International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 02 | May-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 583
DETECTION OF TAMPERING IN COLOR IMAGE
Manoj Nagar
1
, Pinky Brahmbhatt
2
, Dr. M. Sarada Devi
3
1
PG Student, Department of ECE, L. D. College of Engineering, Ahmedabad, Gujarat, India
2
Associate Professor, Department of ECE, L. D. College of Engineering, Ahmedabad, Gujarat, India
3
Principal, Department of ECE, Narnarayan Shastri Institute of Technology, Jetalpur, Gujarat, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In the last few years there is a tremendous
development in the area of high quality digital camera
technology. So our life is full of the use of these digital
images. However now a days there are lot of software
(for example Photoshop, Photoscape, Photoplus and
Picasa etc.) that can be used to modify these digital
image. Therefore we cannot use these images as a proof
or evidence. Therefore detection of tampering in image
is important issue for forensic department. In this
paper I have presented a method which is based on
digital watermark for detection of tampering in image.
In this method I have first embed a digital watermark
in Least Significant Bit of pixel which is computed from
digital content of image. My proposed algorithm
consists of two parts. First is generation and embedding
of digital watermark and second is detection of
tampering and localization.
Key Words: Digital watermarking, Spatial domain,
Frequency domain, Least Significant Bit (LSB), Discrete
Cosine Transform (DCT), Discrete Fourier Transform (DFT).
1. INTRODUCTION
Detection of tampering means showing the alteration
which is not easily observable. In the last few years,
malicious attackers generally try to alter meaningful
information of an image so that meaning of image is
changed. Watermarking methods are desirable because
these methods protect the integrity of image and provide
authentication. Therefore, watermarking method for
detection of tampering has much attention.
In Digital watermarking method additional data is
added into the digital content of image in such a way that
distortion caused by embedding data remains
imperceptible. The additional data which is embedded is
called DzDigital Watermarkdz. Digital watermarking method
is used for tamper detection and recovery. Embedding
reference pattern (watermark) into image [1], the
problem of integrity and authentication of image is solved
and attracted the interest of researchers. Many
watermarking methods can determine that image has
been modified or not and some methods can localize the
modified areas and some methods has capability to
recover tampered areas [2-6].
Generally there are three types of question arises related
to detection of tampering in image [8].
Work altered in any way?
Work altered significantly?
Which parts of the Work altered?
There are many methods exists for giving the answer
of above question for example first question can be
answered by using cryptographic signature to the content
of image. Even without using cryptographic signature
tampering can be detected using detection modification to
the images, identifying anomalies such as variation in the
shadow, missing shadow, discontinuities in background
and variation of lighting condition etc. But there are some
potential benefits are using watermark for tampering
detection. First, watermark does not need to store as a
separate, associated metadata such as cryptographic
signature. Second, watermark undergoes same
transformation as the content of image in which
watermark is embedded.
2. LITERATURE SURVEY
There are three level of tampering detection methods [9].
Low Level: This level method has no semantic information.
This level method generally uses statistical property of
image pixels for example DCT coefficients. Middle Level:
This level method uses some semantic information. For
example inconsistency of different lighting conditions and
splicing etc. High Level: This level method has fully
semantic information. For example image does not have
semantic meaning in which toothbrush is used for hair
setting.
The detection of tampering in image can be done
using two techniques - blind techniques and non-blind
techniques. Blind tampering[15-18] detection methods are
based on the fact that they do not require original image or
its representation for the purpose of tampering detection
whereas Non-blind [10-14] tampering detection method
requires original image or its representation for the
purpose of the tampering detection techniques that do not
require the original image for the purpose of tampering
detection. Blind tampering detection methods are also
called as DzPassivedz methods and non-blind tampering
detection methods are also called as DzActivedz methods.