Q176 : Digital Image Authentication Using JPEG Headers
Thesis > Central Library of Shahrood University > Computer Engineering > MSc > 2021
Authors:
Enam Helalat [Author], Mansoor Fateh[Supervisor]
Abstarct: Today, the creation of new imaging equipment and the possibility of easily processing and editing images has led to the production of large volumes of forged images. Therefore, new image Forensics methods for detecting forged images have been introduced. Format-baxsed methods can detect forgery in the compressed image. These methods are mainly used in JPEG image format. among image formats, JPEG format has more abundance and application, So Most cases of image forgery are done in this format. In this paper, a new method for digital images authenticating using JPEG headers is presented. To forge an image, First the output image of the camera is transferred to the relevant software and then the necessary changes are applied to it. One of the most important parameters for detecting forged images is the image source. That is, it must be specified that the image in question was taken from the camera or changed in software. Forgery or changing images is done with the help of various softwares, including Photoshop. One way to identify image modifier software is to use header information. Each camera or software leaves its own footprint in the image header, which allows this footprint to identify the camera model or image modifier software. In this paper, a new algorithm for detecting forgery in image Forensics using information in the JPEG image header is introduced. In this method, first, With regards to the application data in the image JPEG header, the type of editor software or camera model is identifed, and then, according to the other existing information in the header, both the editor software and the camera model are re-identified, and then the header information is re-identifed if the information is inaccurate. The evaluation results of the proposed methods with the collected databaxse showed that the proposed image authentication method is well done and can be used in Operational systems. Also, in the proposed method, any photo editing with Photoshop can be easily identified without any ambiguity.
Keywords:
#Forensics #Authentication #Image Processing #Forgery Detection #JPEG Image Keeping place: Central Library of Shahrood University
Visitor: