Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Image Forgery Detection and Localization using Modified JPEG Ghost

View through CrossRef
Authenticity of an image taken digitally suffers severe threats as a result of increase in various powerful digital image editing tools. These tools modifies the image contents without leaving footprint of such modifications. We come up with a technique that analyzes digital image forgery detection in JPEG images which goes through multiple compression. Nearly all digital devices uses JPEG as a standard storage format to maintain the storage space. JPEG is a lossy compression standard. By using any image processing tools, when assailant changes any part of a JPEG image and save it, the alter part of the image has different compression artifacts. JPEG ghost algorithm is used to detect disparity in JPEG blocks that rise from improper alignments of JPEG blocks respect to original structure and detect local footprint of JPEG compression. In our work, our proposed technique will modify JPEG ghost detection to detect and localize digital image forgery.
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Title: Image Forgery Detection and Localization using Modified JPEG Ghost
Description:
Authenticity of an image taken digitally suffers severe threats as a result of increase in various powerful digital image editing tools.
These tools modifies the image contents without leaving footprint of such modifications.
We come up with a technique that analyzes digital image forgery detection in JPEG images which goes through multiple compression.
Nearly all digital devices uses JPEG as a standard storage format to maintain the storage space.
JPEG is a lossy compression standard.
By using any image processing tools, when assailant changes any part of a JPEG image and save it, the alter part of the image has different compression artifacts.
JPEG ghost algorithm is used to detect disparity in JPEG blocks that rise from improper alignments of JPEG blocks respect to original structure and detect local footprint of JPEG compression.
In our work, our proposed technique will modify JPEG ghost detection to detect and localize digital image forgery.

Related Results

Seeing Indonesian Ghost Films through Document Theory
Seeing Indonesian Ghost Films through Document Theory
Hantu (in Bahasa Indonesia), or ghosts, are portrayed as the incarnation of monstrous or evil souls wishing to harm humans (Amin et al., 2017). Most modern Indonesians still believ...
JPEG Column: 102nd JPEG Meeting in San Francisco, U.S.A.
JPEG Column: 102nd JPEG Meeting in San Francisco, U.S.A.
JPEG Trust reaches Draft International Standard stage. The 102nd JPEG meeting was held in San Francisco, California, USA, from 22 to 26 January 2024. At this meeting, JPE...
Indoor Localization System Based on RSSI-APIT Algorithm
Indoor Localization System Based on RSSI-APIT Algorithm
An indoor localization system based on the RSSI-APIT algorithm is designed in this study. Integrated RSSI (received signal strength indication) and non-ranging APIT (approximate pe...
Ensuring Visual Integrity: Deep Learning-Based Solutions for Authentic Image Forgery Detection
Ensuring Visual Integrity: Deep Learning-Based Solutions for Authentic Image Forgery Detection
Digital image manipulation has become increasingly prevalent with the advancement of image editing tools, posing significant challenges in digital forensics. Detecting and localizi...
AN OPTIMIZED CONVOLUTION NEURAL NETWORK BASED INTER-FRAME FORGERY DETECTION MODEL - A MULTI-FEATURE EXTRACTION FRAMEWORK
AN OPTIMIZED CONVOLUTION NEURAL NETWORK BASED INTER-FRAME FORGERY DETECTION MODEL - A MULTI-FEATURE EXTRACTION FRAMEWORK
Surveillance systems are becoming pervasive throughout our daily lives, and surveillance recordings are being used as the essential evidence in criminal investigations. The authent...
Explainable Image-Centric Forgery Detection: A Survey
Explainable Image-Centric Forgery Detection: A Survey
The rapid growth of AI-driven image manipulation technologies poses critical challenges for verifying content authenticity. While many forgery detection systems achieve high accura...
The Ghost Amusement Scroll by Luo Ping (1733~1799)
The Ghost Amusement Scroll by Luo Ping (1733~1799)
Luo Ping, a representative artist of the Yangzhou painting school, produced a wide range of paintings. Li Dou (1749~1817), who was closely associated with artists of the region, me...
Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection
Hierarchical Categorization and Review of Recent Techniques on Image Forgery Detection
Abstract Information in the form of the image conveys more details than any other form of information. Several software packages are available to manipulate the imag...

Back to Top