SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 4 (July-Aug. 2012), PP 01-06
www.iosrjournals.org

Fraud and Tamper Detection in Authenticity Verification through
 Gradient Based Image Reconstruction Technique for Security
                          Systems
                                         1
                                          Sonal Sharma, 2Preeti Tuli
                              1, 2
                                     (Computer Science & Engineering, DIMAT,India)

 Abstract : Authenticity verification for security systems is a very important research problem with respect to
information security. One of the principal problems in image forensics is determining if a particular image is
authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like,
for example, in a court of law. Image editing software like Adobe Photoshop, Maya etc. and technically
advanced digital photography are used to edit, manipulate or tamper the images easily without living obvious
visual clues. The abusive use of digital forgeries has become a serious problem in various fields like authenticity
verification, medical imaging, digital forensic, journalism, scientific publications etc. To carry out such forensic
analysis, various technological instruments have been developed in the literature. In this paper the problem of
detecting if an image has been forged is investigated. To detect tampering and forging, a novel methodology
based on gradient based image reconstruction is proposed. Our method verifies the authenticity of image in two
phases- modeling phase; where the image is reconstructed from its gradients by solving a poisson equation and
forming a knowledge based model and simulation phase; where the absolute difference method and histogram
matching criterion between the original and test image is used. Such a method allows concluding that if a
tampering has occurred. Experimental results are presented to demonstrate the performance of our gradient-
based image reconstruction approach and confirm that the technique is able to verify whether a forged image is
presented to a security system for authenticity verification. Through this unique mechanism, one can secure the
most reliable information and forging or tampering of images for gaining false authentication and hence fraud
can be detected.
Keywords: Gradient, Poisson equation, Region of interest (ROI), Digital image forensics, Authenticity
verification.

                                             I.          INTRODUCTION
          In recent times most of the researchers are working on mechanisms adopted for information security,
because it is always of great concern for human kind. Digital crime and increasing fraud in security systems
along with constantly emerging software technologies, is growing at a very faster rate. By observing a digital
content as a digital clue, multimedia forensics aims to introduce novel methodologies to support clue analysis
and to provide an aid for making a decision about a crime. Multimedia forensics [1], [2], [3] deals with
developing technological instruments operating in the absence of watermarks [4], [5] or signatures inserted in
the image. In fact, different from digital watermarking, forensics means are defined as “passive” because they
can formulate an assessment on a digital document by resorting only to the digital asset itself. These techniques
basically allow the user to determine if particular content has been tampered with [6], [7] or which was the
acquisition device used [8], [9]. In particular, by focusing on the task of acquisition device identification, two
main aspects must be studied: the first is to understand which kind of device has generated a digital image (e.g.
a scanner, a digital camera or is a computer graphics product) [10], [11], while the second is to determine which
specific camera or scanner (by recognizing model and brand) acquired that specific content [8], [9].
          The other main multimedia forensics topic is image tampering detection [6] that is assessing the
authenticity of a digital image. Information integrity is fundamental in a trial, but it is clear that the advent of
digital pictures and relative ease of digital image processing today makes this authenticity uncertain. Modifying
a digital image to change the meaning of what is represented in it can be crucial when used in a court of law
where images are presented as basic evidence to influence the judgment. Furthermore, it is interesting, once
established that something has been manipulated, to understand exactly what happened: if an object or a person
has been covered, if a part of the image has been cloned, if something has been copied from another image, or if
a combination of these processes has been carried out. In this paper, this issue is investigated, and the proposed
method is able to detect that whether tampering has taken place.
          The rest of the paper is organized as follows: Section 2 reviews the problem formulation and solution
methodology. Section 3 presents the experimental results and outcomes. Section 4 deals with the conclusion and
future work.

                                                  www.iosrjournals.org                                     1 | Page
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image

                II.         PROBLEM FORMULATION AND SOLUTION METHODOLOGY
         The problem of fraud detection has been faced by proposing different approaches each of these based
on the same concept: a forgery introduces a correlation between the original image and the tampered one.
Several methods search for this dependence by analyzing the image and then applying a feature extraction
process. Reconstruction of the original test image has not been so far used for tamper detection.
         In [12] grayscale reconstruction has been formally defined for discrete images. Its authors have
underscored relations to binary reconstruction and morphological geodesic transformations. In [13] another
approach for image reconstruction from local phase vectors in the monogenic scale space is presented. In [14]
fan-beam image reconstruction algorithm is presented by the authors who reconstruct an image via filtering a
back projection image of differentiated projection data. In [15] a new method for the exact image reconstruction
from projections is proposed. The original image is projected into several view angles and the projection
samples are stored in an accumulator array. In [16] another novel approach is presented which consists first in
using an off-the-shelf image database to find patches visually similar to each region of interest of the unknown
input image, according to associated local descriptors which are then warped into input image domain according
to interest region geometry and seamlessly stitched together. Final completion of still missing texture-free
regions is obtained by smooth interpolation.
         None of these approaches [12, 13, 14, 15, and 16] conducts gradient maps in the image reconstruction.
The approach presented in this paper verifies the authentication in two phases: in phase one (modeling phase),
the image is reconstructed from the image gradients by solving a Poisson equation and in the phase two
(simulation phase) absolute difference method and histogram matching criterion between the original and test
image is used.

1.1        Poisson Image Reconstruction Using Image Gradients
           Image reconstruction from gradient fields is a very active research area. The gradient-based image
processing techniques and the poisson equation solving techniques have been addressed in several related areas
such as high dynamic range compression [17], Poisson image editing [18], image fusion for context
enhancement [19], interactive photomontage [20], Poisson image matting [21] and photography artifacts
removal [22].
           In our approach, a new criterion is developed, where the image is reconstructed from its gradients by
solving a poisson equation and hence used for authenticity verification.
In 2D, a modified gradient vector field:
 G’ = [G’x, G’y]                                                                                                (1)
may not be integrable.
Let I’ denote the image reconstructed from G’, we employ one of the direct methods recently proposed in [17]
to minimize:
 ||∇I’ – G ||                                                                                                   (2)
    so that:
 G ≈ ∇I’                                                                                                       (3)
By introducing a Laplacian and a divergence operator, I’ can be obtained by solving the Poisson differential
equation: [24, 25]
∇2I’ = div([G’x,G’y])                                                                                          (4)
           Since both the Laplacian and div are linear operators, approximating those using standard finite
differences yields a large system of linear equations. We use the full multigrid method [23] to solve the
Laplacian equation with Gaussian-Seidel smoothing iterations [25]. For solving the Poisson equation more
efficiently, an alternative is to use a rapid Poisson solver [25], which uses a sine transform based on the method
[24] to invert the Laplacian operator. However, the complexity with the rapid Poisson solver will be
O(n(log(n))). Therefore, the full multigrid method [23] is employed in our implementation. The image is zero-
padded on all sides to reconstruct the image
           .
1.2        Absolute Difference
           In the present work our approach is to find the absolute difference between the original and the
reconstructed image. Subtraction gives the difference between the two images, but the result may have a
negative sign and can be lost. The function that finds how different the two images are- regardless of the
arithmetic sign- is the absolute difference:
  N(x, y) = |O1(x, y) – O2(x, y)|                                                                               (5)
where, O1 (x, y) and O2(x, y) are pixels in the original images, |x| is the absolute difference operator, and N(x,
y) is the resultant new pixel. The absolute difference operator returns +x whether the argument is –x or +x.



