SlideShare uma empresa Scribd logo
1 de 15
IMAGE FORGERY
1. DEFINITION AND HISTORY
2. TYPES OF IMAGE FORGERY
     A. IMAGE RETOUCHING
          B. IMAGE SPLICING
C. COPY AND MOVE ATTACK

    Image Forgery is not new. History has recorded that it happens as
    early as the 1840s. Hippolyta Bayard, the first person to create a
    fake image as recorded by history, is famous for a picture of him
    committing suicide (see picture on the left). It all started as an act
    of frustration because he had lost the chance of becoming 'the
    inventor of photography' to Louis Daguerre. Daguerre patented a
    photography process earlier than him and owns all the glory [1].
     Digital Image Forgery does not differ very much in nature
    compared to conventional Image Forgery. Instead of using
    photograph, digital image forgery deals with digital image. The
    process of creating fake image has been tremendously simple with
    the introduction of powerful computer graphics editing software
    such as Adobe Photoshop, GIMP, and Corel Paint Shop, some of
    which are available for free.
     There are many cases of digital image forgery. All of these cases
    can be categorized into three major groups, based on the process
    involved in creating the fake image. The groups are Image
    Retouching, Image Splicing, and Copy-Move Attack.
    Image Retouching can be considered to be the less
    harmful kind of digital image forgery. Image
    retouching does not significantly change an image,
    but instead, enhances or reduces certain feature of
    an image (see picture below). This technique is
    popular among magazine photo editors. It can be
    said that almost all magazine cover would employ
    this technique to 'enhance' certain features of an
    image so that it is more attractive; ignoring the fact
    that such enhancement is ethically wrong.
   This technique is more aggressive than image
    retouching. Image Splicing is a technique that
    involves a composite of two or more images which
    are combined to create a fake image. In the picture
    below, 'the shark' is copied to the base image
    (helicopter rescue). The base image is first flipped
    horizontally before the shark is pasted to create a
    more convincing (and not to forget dramatic)
    picture of a helicopter rescue.
   Copy-move attack is more or less similar to Image Splicing in
    view of the fact that both techniques modify certain image
    region (of a base image), with another image.
    However, instead of having an external image as the
    source, copy-move attack uses portion of the original base
    image as its source. In other words, the source and the
    destination of the modified image originated from the same
    image. In a copy-move attack, parts of the original image is
    copied, moved to a desired location, and pasted. This is
    usually done in order to conceal certain details or to duplicate
    certain aspects of an image. Blurring is usually applied along
    the border of the modified region to reduce the effect of
    irregularities between the original and pasted region [2]. The
    picture below shows a sample image that has been tampered
    using copy-move attack (left) and its original (right). Notice a
    repeated smoke pattern on the left image.
   There are many ways in which you can secure your home and
    business against crime and avoid becoming another statistic.
   Established in 1992 image security offers comprehensive range of
    sophisticated security products and security services to protect what
    means to you most .
The Internet is a great way to show your photographs to the world.
Putting images up on a web site is child’s play compared to hanging
           a gallery show or publishing a book. But what is to stop an
unscrupulous web site visitor from stealing your images? In truth, all
     the images that are seen by your visitors are already copied and
          stored in their computer’s browser cache. But there are still
                   effective, low cost ways of preventing their misuse.
Adding Your Copyright as a
Text Layer
This is the easiest and most effective way to protect your
images. Placing the copyright symbol and your name directly in
an image tells everyone that your work is copyrighted. We
recommend including your web site URL (or phone number if
you don’t have your own web site) so anyone who prints out or
copies your picture can easily find you in the future. This turns
every copied image into an advertisement for you.
Each graphics program handles text differently, but look for
the Text Tool on the tool bar within your program. Use an easy
to read font like Arial in a small point size. If your image has
light and dark areas that make text hard to read you can select
the area behind the text and reduce its contrast.
Size and Compress Your
Images Properly
There are two benefits to this approach. Smaller images will
reduce both the quality of a printout and will also speed page
load time. Keep your image size to under 450 pixels on the long
dimension. If anyone were to print it, it would either print small,
or if forced to be a larger print the image will look pixilated
(pixels will spread out). Next, compress your images until they
just begin to show artifacts. This will help them load faster, and
further reduce the chance they will be misused. We recommend
using one of the side by side compression tools that give you a
visual confirmation of how much you can compress the image
before it starts to visually degrade. Photoshop's "Save For Web"
(also available in Photoshop Elements) is our tool of choice.
Image Slicing to protect
your images
Using your graphics program, you can slice your pictures into
two or more slices. Right clicking and saving would only get
the view the part of the picture that was clicked on. And the
browsers cache will only have fragmented bits of images in it.
The individual image parts, which are really separate,
pictures loading into different cells within the same table, are
joined in the HTML when viewing the image on the web. An
added benefit of slicing is shorter load time when you
optimize each slice individually. In a program like
ImageReady (part of Photoshop 6), different parts of the
same image can be optimized as Gif’s or Jpeg’s
Mouseover image swap
Another bit of JavaScript code can cause one image to replace another
when the user’s mouse passes over it. The replacement image can
include a warning about not copying your images.




