You are on page 1of 14

A PRELIMINARY REPORT ON

“Design and develop a tool for digital forensic of images”

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE


IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE
OF

BACHELOR OF ENGINEERING (COMPUTER ENGINEERING)

Submitted by

Prince kumar pandey


ROLL NO:

UNDER GUIDANCE OF

Prof. Varsha M. Gosavi

DEPARTMENT OF COMPUTER ENGINEERING


STES’S SMT KASHIBAI NAVALE COLLEGE OF ENGINEERING
VADGAON BK, OFF SINHGAD ROAD
PUNE - 411041

2022-23

AFFILIATED TO

1
CERTIFICATE

This is to certify that the project report entitled


“Design and develop a tool for digital forensic of images”

Submitted by

Prince kumar pandey


ROLL NO:

Is a bonafide student of this institute and the work has been carried out by him/her under the
supervision of Prof. M. S. Agrawal. This work is approved for the partial fulfillment of the
requirement of Savitribai Phule Pune University, for the award of the degree of Bachelor of
Engineering (Computer Engineering).

Prof. Varsha M. Gosavi Prof. R. H. Borhade


Internal Guide of Head of Department
Computer Engineering Computer Engineering

Dr. A. V. Deshpande
Principal
SMT. KASHIBAI NAVALE COLLEGE OF ENINEERING,
VADGAON, OFF SINHGAD ROAD
PUNE, 411041

Place: Pune
Date:
External Name & Sign

2
ACKNOWLEDGEMENT

Projects are like a bridge between theoretical and practical working. First of all, we would like to
thank the supreme power the Almighty God who is obviously the one has always guided us to work
on the right path of life.

We are indebted to our project guide Prof. Varsha M. Gosavi, Department of Computer Science of
Smt. Kashibai Navale college of engineering. We feel it’s a pleasure to be indebted to our guide for
his valuable support, advice and encouragement and we think him for his superb and constant
guidance towards this project.

We sincerely thank Prof. R. H. Borhade, Head of the Department of Computer Engineering and
Principal, Dr. A. V. Deshpande of Smt. Kashibai Navale College of Engineering, for all the
facilities provided to us in the pursuit of this project.

We acknowledge our deep sense of gratitude to our loving parents for being a constant source of
inspiration and motivation.

NAME: Tejas Dinesh Chaudhari


ROLL NO: C43416

3
INDEX

Sr. No. Title of Chapter Page No.

01 Abstract 5

02 Introduction 6

03 Methodology 8

06 System Requirement 11

07 Conclusion 12

08 References 13

1. ABSTRACT

4
Image trustworthiness has become a challenge these days, resulting into lack of affordable
veritable tool that ensures viable admissibility as evidence in the court of law. Existing tools in this
category are characterized with high cost. This study presented a cost-effective approach that could
assist forensic experts in establishing the reliability of image by checking discrepancy in
Exchangeable Image File Format (EXIF) metadata and detecting the presence of double compression
artifact. Experimental set up using Discrete Cosine Transform and EXIF metadata parameters
techniques shows that the approach presented here has an improved outcome over some existing
techniques for image authenticity check required in digital forensics investigation.

5
2. INTRODUCTION

In today’s world, photography has become almost everyone’s hobby. This is as a result of
advances in technology which brought about availability of handy and pocket-sized digital cameras
at avoidable prices especially, the availability camera in mobile phones.

Many people use these pictures for reminiscence; others use them for website decoration while
some use them as evidence to support claim. The high potential of visual media and the ease with
which they are captured, distributed and stored is such that they are used to convey information.

Nowadays, modern photo editors and advance image editing techniques make image editing
extremely easy to manipulate original images in such a way that any alterations are impossible to
catch by an untrained eye, and can even escape the scrutiny of experienced editors of reputable news
media. Even the eye of a highly competent forensic expert can miss certain signs of a fake image,
potentially allowing forged (altered) images to be accepted as court evidence. As digital technology
advances, the need for authenticating digital images, validating their content and detection of
forgeries is inevitable.

