Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Image Forgery Detection and Localization using Modified JPEG Ghost

View through CrossRef
Authenticity of an image taken digitally suffers severe threats as a result of increase in various powerful digital image editing tools. These tools modifies the image contents without leaving footprint of such modifications. We come up with a technique that analyzes digital image forgery detection in JPEG images which goes through multiple compression. Nearly all digital devices uses JPEG as a standard storage format to maintain the storage space. JPEG is a lossy compression standard. By using any image processing tools, when assailant changes any part of a JPEG image and save it, the alter part of the image has different compression artifacts. JPEG ghost algorithm is used to detect disparity in JPEG blocks that rise from improper alignments of JPEG blocks respect to original structure and detect local footprint of JPEG compression. In our work, our proposed technique will modify JPEG ghost detection to detect and localize digital image forgery.
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Title: Image Forgery Detection and Localization using Modified JPEG Ghost
Description:
Authenticity of an image taken digitally suffers severe threats as a result of increase in various powerful digital image editing tools.
These tools modifies the image contents without leaving footprint of such modifications.
We come up with a technique that analyzes digital image forgery detection in JPEG images which goes through multiple compression.
Nearly all digital devices uses JPEG as a standard storage format to maintain the storage space.
JPEG is a lossy compression standard.
By using any image processing tools, when assailant changes any part of a JPEG image and save it, the alter part of the image has different compression artifacts.
JPEG ghost algorithm is used to detect disparity in JPEG blocks that rise from improper alignments of JPEG blocks respect to original structure and detect local footprint of JPEG compression.
In our work, our proposed technique will modify JPEG ghost detection to detect and localize digital image forgery.

Related Results

Indoor Localization System Based on RSSI-APIT Algorithm
Indoor Localization System Based on RSSI-APIT Algorithm
An indoor localization system based on the RSSI-APIT algorithm is designed in this study. Integrated RSSI (received signal strength indication) and non-ranging APIT (approximate pe...
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used...
Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection
Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection
Abstract Information in the form of the image conveys more details than any other form of information. Several software packages are available to manipulate the imag...
The Ghost Amusement Scroll by Luo Ping (1733~1799)
The Ghost Amusement Scroll by Luo Ping (1733~1799)
Luo Ping, a representative artist of the Yangzhou painting school, produced a wide range of paintings. Li Dou (1749~1817), who was closely associated with artists of the region, me...
Storing Health Data in JPEG: Looking at Exif Area Capacity Limits
Storing Health Data in JPEG: Looking at Exif Area Capacity Limits
Formats for data storage in personal computers vary according to manufacturer and models for personal health-monitoring devices such as blood-pressure and body-composition meters. ...
CorrDetail: Visual Detail Enhanced Self-Correction for Face Forgery Detection
CorrDetail: Visual Detail Enhanced Self-Correction for Face Forgery Detection
With the swift progression of image generation technology, the widespread emergence of facial deepfakes poses significant challenges to the field of security, thus amplifying the u...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
Double Exposure
Double Exposure
I. Happy Endings Chaplin’s Modern Times features one of the most subtly strange endings in Hollywood history. It concludes with the Tramp (Chaplin) and the Gamin (Paulette Godda...

Back to Top