You are on page 1of 17

DIGITAL IMAGE

TAMPERING
PRESENTED BY
PRIYA SINGH
M. TECH. 2ND YEAR
C.S.E. (1306810718)

POINTs TO PRESENT Introduction Digital Image Tampering Types of Image Tampering Image Tampering Detection Approaches Need for Tampering Detection Conclusion and Future Scope References .

Using the manipulation tools that are available on internet it is easy to tamper the digital images without any trace. Therefore.INTRODUCTION In today’s world it is easy to manipulate the image by adding or removing some elements from the image which result in a high number of image forgeries. . verification of originality of images has become a challenging task.

The example is shown below: . etc.DIGITAL IMAGE TAMPERING The term image tampering refers to the process of manipulation of image information that is not acceptable. retouching the image. Like changing the objects in the image. combining two images.

DIGITAL IMAGE TAMPERING (continued…) (a) the original image with three missiles (b) The forged image with four missiles .

TYPES OF IMAGE TAMPERING Composite Image (Splicing) .

The retouching is mostly used to enhance or reduce the image features. . not necessarily conforming to the standards of morality.TYPES OF IMAGE TAMPERING (continued…) IMAGE RETOUCHING Image retouching is a slight change in the image for various artistic and commercial purposes.

TYPES OF IMAGE TAMPERING (continued…)  Example of image retouching  Retouching by a magazine in which the real face on right is replaced with the left one .

TYPES OF IMAGE TAMPERING (continued…) COPY MOVE A portion of an image is copied somewhere else in the same image. .

TYPES OF IMAGE TAMPERING (continued…) COMPOSITE IMAGE OR SPLICING A common form of photographic manipulation is the digital splicing of two or more images into a single composite image. . The photo compositing is the result of cutting and joining of two or more photographs with seamless transition without leaving any visual clues about the joining from other photographs.

TYPES OF IMAGE TAMPERING (continued…)  Example of Composite Image .

g. Example: Digital Signature..IMAGE TAMPERING DETECTION APPROACHES ACTIVE APPROACH The area of active methods simply can be divided into the data hiding approaches. By data hiding we refer to methods embedding secondary data into the image. Active approaches assumes an inserting of a digital data at the source side (e. Water Marking. etc. . Scanner) and verifying the mark integrity at the detection side.

Passive techniques for image forensics operate in the absence of any watermark or signature. .IMAGE TAMPERING DETECTION APPROACHES (continued…) PASSIVE APPROACH Passive methods are mostly based on the fact that forgeries can bring into the image specific detectable changes. but they may alter the attributes and statistics of an image. These work on the assumption that although digital forgeries may leave no visual clues that indicate tampering.

computer graphics software. teaching aids etc. Images are used everywhere either as a personal memory evidences or for official purposes. magazines etc. . to evidences in court rooms. Recently. made editing and manipulating images easier. The digital images are omnipresent right from the cover pages of journals. hence it is essential to detect the forgeries in the images. sophisticated high end image processing.NEED FOR IMAGE TAMPERING DETECTION Digital images are playing every important role in our daily life. newspapers. the low cost cameras.

CONCLUSION AND FUTURE SCOPE It is well known fact that there is no single technique to determine all the type of forgeries. Each method focused on the image attributes. Future scope of tampering detection is to develop new efficient algorithms and/or to improve the existing algorithms in terms of time and space complexity and/or in terms of efficiency in detection process and in detected output. . which are changed by the forgeries.

Tripathi “Image Composite detection using Customized Filtering” International Journal of Computer Graphics & Animation (IJCGA) Vol. No. 539543 .1.3.REFERENCES [1] Shrishail Math and R. Vol. October 2011. [2] Pradyumna Deshpande and Prashasti Kanikar “Pixel Based Digital Image Forgery Detection Techniques” International Journal of Engineering Research and Applications (IJERA) . pg. Issue 3.C. 2. May-Jun 2012.

THANK YOU .