ROW LEVEL IMAGE FORGERY DETECTION TECHNIQUE USING EMBEDDED DIGITAL SIGNATURES
Image forgery detection is one of the most important issues in today’s modern world. It has become very easy to change the contents of digital images with image editing tools and software. This paper is presenting a new technique to detect any changes made in digital images. This technique ensures the integrity of digital image at row level and using embedded digital signatures. Using message digest 5 algorithm, digital signature is generated from selected pixels of each row using selected pixels for and embedded in the least significant bits of selected pixel of corresponding row of digital image. The proposed technique is powerful enough to detect different image manipulations. The results show that it can successfully detect one least significant bit alteration made in any pixel of digital image.
2. Khan, S., Naeem, M., Khan, T., and Ahmad, N., (2017), “4LSB based data hiding in complex region of digital images and its effects on edges and histogram.” Journal of Engineering and Applied Sciences (JEAS), Peshawar, vol. 36, no. 1, pp. 67-75.
3. Cox, I., Miller, M. L., and Bloom, J. A., (2001), “Digital Watermarking,” San Matteo, CA: Morgan Kaufmann.
4. Birajdar, G. K., and Mankar, V. H., (2013), “Digital image forgery detection using passive techniques: A survey,” Digital Investigation, vol. 10, no. 3, pp. 226-245.
5. Gaborini L., Bestagini P., Milani S., Tagliasacchi M., and Tubaro S., (2014), “Multi-clue image tampering localization,” In IEEE International Workshop on Information Forensics and Security (WIFS), pp. 125-130.
6. Redi, J. A., Taktak, W., and Dugelay, J. L., (2011), “Digital image forensics: A booklet for beginners,” Multimedia Tool Application, vol. 51, no. 1, pp.133-162.
7. Chierchia, G., Poggi, G., Sansone, C., and Verdoliva, L., (2014), “A Bayesian-MRF approach for PRNU-based image forgery detection,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 4, pp. 554-567.
8. Deepakumara, J., Heys, H. M., and Venkatesan, R., (2001), “FPGA implementation of MD5 hash algorithm,” In Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 919-924.
9. Khan, S., Ismail, M., Khan, T., and Ahmad, N. (2016), “Enhanced stego block chaining (ESBC) for low bandwidth channel”, Security and Communication Networks, vol. 9, no. 18, pp. 6239-6247.
10. Khan, S., Ahmad, N., and Wahid, M., (2016) “Varying index varying bits substitution algorithm for the implementation of VLSB steganography”, Journal of the Chinese Institute of Engineers, vol. 39, no. 1, pp. 101-109.
11. Lyu, S., and Farid, H., (2002), “Detecting hidden messages using higher-order statistics and support vector machines”. In Information Hiding, pp. 340-354.
12. Shi, Y. Q., Xuan, G., Zou, D., Gao, J., and Yang C., (2005), “Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network,” In International Conference on Multimedia and Expo, Amsterdam, Netherlands, pp. 269-272.
13. Zou, D., Shi, Y. Q., Su, W., and Xuan, G., (2006), “Steganalysis based on Markov model of thresholded prediction-error image,” In IEEE International Conference on Multimedia and Expo, pp. 1365-1368.
14. Rad, R. M., and Wong, K., (2015), “Digital image forgery detection by edge analysis,” In IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), pp. 19-20.
15. Kashyap, A., Parmar, R. S., Suresh, B., Agarwal, M., and Gupta, H., (2016), “Detection of digital image forgery using wavelet decomposition and outline analysis,” In International Conference on Signal Processing and Communication (ICSC), pp. 187-190.