                                             www.iosrjournals.org                                         2 | Page
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
1.3      Histogram Normalization
         Histogram is a graphical representation of the intensity distribution of an image. It quantifies the
number of pixels for each intensity value considered. Histogram Equalization is a method that improves the
contrast in an image, in order to stretch out the intensity range. Equalization implies mapping one distribution
(the given histogram) to another distribution (a wider and more uniform distribution of intensity values) so that
the intensity values are spread over the whole range.
To accomplish the equalization effect, the remapping should be the cumulative distribution function (CDF)
For the histogram H(i), its cumulative distribution H’(i) is:
H’(i) = Σ H(j), where 0 ≤ j < i                                                                               (6)
         To use this as a remapping function, we have to normalize H’(i) such that the maximum value is 255
or the maximum value for the intensity of the image ). Finally, we use a simple remapping procedure to obtain
the intensity values of the equalized image:
equalized(x, y) = H’(src(x,y))                                                                                (7)
         In our work first we perform the histogram normalization and then the histogram equalization criteria is
used where the normalized histogram values of the original and test image are utilized for matching the two
images. The proposed research work has two different phases: modeling phase and simulation phase. The
schematic workflow diagram for the modeling phase has been shown in the Fig. 1.




                        Figure 1: Schematic diagram for Modeling and Simulation Phase

          In the modeling phase, first an input image (IO) is enhanced and scaled for the removal of distortion
with loss-less information, and then the poisson image reconstruction from image gradients technique is applied
to obtain the reconstructed image(IO’). Now the absolute difference (AO) of the image and reconstructed image
is obtained and the results are stored in corpus for matching the test data. In the simulation phase, the model has
been utilized for simulating trained and test patterns. To summarize this simulation process first a test image (I T)
is studied with proper enhancement. In the enhancement stage removal of noise from the image has been carried
out and then it is reconstructed using the proposed reconstruction technique to obtain reconstructed image (I T’)
and then the absolute difference between IT and IT’ is calculated to obtain AT. (For a particular subject AO is
stored in the corpus which is retrieved during simulation phase for the comparison). Finally, A T is compared
with AO and the results are obtained which may allow or reject the subject and hence his authenticity
verification is completed.

2.4 Algorithm used
The methodology adopted in the present paper has been depicted below:
Algorithm 1: Modeling and Simulation of original and reconstructed image
Modeling phase
Step 1: Read an image (IO).
Step 2: Convert into grayscale image, say R.
(Enhancement stage)
Step 3: Perform Scaling on the image.
Step 4: Enhance the image using median filtering and convolution theorem (I O).
Step 5: Reconstruct the image using proposed methodology (IO’).
Step 6: Find the absolute difference between original and reconstructed image (AO).
Step 7: Store the original image, reconstructed image and absolute difference (IO, IO’, AO)
Simulation phase
Step 8: Input a test image (IT)
Step 9: Reconstruct IT to obtain IT’ and find the absolute difference (AT) between IT and IT’
Step 10: Compare AT and AO to find a match and hence allow or reject the subject accordingly.

                                              www.iosrjournals.org                                          3 | Page
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
A. Modeling and Simulating
          In the modeling phase, let IO be the original image of a subject which has to be modeled for the
formation of knowledge based corpus. After enhancing and proper scaling of the original image IO, the image is
poisson reconstructed from its gradients as:
IO’ = Poisson_reconstruction (IO)                                                                              (8)
Now the absolute difference between the original and reconstructed image is calculated as :
AO = Absolute_difference (IO, IO’)                                                                             (9)
          Now store the triplet (IO, IO’, AO) in the corpus so as to form the knowledge based model (corpus). The
equations (8) and (9) can be repeatedly used to register n number of subjects, and store their details for
authentication verification.
In the simulation phase, when the tampered or forged image will be presented to the security system for
authentication, the system will reconstruct the test image (I T) as:
IT’ = Poisson_reconstruction (IT)                                                                             (10)
 And then the absolute difference between the original test image (I T) and reconstructed test image (IT’) is
calculated as:
AT = Absolute_difference (IT, IT’)                                                                            (11)
Now the resultant AT is compared with AO (the absolute difference stored in corpus of the original and
reconstructed original image in modeling phase)
       If (AT == AO)
           “Authenticity Verified as TRUE!”
       Else
           “Authenticity Verified as FALSE!”
    Hence, the result will reject the subject due to a mismatch and the images obtained by forgery or tampering
for authenticity verification will be regarded as fake or invalid and any hidden data (for destroying the security
system or secret communication) will be clearly identified.

                            III.                      EXPERIMENTAL RESULTS AND OUTCOMES
          The solution methodology for the above stated problem is implemented using soft computing tools and
the experimental outcomes are shown in Fig. 2.
          As show in Fig. 2, the original image is passed through the modeling phase steps mentioned in
Algorithm 1 and the results are shown in Fig. 2 (2.1) to (2.6). Now the corpus contains the triplet (I O, IO’, AO)
for the registered subject’s original image.
                                                                                                                                    Image



                                                                                                           20                                                     200


                                                                                                           40

                                                                                                                                                                  150
                                                                                                           60


                                                                                                           80
                                                                                                                                                                  100

                                                                                                          100


                                                                                                          120                                                     50


                                                                                                          140
                                                                                                                                                                  0
                                                                                                                10   20   30   40    50     60   70   80   90




                (2.1)                                                 (2.2)                                                               (2.3)
                                      Reconstructed
                                                                              Absolute Difference of the original image and reconstructed image
                                                                      220
                 20                                                   200

                                                                      180
                 40
                                                                      160

                 60                                                   140

                                                                      120
                 80
                                                                      100

                 100                                                  80

                                                                      60
                 120
                                                                      40

                 140                                                  20


                       10   20   30   40   50    60   70   80   90



                                 (2.4)                                                                               (2.5)




                                                                 www.iosrjournals.org                                                                           4 | Page
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
                                        0.7


                                        0.6


                                        0.5


                                        0.4


                                        0.3


                                        0.2


                                        0.1


                                           0
                                               0        50       100    150     200      250           300



                                                    (2.6)
Figure 2: Results for modeling phase (Original Image): (2.1) Original Image (I O), (2.2) Grayscale Image, (2.3)
Enhanced and Scaled Image, (2.4) Reconstructed Image (IO’), (2.5) Absolute difference (AO) of IO and IO’,
(2.6) Normalized Histogram of absolute difference shown in (2.5).
                                                                                                                       Image
                                                                                                                                             220

                                                                                                  20                                         200

                                                                                                                                             180
                                                                                                  40
                                                                                                                                             160

                                                                                                  60                                         140

                                                                                                                                             120
                                                                                                  80
                                                                                                                                             100
                                                                                                 100
                                                                                                                                             80

                                                                                                 120                                         60

                                                                                                                                             40
                                                                                                 140
                                                                                                                                             20

                                                                                                 160
                                                                                                             20   40       60   80   100



                  (3.1)                                        (3.2)                                                    (3.3)
                           Reconstructed
                                                                                  Absolute Difference of the original image and reconstructed image
                                                                 220

           20                                                    200

                                                                 180
           40
                                                                 160

           60                                                    140

                                                                 120
           80
                                                                 100
           100
                                                                 80

           120                                                   60

                                                                 40
           140
                                                                 20

           160
                   20     40       60              80   100



                               (3.4)                                                                              (3.5)

                                        0.8


                                        0.7


                                        0.6


                                        0.5


                                        0.4


                                        0.3


                                        0.2


                                        0.1


                                           0
                                               0        50       100    150     200      250           300



                                                       (3.6)
Fig. 3: Results for simulation phase [Test (tampered) Image]: (3.1) Original Image (I T), (3.2) Grayscale Image,
(3.3) Enhanced and Scaled Image, (3.4) Reconstructed Image (IT’), (3.5) Absolute difference of I T and IT’,
(3.6) Normalized Histogram of absolute difference shown in (3.5).
         As shown in Fig. 3, the test image (tampered) is passed through the steps of simulation phase
mentioned in Algorithm 1and the results are shown in Fig. 3 (3.1) to (3.6). Next the histogram of absolute
difference obtained in Fig. 3 (3.6) is normalized and compared with the normalized histogram of original image
shown in Fig. 2 (2.6), and the so obtained result is inequality, since, the value of the difference is not zero and
                                                              www.iosrjournals.org                                                         5 | Page
Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image
comes to be 0.0049, and hence the image is declared as tampered and finally rejected. If the image was not
tampered then, the so obtained difference (between the normalized histogram of absolute difference of the test
image and reconstructed test image (Fig. 3.6) and the normalized histogram of absolute difference of the
original image and reconstructed original image (Fig. 2.6) would be 0.00
          In this manner the authenticity of the individual’s can be verified and the test images can be classified
as tampered (or forged) or original, and hence the tampering can be detected.