Table Background and
Transparent GIF
This is a bit more complex, but quite effective. First create a table exactly
the same size as the image you want to protect. Next, set the image as
the table background. Create a transparent GIF with a similar name and
exactly the same pixel dimensions as the original image and insert it into
the table. If someone tries to copy it by right clicking on it, all they get is
the transparent GIF

Mais conteúdo relacionado

Mais procurados

Image segmentation
Image segmentationImage segmentation
Image segmentationDeepak Kumar
 
Image restoration and degradation model
Image restoration and degradation modelImage restoration and degradation model
Image restoration and degradation modelAnupriyaDurai
 
Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing BasicsA B Shinde
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processingkiruthiammu
 
Image processing second unit Notes
Image processing second unit NotesImage processing second unit Notes
Image processing second unit NotesAAKANKSHA JAIN
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image CompressionKalyan Acharjya
 
08 frequency domain filtering DIP
08 frequency domain filtering DIP08 frequency domain filtering DIP
08 frequency domain filtering DIPbabak danyal
 
Point processing
Point processingPoint processing
Point processingpanupriyaa7
 
Image Filtering in the Frequency Domain
Image Filtering in the Frequency DomainImage Filtering in the Frequency Domain
Image Filtering in the Frequency DomainAmnaakhaan
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGmuthu181188
 
Fundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processingFundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processingKarthicaMarasamy
 
1.arithmetic & logical operations
1.arithmetic & logical operations1.arithmetic & logical operations
1.arithmetic & logical operationsmukesh bhardwaj
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Kalyan Acharjya
 
Edge linking in image processing
Edge linking in image processingEdge linking in image processing
Edge linking in image processingVARUN KUMAR
 

Mais procurados (20)

Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image restoration and degradation model
Image restoration and degradation modelImage restoration and degradation model
Image restoration and degradation model
 
Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing Basics
 
Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Image processing second unit Notes
Image processing second unit NotesImage processing second unit Notes
Image processing second unit Notes
 
Chap6 image restoration
Chap6 image restorationChap6 image restoration
Chap6 image restoration
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Image compression
Image compression Image compression
Image compression
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
 
08 frequency domain filtering DIP
08 frequency domain filtering DIP08 frequency domain filtering DIP
08 frequency domain filtering DIP
 
Point processing
Point processingPoint processing
Point processing
 
Image Filtering in the Frequency Domain
Image Filtering in the Frequency DomainImage Filtering in the Frequency Domain
Image Filtering in the Frequency Domain
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSING
 
Digital Image Forgery
Digital Image ForgeryDigital Image Forgery
Digital Image Forgery
 
Image processing
Image processingImage processing
Image processing
 
Fundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processingFundamentals steps in Digital Image processing
Fundamentals steps in Digital Image processing
 
1.arithmetic & logical operations
1.arithmetic & logical operations1.arithmetic & logical operations
1.arithmetic & logical operations
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Edge linking in image processing
Edge linking in image processingEdge linking in image processing
Edge linking in image processing
 

Destaque

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...arorasurbhi
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainSondosFadl
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature reviewTharindu Rusira
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...IDES Editor
 
