Digital Image Tampering – A Threat to Security Management
نویسنده
چکیده
Modern digital technology and the availability of increasingly powerful image processing tools can easily manipulate the digital images without leaving obvious visual traces of having been tampered, so there is an urgent need to identify the authenticity of images. In the fields such as forensics, medical imaging, e-commerce, and industrial photography, authenticity and integrity of digital images is essential. In this research work, a comprehensive study has been undertaken for accessing and analyzing the threat of Digital Image tampering for security. Various methods and research issues involving the tampering detection and image authentication have been discussed and suitable recommendations for security scenario have been presented.
منابع مشابه
A Novel Approach of Message Encryption based on Steganography and Watermarking
Even after rapid development of encryption and decryption algorithms, the communication channels still face acute threat of illegal intelligence gathering. The science of steganography has also simultaneously emerged as a means of covert communication. One major reason is spread of digital images as means for passing classified information include the easy distribution, easy coping and simple m...
متن کاملDetection of Tampering in Image Using Watermarking
In the last few years there is a tremendous development in the area of high quality digital camera technology. So our life is full of the use of these digital images. However now a days there are lot of software (for example Photoshop, Photoscape, Photoplus and Picasa etc.) that can be used to modify these digital image. Therefore we cannot use these images as a proof or evidence. Therefore det...
متن کاملAdvance Robust Watermarking Of Compressed and Encrypted Digital Media
Due to rapid increase of internet these days has raised the worth of digital media all over the world. Digital watermarking is an application associated with copyright protection. Any digital object can be used as a carrier to carry information. If the information is related to object then it is known as a watermark which can be visible or invisible. Robustness is checked well by extracting ori...
متن کاملAvoid Powerful Tampering by Malicious Host
This paper indicates a potential security threat which may do harm to distributed computing security. As the program is distributed to run in the remote nodes, adversary may use simulator to produce false results to do tampering. Some sophisticated simulator can give powerful tampering ability to adversary, with the reason explained in this paper. In order to solve this security problem, Real P...
متن کاملScalable fragile watermarking for image authentication
Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the ima...
متن کامل