An attempt has been made by major camera manufacturers to address this, such attempt include
introduction of secure digital certificates, watermarking, and so on. Watermarking is the process of
embedding information into a digital signal in a way that is difficult to remove. It is providing
copyright protection for intellectual method that’s in digital format (Murty et al., 2011). As explained
by Lyatskaya (2006), watermarking is a kind of steganography developed especially for possible
authentication. According to Tao (2014), the basic characteristics of digital watermark are
imperceptibility, capacity, robustness, false positive of watermarking algorithm and security of the
hiding place. Watermarking may be visible (as depicted in Figure

1.1 a) and Figure 1.1 b) or invisible; all these have been applied in the area of digital photography
with a view to protecting the content and for future authentication. Visible digital watermarking is
one of the modern widely used techniques. Invisible watermarking techniques hide some specific
copyright, authentication, or other information inside the image for author’s identification to protect

6
author’s right and restrict the intruder’s ability of unlimited copying and unauthorized use of the
information. Also, these watermarks might add some other important information, for example,
recipient marks to trace the image distribution, hidden annotation, key notes, etc.

Sample Watermarking in images

7
3. METHODOLOGY

In order to achieve the above objectives, a review of the existing related literature will
be carried out. Journals and past projects as well as methodology used in developing
commercial forensic tools will be reviewed.
The proposed digital tool for forensic analysis consists of two phases: EXIF metadata
analysis and double quantization detection using Discrete Cosine Transform (DCT)
coefficients. In EXIF data analysis phase, EXIF metadata will be extracted from JPEG
header file in order to establish traces of image tampering.

The second phase deals with detection of the presence of double JPEG compression in an image.
At this phase, the image under investigation will be decompressed to extract

Discrete Cosine Transform (DCT) coefficients and the quantization table stored in the JPEG file.
An image is said to undergo double compression or double quantize if it is JPEG-compressed
first with a quality factor QF1 and then JPEG compressed with another quality factor QF2.

THE ARCHITECTURAL STRUCTURE OF THE PROPOSED MODEL:

The architectural view of the proposed model is presented in Figure 3.1. It consists of five
phases i.e. Input, pre-processing, EXIF Analyser, JPEG compression Analyser and
Classification phase.

INPUT IMAGE

Decompress the image


and divide it into 8 x 8
block

8
and extract metadata from JPEG header

Check consistency in the metadata extracted

Check for inconsistency in the peak value of the image histogram

Classify the image into single or double compression class

The life cycle of a digital image can be represented as a composition of several steps (as
shown in Figure 2.2), collected into three main phases: acquisition, coding, and editing.
During acquisition, the light coming from the real scene framed by the digital camera is
focused by the lenses on the camera sensor (a CCD or a CMOS), where the digital image
signal is generated. Before reaching the sensor, however, the light is usually filtered by the
CFA (Color Filter Array), a thin film on the sensor that selectively permits a certain
component of light to pass through it to the sensor. In practice, to each pixel, only one
particular main color (Red, Green, or Blue) is gathered. The sensor output is successively
interpolated to obtain all the three main colors for each pixel, through the so-called
demosaicing process, in order to obtain the digital color image.

With coding, the processed signal is stored to the camera memory; to save storage, in most
cameras, the image is lossy compressed, and for commercial devices, the JPEG
format is usually the preferred one.

9
Finally, the generated image can be postprocessed, for example, to enhance or to modify
its content. Any image editing can be applied to an image during its life: the most used
ones are geometric transformation (rotation, scaling, and so on), blurring, sharpening,
contrast adjustment, image splicing (the composition of an image using parts of one or
more parts of images), and cloning (or copy-move, the replication of a portion of the same
image). Finally, after editing, very often the image is saved in
JPEG format, so that a recompression will occur.

