You are on page 1of 17

DIGITAL IMAGE

TAMPERING
PRESENTED BY
PRIYA SINGH
M. TECH. 2ND YEAR
C.S.E. (1306810718)

POINTs TO PRESENT
Introduction
Digital Image Tampering
Types of Image Tampering
Image Tampering Detection Approaches
Need for Tampering Detection
Conclusion and Future Scope
References

INTRODUCTION
In todays world it is easy to manipulate the image
by adding or removing some elements from the
image which result in a high number of image
forgeries.
Using the manipulation tools that are available
on internet it is easy to tamper the digital images
without any trace. Therefore, verification of
originality of images has become a challenging
task.

DIGITAL IMAGE TAMPERING


The term image tampering refers to the process
of manipulation of image information that is not
acceptable.
Like changing the objects in the image,
retouching the image, combining two images, etc.
The example is shown below:

DIGITAL IMAGE TAMPERING


(continued)

(a) the original image with three missiles


(b) The forged image with four missiles

TYPES OF IMAGE TAMPERING


Composite Image (Splicing)

TYPES OF IMAGE TAMPERING


(continued)
IMAGE RETOUCHING
Image retouching is a slight change in the image
for various artistic and commercial purposes, not
necessarily conforming to the standards of
morality.
The retouching is mostly used to enhance or
reduce the image features.

TYPES OF IMAGE TAMPERING


(continued)
Example

of image retouching

Retouching

by a magazine in which the real face on right is


replaced with the left one

TYPES OF IMAGE TAMPERING


(continued)
COPY MOVE
A portion of an image is copied somewhere else in the
same image.

TYPES OF IMAGE TAMPERING


(continued)
COMPOSITE IMAGE OR SPLICING
A common form of photographic manipulation is the
digital splicing of two or more images into a single
composite image.
The photo compositing is the result of cutting and
joining of two or more photographs with seamless
transition without leaving any visual clues about the
joining from other photographs.

TYPES OF IMAGE TAMPERING


(continued)

Example of Composite Image

IMAGE TAMPERING DETECTION


APPROACHES
ACTIVE APPROACH
The area of active methods simply can be divided into
the data hiding approaches. By data hiding we refer to
methods embedding secondary data into the image.
Active approaches assumes an inserting of a digital
data at the source side (e.g., Scanner) and verifying the
mark integrity at the detection side.
Example: Digital Signature, Water Marking, etc.

IMAGE TAMPERING DETECTION


APPROACHES (continued)
PASSIVE APPROACH
Passive methods are mostly based on the fact that
forgeries can bring into the image specific detectable
changes.
Passive techniques for image forensics operate in the
absence of any watermark or signature. These work on
the assumption that although digital forgeries may leave
no visual clues that indicate tampering, but they may
alter the attributes and statistics of an image.

NEED FOR IMAGE TAMPERING


DETECTION
Digital images are playing every important role in our
daily life. The digital images are omnipresent right from
the cover pages of journals, newspapers, magazines etc. to
evidences in court rooms, teaching aids etc. Images are
used everywhere either as a personal memory evidences
or for official purposes.
Recently, the low cost cameras, sophisticated high end
image processing, computer graphics software, made
editing and manipulating images easier, hence it is
essential to detect the forgeries in the images.

CONCLUSION AND FUTURE


SCOPE
It is well known fact that there is no single
technique to determine all the type of forgeries.
Each method focused on the image attributes,
which are changed by the forgeries.
Future scope of tampering detection is to
develop new efficient algorithms and/or to
improve the existing algorithms in terms of time
and space complexity and/or in terms of efficiency
in detection process and in detected output.

REFERENCES
[1] Shrishail Math and R.C. Tripathi Image Composite
detection using Customized Filtering International Journal
of Computer Graphics & Animation (IJCGA) Vol.1, No.3,
October 2011.
[2] Pradyumna Deshpande and Prashasti Kanikar Pixel
Based Digital Image Forgery Detection Techniques
International Journal of Engineering Research and
Applications (IJERA) , Vol. 2, Issue 3, May-Jun 2012, pg. 539543

THANK
YOU

You might also like