Professional Documents
Culture Documents
Presentation Division
image.
Removing
Adding
Types
of Forgery
Image
Retouching
Image
Splicing (Copy-Paste)
Image
Cloning (Copy-Move)
4
Image Retouching
Image splicing technique may change the visual message of digital images
more aggressively than image retouching.
Part of the image is copied and then pasted in a desired location within the
same image.
Image Cloning
Blurring is usually used to reduce the expected irregularity along the border
of the pasted regions.
The similarity of texture, color, noise and other information inside the image
make it very difficult to detect this kind of tampering via visual inspection.
Active Methods
Passive Methods
Active Methods
Digital Signature
Digital Watermarking
10
Use traces left by the processing steps in different phases of acquisition and
storage of digital images.
They do not use any pre-image distribution information inserted into digital
image.
11
As discussed before cloning detection becomes harder when the forger uses
geometric alterations like scaling, rotation & shifting.
This paper proposes a novel blind image rotation detection algorithm with
high precision rotation angle estimation
12
14
15
17
Total Images
Correct Images
Correct Rate
500
486
97.2%
500
480
96.0%
500
471
94.2%
500
459
91.8%
500
438
87.6%
18
Experiment
results. 1st column: three images rotated at respectively; 2nd column: theoretical
19
pixel variance spectrum for the rotated images; 3rd column: actual pixel variance spectrum
for
the rotated images.
Conclusion
Experiment results show that this method works well for rotation
angles larger than , but not as good for smaller rotation angles.
20
21
This step is achieved by sliding a window of size BB from the upper left
corner to the lower right corner one pixel each time.
The quantized DCT coefficients are extracted from each block and used to
represent the features of these blocks.
The quantized DCT coefficients are stored as one row in a matrix A of (M-B+1)
(N-B+1) rows and B B columns, where B B is the block size.
Two identical rows in the matrix A, correspond to two identical blocks in the
suspicious image.
22
23
Thank you
25