Fig.2.2: Life Cycle of Digital Image (Piva, 2013)

10
4. SYSTEM REQUIREMENTS

Although the system was developed using a higher configuration due to the
requirement for visual studio 2012 version, the implemented version has been
tested on system with lower configuration and it performed wonderfully. Below is
the
minimum system requirement for its implementation.

HARDWARE REQUIREMENTS:

1. System: Pentium i3 processor


2. Hard disk: 500 GB
3. Monitor: Standard LED monitor
4. Input device: Keyboard
5. RAM: 4GB

SOFTWARE REQUIREMENTS:

1. Operating system: Windows 7/8/10/11 Or Linux


2. VS Code

11
CONCLUSION

In this research, a new tool that will aid forensic experts in the discharge of their duty
has been designed and implemented. Nowadays, image manipulation is not only carried
out by experts but also those that have little or no knowledge about photo editing. This is
due to modern, sophisticated and easy to use photo editing software.
This research was able to present two approaches which can help in the detection of
image/photo manipulation which may be difficult to be detected by human eye. The
hybridized tool combines metadata extracted from image under suspicion and analyses
the statistical data of the image with a view to detecting manipulation evidence.

The results presented showed that the new tool will be of great benefit to forensic
experts, lawyers and judges of various competent courts of law, medical personnel,
photo journalists and news editors and other categories of people who are involved in
investigation.

12
REFERENCES

Abhishek K., Rajesh, Singh P., Megha, A. & Hariom, G. (2017), An Evaluation of
Digital Image Forgery Detection Approaches. arXiv:1703.09968v2 [cs.MM] 30 Mar
2017.

Agarwal, V. and Mane, V. (2016). “Reflective SIFT for Improving the Detection of
Copy-Move Image Forgery”, IEEE Computer Society’2016.

Alamro, L. and Yusoff, N. (2014), Copy-Move Forgery Detection using Integrated


DWT and SURF. Journal of Telecommunication, Electronic and Computer
Engineering. e-ISSN: 2289-8131 Vol. 9 No. 1-2. Alin.

C. P. (2004), Statistical Tools for Digital Image Forensics. PhD thesis, at Dartmouth
College Hanover, New Hampshire.

Amira, H., Rhouma, R. and Belghith, S. (2010), An Eigen value based Watermarking
scheme for tamper detection in gray level images, in Proc. 7th Int. Multi Conference on
Systems, Signals and Devices, pp.1-5, IEEE, 2010.

Ana, L. S. O., Jocelin, R. C., Luis, J. G. V., Julio, C. H. and Andez, C. (2015), Image
source acquisition identification of mobile devices based on the use of features.
Multimed Tools Appl DOI 10.1007/s11042-015-2633-2. Springer Science+Business
Media New York 2015.

Andrey, K. and Vladislav, M. (2017), A new copy-move forgery detection algorithm


using image preprocessing procedure. 3rd International Conference “Information
Technology and Nanotechnology”, ITNT-2017, 25-27 April 2017, Samara, Russia.
Procedia Engineering 201 (2017) 436–444.

140 Anju, B. and Manimurugan, S. (2012), An Approach to Medical Image


Compression Using Filters Based On Lifting Scheme. IOSR Journal of VLSI and
Signal Processing (IOSR-JVSP). Volume 1, Issue 2 (Sep-Oct. 2012), PP 09-16.

Ansari, M. D., Ghrera, S. P. and Tyagi, V. (2014), Pixel-Based Image Forgery


Detection: A Review. IETE JOURNAL OF EDUCATION VOL 55 NO 1 JAN-JUN
2014.

Araz, R. A. M., Mohd, S, M. R., and Ghazali, B. S. (2017), Literature Review:


Detection of Image Splicing Forgery. International Journal of Applied Engineering
Research ISSN 0973-4562 Volume 12, Number 22 (2017) pp. 11855-11861.

Bender, W., Gruhi, D., Morimota, N. and Lu, A. (1996), Techniques for Data Hiding,
IBM Systems Journal, Vol. 35, No. 3 & 4.

13
14

You might also like