Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification

Image Forensic Tool (IFT): Image Retrieval, Tampering Detection, and Classification

Digambar Pawar, Mayank Gajpal
Copyright: © 2021 |Pages: 15
DOI: 10.4018/IJDCF.287606
Article PDF Download
Open access articles are freely available for download

Abstract

Images now-a-days are often used as an authenticated proof for any cyber-crime. Images that do not remain genuine can mislead the court of law. The fast and dynamically growing technology doubts the trust in the integrity of images. Tampering mostly refers to adding or removing important features from an image without leaving any obvious trace. In earlier days, digital signatures were used to preserve the integrity, but now a days various tools are available to tamper digital signatures as well. Even in various state-of-the-art works in tamper detection, there are various restrictions in the type of inputs and the type of tampering detection. In this paper, the researchers propose a prototype model in the form of a tool that will retrieve all the image files from given digital evidence and detect tampering in the images. For various types of tampering, different tampering detection algorithms have been used. The proposed prototype will detect if tampering has been done or not and will classify the image files into groups based on the type of tampering.
Article Preview
Top

Introduction

In today’s digital world image files play a crucial role. One of the basic forms of information available is in the form of images as it can be easily interpreted by humans. In no time, this kind of information can be shared to various people in different parts of the world. Therefore the integrity of such information is very important. An image file can be easily tampered using various techniques discussed in the later part of this paper. A tampered image can be harmful in various sensitive cases and its range can’t be imagined (Farid, 2006). On the other hand, tampering of any image is much easier than identifying the tampering done. Hence, tamper detection is one of the most required fields to look into in today’s scenario of digital forensics. The only way to detect whether tampering has been performed or not in a digital forensic process is by using image processing techniques (Katzenbeisser, 1999). A proper forensics process is required for verification of such image files (Böhme, 2009). In this paper, the authors have designed a prototype for performing image forensics and implemented the same for the usage of law enforcement. Image forensics is unavoidable in many cases. Modification or tampering of images that are further used for ill-intentions are increasing day by day. Recent such examples (Redi, 2011, p.2) can be seen in Figures 1 and 2.

Figure 1.

The tampered image of Jeffrey Wong Su En while receiving the award from Queen Elizabeth II (W Taktak, 2011)

IJDCF.287606.f01
Figure 2.

The original image of Ross Brawn receiving the order of the British Empire from the Queen (W Taktak, 2011)

IJDCF.287606.f02

Another important example with a different view of image tampering can be seen in Figures 3 and 4.

Figure 3.

Original image of a crime scene (B Soni, 2018)

IJDCF.287606.f03
Figure 4.

Tampered image in which evidence is altered (B Soni, 2018)

IJDCF.287606.f04

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing