Digital Image Tampering – A Threat to Security Management

نویسنده

  • Deepika Sharma
چکیده

Modern digital technology and the availability of increasingly powerful image processing tools can easily manipulate the digital images without leaving obvious visual traces of having been tampered, so there is an urgent need to identify the authenticity of images. In the fields such as forensics, medical imaging, e-commerce, and industrial photography, authenticity and integrity of digital images is essential. In this research work, a comprehensive study has been undertaken for accessing and analyzing the threat of Digital Image tampering for security. Various methods and research issues involving the tampering detection and image authentication have been discussed and suitable recommendations for security scenario have been presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Approach of Message Encryption based on Steganography and Watermarking

Even after rapid development of encryption and decryption algorithms, the communication channels still face acute threat of illegal intelligence gathering. The science of steganography has also simultaneously emerged as a means of covert communication. One major reason is spread of digital images as means for passing classified information include the easy distribution, easy coping and simple m...

متن کامل

Detection of Tampering in Image Using Watermarking

In the last few years there is a tremendous development in the area of high quality digital camera technology. So our life is full of the use of these digital images. However now a days there are lot of software (for example Photoshop, Photoscape, Photoplus and Picasa etc.) that can be used to modify these digital image. Therefore we cannot use these images as a proof or evidence. Therefore det...

متن کامل

Advance Robust Watermarking Of Compressed and Encrypted Digital Media

Due to rapid increase of internet these days has raised the worth of digital media all over the world. Digital watermarking is an application associated with copyright protection. Any digital object can be used as a carrier to carry information. If the information is related to object then it is known as a watermark which can be visible or invisible. Robustness is checked well by extracting ori...

متن کامل

Avoid Powerful Tampering by Malicious Host

This paper indicates a potential security threat which may do harm to distributed computing security. As the program is distributed to run in the remote nodes, adversary may use simulator to produce false results to do tampering. Some sophisticated simulator can give powerful tampering ability to adversary, with the reason explained in this paper. In order to solve this security problem, Real P...

متن کامل

Scalable fragile watermarking for image authentication

Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the ima...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013