Image pre processing
Image pre processingImage pre processing
Image pre processingAshish Kumar
 
Audio authentication techniques
Audio authentication techniquesAudio authentication techniques
Audio authentication techniquespriyanka pandey
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...LogicMindtech Nologies
 
Analysis of the world passport
Analysis of the world passportAnalysis of the world passport
Analysis of the world passportPatrick Katsaris
 
Passports and id cards
Passports and id cardsPassports and id cards
Passports and id cardsSwift Jason
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelEditor IJMTER
 
Forgery by Shukun Karthika
Forgery by Shukun KarthikaForgery by Shukun Karthika
Forgery by Shukun KarthikaShukun Karthika
 
Audio Codec
Audio CodecAudio Codec
Audio Codeclesleyw
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals pptjackkhush
 

Destaque (20)

FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...Passive techniques for detection of tampering in images by Surbhi Arora and S...
Passive techniques for detection of tampering in images by Surbhi Arora and S...
 
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
 
Audio authentication techniques
Audio authentication techniquesAudio authentication techniques
Audio authentication techniques
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
 
book
bookbook
book
 
Analysis of the world passport
Analysis of the world passportAnalysis of the world passport
Analysis of the world passport
 
Passports and id cards
Passports and id cardsPassports and id cards
Passports and id cards
 
Sign verification
Sign verificationSign verification
Sign verification
 
Digital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection ModelDigital Image Forgery Detection Using Improved Illumination Detection Model
Digital Image Forgery Detection Using Improved Illumination Detection Model
 
Forgery by Shukun Karthika
Forgery by Shukun KarthikaForgery by Shukun Karthika
Forgery by Shukun Karthika
 
Audio Codec
Audio CodecAudio Codec
Audio Codec
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Transfer of shares revn
Transfer of shares revnTransfer of shares revn
Transfer of shares revn
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 

Semelhante a Image forgery and security

Image Forgery In Cyber Crime
Image Forgery In Cyber CrimeImage Forgery In Cyber Crime
Image Forgery In Cyber CrimeSwapnil Bendale
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningIRJET Journal
 
Elucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentElucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentVIT-AP University
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...journalBEEI
 
Image Forgery In Cyber Crime
Image Forgery In Cyber CrimeImage Forgery In Cyber Crime
Image Forgery In Cyber CrimeSwapnil Bendale
 
Image Hosting Site Empowerment tech.pptx
Image Hosting Site Empowerment tech.pptxImage Hosting Site Empowerment tech.pptx
Image Hosting Site Empowerment tech.pptxMarkCesarVillanueva
 
How to Generate Thumbnail Images in Bulk
How to Generate Thumbnail Images in BulkHow to Generate Thumbnail Images in Bulk
How to Generate Thumbnail Images in Bulkmoshecary04
 
Laureate Online Education Internet and Multimedia Technolog.docx
Laureate Online Education    Internet and Multimedia Technolog.docxLaureate Online Education    Internet and Multimedia Technolog.docx
Laureate Online Education Internet and Multimedia Technolog.docxDIPESH30
 
Photo editing For Your Family History
Photo editing For Your Family HistoryPhoto editing For Your Family History
Photo editing For Your Family HistoryShelly Longoria
 
basicprinciplesofphotoediting-160730025324.pptx
basicprinciplesofphotoediting-160730025324.pptxbasicprinciplesofphotoediting-160730025324.pptx
basicprinciplesofphotoediting-160730025324.pptxClarinaBergante
 
Seeing is believing: why images hold the key to high impact communications
Seeing is believing: why images hold the key to high impact communications   Seeing is believing: why images hold the key to high impact communications
Seeing is believing: why images hold the key to high impact communications Helen McInnes
 
6 photo editing tips for website image optimization
6 photo editing tips for website image optimization6 photo editing tips for website image optimization
6 photo editing tips for website image optimizationClipping Path Specialist
 
Task 3 investigating animation techniques
Task 3 investigating animation techniquesTask 3 investigating animation techniques
Task 3 investigating animation techniquesBenT1990
 
