Uloga forenzike u otkrivanju zloupotrebe digitalne slike
Ključne reči:
digitalna slika; zloupotreba; dvostruka kompresija; digitalna forenzikaApstrakt
S obzirom da je razvoj informacione tehnologije u potpunosti promenio način pristupa, obrade i deljenja informacija i da je danas, zahvaljujući Internetu, ogromna količina podataka doslovno na dohvat ruke, sve više do izražaja dolaze i negativne posledice ove pojave, naročito kada su u pitanju multimedijalni podaci. Rad se bavi aktuelnim problemom manipulacije nad digitalnom slikom čija uloga može biti da prikrije, naglasi ili u potpunosti izmeni određenu informaciju u slici sa posledicama u rasponu od trivijalnih do katastrofalnih, kao i ulogom digitalne forenzike u otkrivanju i dokazivanju izvršene manipulacije. Sa tim u vezi u radu su u najkraćim crtama opisane jedne od najčešćih manipulacija koje se izvršavaju nad slikom, copy-move ili kloniranje i splicing ili fotomontaža. Takođe su prikazani konkretni primeri copy-move manipulacije urađeni u Corel Photo Paint X5 programu, kao i promene u histogramu slike do kojih u tom slučaju dolazi, a koje dokazuju da je slika pretrpela određene promene. Na kraju je opisan i postupak forenzičke tehnike koja se zasniva na formatu slike, tzv. dvostruki JPEG. Pokazano je kako dvostruko komprimovanje koje je gotovo neizostavno u procesu manipulacije uvodi specifične efekte koji ne postoje u jednostruko komprimovanim slikama. Cilj rada je da ukaže na potrebu i važnost da se sačuva identitet i autentičnost digitalne slike, zatim da ukaže na mogućnosti manipulacije nad slikom, kao i da se ukoliko su manipulacije izvršene, one otkriju i neporecivo dokažu, u čemu svakako glavnu ulogu ima digitalna forenzika.
Downloads
Reference
Al-Qershi, M. O., and E. B. Khoo. 2013. "Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-Art." Forensic Science International 231: 284–295. Elsevier, Ireland. https://doi.org/10.1016/j.forsciint.2013.05.027
Ansari, D. M., P. S. Ghrera, and V. Tyagi. 2014. "Pixel-Based Image Forgery Detection: A Review." IETE Journal of Education 55 (1): 1–10. November. https://doi.org/10.1080/09747338.2014.921415
Bayram, S., T. H. Sencar, and N. Memon. 2008. "A Survey of Copy-Move Forgery Detection Techniques." IEEE Western New York Image Processing Workshop. September.
Bergslien, E. 2012. "Chapter 1, A Brief History of Forensic Science and Crime Scene Basics." In An Introduction to Forensic Geoscience, 1st ed. Wiley. http://media.wiley.com/product_data/excerpt/56/11182279/1118227956–16.pdf.
Cardwell, K., and team. 2007. The Best Damn Cybercrime and Digital Forensics. Syngress Publishing.
Bharti, N. C., and P. Tandel. 2016. "A Survey of Image Forgery Detection Techniques." IEEE WiSPNET Conference. https://doi.org/10.1109/WiSPNET.2016.7566257
Dukić, L. M. 2008. Principi telekomunikacija. Akademska misao, Belgrade.
Farid, H. 2016. "Digital Image Forensics." http://www.cs.dartmouth.edu/farid/downloads/tutorials/digitalimageforensics.pdf. December 20.
Farid, H. 2009. "Image Forgery Detection – A Survey." IEEE Signal Processing Magazine 16 (March): 14–25. https://doi.org/10.1109/MSP.2008.931079
Redi, Judith A., Wiem Taktak, and Jean-Luc Dugelay. 2011. "Digital Image Forensics: A Booklet for Beginners." Multimedia Tools and Applications 51: 133–162. https://doi.org/10.1007/s11042-010-0620-1
Kamble, R. D., and Nilakshi Jain. 2015. "Digital Forensic Tools: A Comparative Approach." International Journal of Advance Research in Science and Engineering 4 (2): 47–52. February.
Kirchner, M. 2011. "Notes on Digital Image Forensics and Counter-Forensic." The Department of Computer Science, TU Dresden, Germany.
Marcella, J. M., and D. Menendez. 2008. CYBER FORENSICS – A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. 2nd ed. Auerbach Publications.
Mushtaq, S., and H. M. Mir. 2014. "Digital Image Forgeries and Passive Image Authentication Techniques: A Survey." International Journal of Advanced Science and Technology 73: 1–10. https://doi.org/10.14257/ijast.2014.73.02
Nardoni, D., and C. So. 2005. Introduction to Computer Forensics. http://www-scf.usc.edu/~itp499cf/Lectures/USC.Introduction.to.Computer.Forensics.Day.1.pdf.
Nampoothiri, P., and N. Sugitha. 2016. "Digital Image Forgery – A Threat to Digital Forensics." International Conference on Circuit, Power and Computing Technologies. https://doi.org/10.1109/ICCPCT.2016.7530370
Parashar, N., and N. Tiwari. 2015. "A Survey of Digital Image Tempering Techniques." International Journal of Signal Processing, Image Processing and Pattern Recognition 8 (10): 13–22. https://doi.org/10.14257/ijsip.2015.8.10.10
"Photo Tampering Throughout History." 2017. http://www.cc.gatech.edu/~beki/cs4001/history.pdf. January 10.
Reith, M., C. Carr, and G. Gunsch. 2002. "An Examination of Digital Forensic Models." International Journal of Digital Evidence 1 (3).
Reljin, I., and A. Gavrovska. 2013. Telemedicina. Akademska misao, Belgrade. https://doi.org/10.1155/2013/376152
Sarma, B., and G. Nandi. 2014. "A Study on Digital Image Forgery Detection." International Journal of Advanced Research in Computer Science and Software Engineering 4 (11): 12–17. November.
Sencar, T. H., and N. Memon. 2013. Digital Image Forensics. Springer Science + Business Media, New York. https://doi.org/10.1007/978-1-4614-0757-7
Singhal, N., and G. Gandhani. 2015. "Analysis of Copy-Move Forgery Image Forensics: A Review." International Journal of Signal Processing and Pattern Recognition 8 (7): 77–86. https://doi.org/10.14257/ijsip.2015.8.7.25
Thajeel, A. T., and G. Sulong. 2014. "A Survey of Copy-Move Forgery Detection Techniques." Journal of Theoretical and Applied Information Security 70 (1): 89–95. December.
Yang, J., J. Xie, G. Zhu, S. Kwong, and Y.-Q. Shi. 2014. "An Effective Method for Detecting Double JPEG Compression with the Same Quantization Matrix." IEEE Transactions on Information Forensics and Security 9 (11): 1867–1876. November. https://doi.org/10.1109/TIFS.2014.2359368
Downloads
Objavljeno
Kako citirati
Broj časopisa
Sekcija
Licenca
Sva prava zadržana (c) 2017 Ranko Petrović, Irini Reljin
Ovaj rad je pod Creative Commons Autorstvo 4.0 Internacionalna licenca.
Autori zadržavaju autorska prava i daju časopisu pravo prvog publikovanja rada, što omogućava drugima da dele rad uz priznanje autorstva i izvornog objavljivanja u ovom časopisu.