A New Approach for Image Authentication Framework for Media Forensics
Purpose
- URL: http://arxiv.org/abs/2110.01065v1
- Date: Sun, 3 Oct 2021 18:31:37 GMT
- Title: A New Approach for Image Authentication Framework for Media Forensics
Purpose
- Authors: Ahmad M Nagm, Khaled Y Youssef, Mohammad I Youssef
- Abstract summary: This paper introduces a novel digital forensic security framework for digital image authentication and originality identification.
The approach depends on implanting secret code into RGB images that should indicate any unauthorized modification on the image under investigation.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: With the increasing widely spread digital media become using in most fields
such as medical care, Oceanography, Exploration processing, security purpose,
military fields and astronomy, evidence in criminals and more vital fields and
then digital Images become have different appreciation values according to what
is important of carried information by digital images. Due to the easy
manipulation property of digital images (by proper computer software) makes us
doubtful when are juries using digital images as forensic evidence in courts,
especially, if the digital images are main evidence to demonstrate the
relationship between suspects and the criminals. Obviously, here demonstrate
importance of data Originality Protection methods to detect unauthorized
process like modification or duplication and then enhancement protection of
evidence to guarantee rights of incriminatory. In this paper, we shall
introduce a novel digital forensic security framework for digital image
authentication and originality identification techniques and related
methodologies, algorithms and protocols that are applied on camera captured
images. The approach depends on implanting secret code into RGB images that
should indicate any unauthorized modification on the image under investigation.
The secret code generation depends mainly on two main parameter types, namely
the image characteristics and capturing device identifier. In this paper, the
architecture framework will be analyzed, explained and discussed together with
the associated protocols, algorithms and methodologies. Also, the secret code
deduction and insertion techniques will be analyzed and discussed, in addition
to the image benchmarking and quality testing techniques.
Related papers
- Behind the (Digital Crime) Scenes: An MSC Model [0.0]
The establishment of digital forensics as a foundational discipline for extracting digital evidence further exacerbates the complex nature of criminal investigations.
We delineate the protocols that compose digital forensics within a criminal case, formalise them as message sequence charts (MSCs) and identify their functional requirements.
arXiv Detail & Related papers (2024-03-24T15:29:08Z) - Compression effects and scene details on the source camera identification of digital videos [14.105727639288316]
It is essential to introduce forensic analysis mechanisms to guarantee the authenticity or integrity of a certain digital video.
A technique that performs the identification of the source of acquisition of digital videos from mobile devices is presented.
arXiv Detail & Related papers (2024-02-07T09:14:18Z) - Analyzing eyebrow region for morphed image detection [4.879461135691896]
The proposed method is based on analyzing the frequency content of the eyebrow region.
The findings suggest that the proposed method can serve as a valuable tool in morphed image detection.
arXiv Detail & Related papers (2023-10-30T06:11:27Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Building an Invisible Shield for Your Portrait against Deepfakes [34.65356811439098]
We propose a novel framework - Integrity Encryptor, aiming to protect portraits in a proactive strategy.
Our methodology involves covertly encoding messages that are closely associated with key facial attributes into authentic images.
The modified facial attributes serve as a mean of detecting manipulated images through a comparison of the decoded messages.
arXiv Detail & Related papers (2023-05-22T10:01:28Z) - Fighting Malicious Media Data: A Survey on Tampering Detection and
Deepfake Detection [115.83992775004043]
Recent advances in deep learning, particularly deep generative models, open the doors for producing perceptually convincing images and videos at a low cost.
This paper provides a comprehensive review of the current media tampering detection approaches, and discusses the challenges and trends in this field for future research.
arXiv Detail & Related papers (2022-12-12T02:54:08Z) - A Novel Region Duplication Detection Algorithm Based on Hybrid Approach [0.0]
Digital images are easy to tamper with with good or bad intentions.
Non-availability of pre-embedded information in digital images makes the tampering detection process more difficult in case of digital forensics.
arXiv Detail & Related papers (2022-04-10T12:17:13Z) - ObjectFormer for Image Manipulation Detection and Localization [118.89882740099137]
We propose ObjectFormer to detect and localize image manipulations.
We extract high-frequency features of the images and combine them with RGB features as multimodal patch embeddings.
We conduct extensive experiments on various datasets and the results verify the effectiveness of the proposed method.
arXiv Detail & Related papers (2022-03-28T12:27:34Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - HERS: Homomorphically Encrypted Representation Search [56.87295029135185]
We present a method to search for a probe (or query) image representation against a large gallery in the encrypted domain.
Our encryption scheme is agnostic to how the fixed-length representation is obtained and can therefore be applied to any fixed-length representation in any application domain.
arXiv Detail & Related papers (2020-03-27T01:10:54Z) - Camera Trace Erasing [86.15997461603568]
We address a new low-level vision problem, camera trace erasing, to reveal the weakness of trace-based forensic methods.
We propose Siamese Trace Erasing (SiamTE), in which a novel hybrid loss is designed on the basis of Siamese architecture for network training.
arXiv Detail & Related papers (2020-03-16T00:09:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.