Question 4 of A2 Media evaluation
Question 4 of A2 Media evaluationQuestion 4 of A2 Media evaluation
Question 4 of A2 Media evaluationLewisMarcelRoscoe
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technologyhadilasharif
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technologyhaverstockmedia
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technologyhaverstockmedia
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technologyhaverstockmedia
 
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics IJECEIAES
 
Photo Research
Photo ResearchPhoto Research
Photo ResearchWebmaster
 

Semelhante a Image forgery and security (20)

Image Forgery In Cyber Crime
Image Forgery In Cyber CrimeImage Forgery In Cyber Crime
Image Forgery In Cyber Crime
 
Digital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep LearningDigital Image Sham Detection Using Deep Learning
Digital Image Sham Detection Using Deep Learning
 
Elucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragmentElucidating Digital deception: Spot counterfeit fragment
Elucidating Digital deception: Spot counterfeit fragment
 
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
A New Copy Move Forgery Detection Technique using Adaptive Over-segementation...
 
Image Forgery In Cyber Crime
Image Forgery In Cyber CrimeImage Forgery In Cyber Crime
Image Forgery In Cyber Crime
 
Image Hosting Site Empowerment tech.pptx
Image Hosting Site Empowerment tech.pptxImage Hosting Site Empowerment tech.pptx
Image Hosting Site Empowerment tech.pptx
 
How to Generate Thumbnail Images in Bulk
How to Generate Thumbnail Images in BulkHow to Generate Thumbnail Images in Bulk
How to Generate Thumbnail Images in Bulk
 
Laureate Online Education Internet and Multimedia Technolog.docx
Laureate Online Education    Internet and Multimedia Technolog.docxLaureate Online Education    Internet and Multimedia Technolog.docx
Laureate Online Education Internet and Multimedia Technolog.docx
 
Photo editing For Your Family History
Photo editing For Your Family HistoryPhoto editing For Your Family History
Photo editing For Your Family History
 
basicprinciplesofphotoediting-160730025324.pptx
basicprinciplesofphotoediting-160730025324.pptxbasicprinciplesofphotoediting-160730025324.pptx
basicprinciplesofphotoediting-160730025324.pptx
 
Seeing is believing: why images hold the key to high impact communications
Seeing is believing: why images hold the key to high impact communications   Seeing is believing: why images hold the key to high impact communications
Seeing is believing: why images hold the key to high impact communications
 
6 photo editing tips for website image optimization
6 photo editing tips for website image optimization6 photo editing tips for website image optimization
6 photo editing tips for website image optimization
 
Task 3 investigating animation techniques
Task 3 investigating animation techniquesTask 3 investigating animation techniques
Task 3 investigating animation techniques
 
Question 4 of A2 Media evaluation
Question 4 of A2 Media evaluationQuestion 4 of A2 Media evaluation
Question 4 of A2 Media evaluation
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technology
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technology
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technology
 
Digital graphics technology
Digital graphics technologyDigital graphics technology
Digital graphics technology
 
