen 8 (1):22-43. https://epub.ius.bg.ac.rs/index.php/crimenjournal/article/view/447.

Issue

Section

Articles