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
 
Photo Research
Photo ResearchPhoto Research
Photo Research
 

Mais de أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

Mais de أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

Image forgery and security

  • 1. IMAGE FORGERY 1. DEFINITION AND HISTORY 2. TYPES OF IMAGE FORGERY A. IMAGE RETOUCHING B. IMAGE SPLICING C. COPY AND MOVE ATTACK
  • 2. Image Forgery is not new. History has recorded that it happens as early as the 1840s. Hippolyta Bayard, the first person to create a fake image as recorded by history, is famous for a picture of him committing suicide (see picture on the left). It all started as an act of frustration because he had lost the chance of becoming 'the inventor of photography' to Louis Daguerre. Daguerre patented a photography process earlier than him and owns all the glory [1].  Digital Image Forgery does not differ very much in nature compared to conventional Image Forgery. Instead of using photograph, digital image forgery deals with digital image. The process of creating fake image has been tremendously simple with the introduction of powerful computer graphics editing software such as Adobe Photoshop, GIMP, and Corel Paint Shop, some of which are available for free.  There are many cases of digital image forgery. All of these cases can be categorized into three major groups, based on the process involved in creating the fake image. The groups are Image Retouching, Image Splicing, and Copy-Move Attack.
  • 3.
  • 4. Image Retouching can be considered to be the less harmful kind of digital image forgery. Image retouching does not significantly change an image, but instead, enhances or reduces certain feature of an image (see picture below). This technique is popular among magazine photo editors. It can be said that almost all magazine cover would employ this technique to 'enhance' certain features of an image so that it is more attractive; ignoring the fact that such enhancement is ethically wrong.
  • 5.
  • 6. This technique is more aggressive than image retouching. Image Splicing is a technique that involves a composite of two or more images which are combined to create a fake image. In the picture below, 'the shark' is copied to the base image (helicopter rescue). The base image is first flipped horizontally before the shark is pasted to create a more convincing (and not to forget dramatic) picture of a helicopter rescue.
  • 7.
  • 8. Copy-move attack is more or less similar to Image Splicing in view of the fact that both techniques modify certain image region (of a base image), with another image. However, instead of having an external image as the source, copy-move attack uses portion of the original base image as its source. In other words, the source and the destination of the modified image originated from the same image. In a copy-move attack, parts of the original image is copied, moved to a desired location, and pasted. This is usually done in order to conceal certain details or to duplicate certain aspects of an image. Blurring is usually applied along the border of the modified region to reduce the effect of irregularities between the original and pasted region [2]. The picture below shows a sample image that has been tampered using copy-move attack (left) and its original (right). Notice a repeated smoke pattern on the left image.
  • 9.
  • 10. There are many ways in which you can secure your home and business against crime and avoid becoming another statistic.  Established in 1992 image security offers comprehensive range of sophisticated security products and security services to protect what means to you most .
  • 11. The Internet is a great way to show your photographs to the world. Putting images up on a web site is child’s play compared to hanging a gallery show or publishing a book. But what is to stop an unscrupulous web site visitor from stealing your images? In truth, all the images that are seen by your visitors are already copied and stored in their computer’s browser cache. But there are still effective, low cost ways of preventing their misuse.
  • 12. Adding Your Copyright as a Text Layer This is the easiest and most effective way to protect your images. Placing the copyright symbol and your name directly in an image tells everyone that your work is copyrighted. We recommend including your web site URL (or phone number if you don’t have your own web site) so anyone who prints out or copies your picture can easily find you in the future. This turns every copied image into an advertisement for you. Each graphics program handles text differently, but look for the Text Tool on the tool bar within your program. Use an easy to read font like Arial in a small point size. If your image has light and dark areas that make text hard to read you can select the area behind the text and reduce its contrast.
  • 13. Size and Compress Your Images Properly There are two benefits to this approach. Smaller images will reduce both the quality of a printout and will also speed page load time. Keep your image size to under 450 pixels on the long dimension. If anyone were to print it, it would either print small, or if forced to be a larger print the image will look pixilated (pixels will spread out). Next, compress your images until they just begin to show artifacts. This will help them load faster, and further reduce the chance they will be misused. We recommend using one of the side by side compression tools that give you a visual confirmation of how much you can compress the image before it starts to visually degrade. Photoshop's "Save For Web" (also available in Photoshop Elements) is our tool of choice.
  • 14. Image Slicing to protect your images Using your graphics program, you can slice your pictures into two or more slices. Right clicking and saving would only get the view the part of the picture that was clicked on. And the browsers cache will only have fragmented bits of images in it. The individual image parts, which are really separate, pictures loading into different cells within the same table, are joined in the HTML when viewing the image on the web. An added benefit of slicing is shorter load time when you optimize each slice individually. In a program like ImageReady (part of Photoshop 6), different parts of the same image can be optimized as Gif’s or Jpeg’s
  • 15. Mouseover image swap Another bit of JavaScript code can cause one image to replace another when the user’s mouse passes over it. The replacement image can include a warning about not copying your images. Table Background and Transparent GIF This is a bit more complex, but quite effective. First create a table exactly the same size as the image you want to protect. Next, set the image as the table background. Create a transparent GIF with a similar name and exactly the same pixel dimensions as the original image and insert it into the table. If someone tries to copy it by right clicking on it, all they get is the transparent GIF