                                 IV.             CONCLUSION AND FURTHER WORK
          A novel gradient-based image reconstruction algorithm by solving poisson equation for detecting
image tampering in authenticity verification has been proposed in this paper. Our authenticity verification
approach is conducted in two phases. At first, the image is reconstructed from the gradients by solving a poisson
equation, and next normalized histogram criterion and absolute difference method is used to match the original
and test image. Experimental results demonstrate both the feasibility and the efficiency of our algorithm.

                                                          REFERENCES
[1]    S. Lyu and H. Farid, “How realistic is photorealistic?,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 845–850, 2005.
[2]    H. Farid, “Photo fakery and forensics,” Advances in Computers, vol. 77, pp. 1–55, 2009.
[3]    J. A. Redi, W. Taktak, and J. L. Dugelay, “Digital image forensics: a booklet for beginners,” Multimedia Tools and Applicatio ns,
       vol. 51, no. 1, pp. 133–162, 2011.
[4]    I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking. San Francisco, CA: Morgan Kaufmann, 2002.
[5]    M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel
       Dekker, 2004.
[6]    H. Farid, “A survey of image forgery detection,” IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 16–25, 2009.
[7]    A. Popescu and H. Farid, “Statistical tools for digital forensics,” in Proc of Int.’l Workshop on Information Hiding, Toronto ,
       Canada, 2005.
[8]    A. Swaminathan, M. Wu, and K. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Transactions on Information
       Forensics and Security, vol. 3, no. 1, pp. 101–117, 2008.
[9]    M. Chen, J. Fridrich, M. Goljan, and J. Lukas, “Determining image origin and integrity using sensor noise,” IEEE Transactions on
       Information Forensics and Security, vol. 3, no. 1, pp. 74–90, 2008.
[10]   N. Khanna, G. T.-C. Chiu, J. P. Allebach, and E. J. Delp, “Forensic techniques for classifying scanner, computer generated and
       digital camera images,” in Proc. of IEEE ICASSP, Las Vegas, USA, 2008.
[11]   R. Caldelli, I. Amerini, and F. Picchioni, “A DFT-based analysis to discern between camera and scanned images,” International
       Journal of Digital Crime and Forensics, vol. 2, no. 1, pp. 21–29, 2010.
[12]   Luc Vincent, “Morphological Grayscale Reconstruction in Image Analysis: Applications and Efficient Algorithms” IEEE
       Transactions on Image Processing, vol. 2, no. 2, 1993.
[13]   Di Zang and G. Sommer, “Phase Based Image Reconstruction in the Monogenic Scale Space” DAGM-Symposium, 2004.
[14]   S. Leng, T. Zhuang, B. Nett and Guang-Hong Chen, “Exact fan-beam image reconstruction algorithm for truncated projection data
       acquired from an asymmetric half-size detector” Phys. Med. Biol. 50 (2005) 1805–1820.
[15]   A. L. Kesidis, N. Papamarkos, “Exact image reconstruction from a limited number of projections” J. Vis. Commun. Image R. 19
       (2008) 285–298.
[16]   P. Weinzaepfel, H. Jegou, P. Perez, “Reconstructing an image from its local descriptors ” Computer Vision and Pattern Recognition
       (2011).
[17]   R. Fatta, D. Lischinski, M. Werman, “Gradient domain high dynamic range compression” ACM Transactions on Graphics
       2002;21(3):249-256.
[18]   P. P´erez ,M. Gangnet , A. Blake, “ Poisson image editing” ACM Transactions on Graphics 2003;22(3):313-318.
[19]   R. Raskar, A. Ilie , J.Yu, “ Image fusion for context enhancement and video surrealism”, In: Proceedings of Non-Photorealistic
       Animation and Rendering ’04, France, 2004. p. 85-95.
[20]   A. Agarwala , M. Dontcheva, M. Agrawala , S. Drucker, A.Colburn, B. Curless, D Salesin , M. Cohen M, “ Interactive digital
       photomontage. ACM Transactions on Graphics” 2004;23(3):294-302.
[21]   J. Sun, J. Jia, CK. Tang , HY Shum , “Poisson matting. ACM Transactions on Graphics” 2004;23(3):315-321.
[22]   A. Agrawal , R. Raskar, SK. Nayar , Y. Li, “Removing flash artifacts using gradient analysis” ACM Transactions on Graphics
       2005;24(3):828-835.
[23]   W. Press, S. Teukolsky, W. Vetterling, B. Flannery “Numerical Recipes in C: The Art of Scientific Computing” Cambridge
       University Press; 1992.
[24]   R. Raskar, K. Tan, R. Feris , J. Yu, M. Turk “Non-photorealistic camera: depth edge detection and stylized rendering using multi-
       flash imaging” ACM Transactions on Graphics 2004;23(3):679-688.
[25]   J. Shen, X. Jin, C. Zhou, Charlie C. L. Wang, “Gradient based image completion by solving the Poisson equation,” PCM’05
       Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing – Volume Part I 257-268




                                                     www.iosrjournals.org                                                       6 | Page

Más contenido relacionado

La actualidad más candente

La actualidad más candente (15)

AUTOMATED IMAGE MOSAICING SYSTEM WITH ANALYSIS OVER VARIOUS IMAGE NOISE
AUTOMATED IMAGE MOSAICING SYSTEM WITH ANALYSIS OVER VARIOUS IMAGE NOISEAUTOMATED IMAGE MOSAICING SYSTEM WITH ANALYSIS OVER VARIOUS IMAGE NOISE
AUTOMATED IMAGE MOSAICING SYSTEM WITH ANALYSIS OVER VARIOUS IMAGE NOISE
 
B42020710
B42020710B42020710
B42020710
 
G031201042047
G031201042047G031201042047
G031201042047
 
Perceptual Weights Based On Local Energy For Image Quality Assessment
Perceptual Weights Based On Local Energy For Image Quality AssessmentPerceptual Weights Based On Local Energy For Image Quality Assessment
Perceptual Weights Based On Local Energy For Image Quality Assessment
 
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic AlgorithmSecret-Fragment Visible Mosaic Images by Genetic Algorithm
Secret-Fragment Visible Mosaic Images by Genetic Algorithm
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancement
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
IRJET- Design and Implementation of ATM Security System using Vibration Senso...
IRJET- Design and Implementation of ATM Security System using Vibration Senso...IRJET- Design and Implementation of ATM Security System using Vibration Senso...
IRJET- Design and Implementation of ATM Security System using Vibration Senso...
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
 
An artificial neural network approach for detecting skin cancer
An artificial neural network approach for detecting skin cancerAn artificial neural network approach for detecting skin cancer
An artificial neural network approach for detecting skin cancer
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
 
8. 10179 13825-1-ed edit iqbal
8. 10179 13825-1-ed edit iqbal8. 10179 13825-1-ed edit iqbal
8. 10179 13825-1-ed edit iqbal
 
Study of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV ModelStudy of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV Model
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
A Fuzzy Set Approach for Edge Detection
A Fuzzy Set Approach for Edge DetectionA Fuzzy Set Approach for Edge Detection
A Fuzzy Set Approach for Edge Detection
 

Similar a A0340106

General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
sipij
 

Similar a A0340106 (20)

Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...
Fraud and Tamper Detection in Authenticity Verification through  Gradient Bas...Fraud and Tamper Detection in Authenticity Verification through  Gradient Bas...
Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSEXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONS
 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
 
G010245056
G010245056G010245056
G010245056
 
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
 
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGESTHE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
 
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
 
General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...General Purpose Image Tampering Detection using Convolutional Neural Network ...
General Purpose Image Tampering Detection using Convolutional Neural Network ...
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective Background
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learning
 
Intel ILS: Enhancing Photorealism Enhancement
Intel ILS: Enhancing Photorealism EnhancementIntel ILS: Enhancing Photorealism Enhancement
Intel ILS: Enhancing Photorealism Enhancement
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 
A simplified and novel technique to retrieve color images from hand-drawn sk...
A simplified and novel technique to retrieve color images from  hand-drawn sk...A simplified and novel technique to retrieve color images from  hand-drawn sk...
A simplified and novel technique to retrieve color images from hand-drawn sk...
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set Method
 
A Study of Image Tampering Detection
A Study of Image Tampering DetectionA Study of Image Tampering Detection
A Study of Image Tampering Detection
 
Review on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for ImagesReview on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for Images
 

Más de iosrjournals (20)

I0114549
I0114549I0114549
I0114549
 
H0124246
H0124246H0124246
H0124246
 
H0114044
H0114044H0114044
H0114044
 
G0145458
G0145458G0145458
G0145458
 
G0135059
G0135059G0135059
G0135059
 
G0123541
G0123541G0123541
G0123541
 
G0113839
G0113839G0113839
G0113839
 
F0144153
F0144153F0144153
F0144153
 
F0134249
F0134249F0134249
F0134249
 
F0122934
F0122934F0122934
F0122934
 
F0112937
F0112937F0112937
F0112937
 
E0143640
E0143640E0143640
E0143640
 
E0133641
E0133641E0133641
E0133641
 
E0112128
E0112128E0112128
E0112128
 
D0142635
D0142635D0142635
D0142635
 
D0133235
D0133235D0133235
D0133235
 
D0121720
D0121720D0121720
D0121720
 
D0111420
D0111420D0111420
D0111420
 
C0141625
C0141625C0141625
C0141625
 
C0132131
C0132131C0132131
C0132131
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

A0340106

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 4 (July-Aug. 2012), PP 01-06 www.iosrjournals.org Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems 1 Sonal Sharma, 2Preeti Tuli 1, 2 (Computer Science & Engineering, DIMAT,India) Abstract : Authenticity verification for security systems is a very important research problem with respect to information security. One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. Image editing software like Adobe Photoshop, Maya etc. and technically advanced digital photography are used to edit, manipulate or tamper the images easily without living obvious visual clues. The abusive use of digital forgeries has become a serious problem in various fields like authenticity verification, medical imaging, digital forensic, journalism, scientific publications etc. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper the problem of detecting if an image has been forged is investigated. To detect tampering and forging, a novel methodology based on gradient based image reconstruction is proposed. Our method verifies the authenticity of image in two phases- modeling phase; where the image is reconstructed from its gradients by solving a poisson equation and forming a knowledge based model and simulation phase; where the absolute difference method and histogram matching criterion between the original and test image is used. Such a method allows concluding that if a tampering has occurred. Experimental results are presented to demonstrate the performance of our gradient- based image reconstruction approach and confirm that the technique is able to verify whether a forged image is presented to a security system for authenticity verification. Through this unique mechanism, one can secure the most reliable information and forging or tampering of images for gaining false authentication and hence fraud can be detected. Keywords: Gradient, Poisson equation, Region of interest (ROI), Digital image forensics, Authenticity verification. I. INTRODUCTION In recent times most of the researchers are working on mechanisms adopted for information security, because it is always of great concern for human kind. Digital crime and increasing fraud in security systems along with constantly emerging software technologies, is growing at a very faster rate. By observing a digital content as a digital clue, multimedia forensics aims to introduce novel methodologies to support clue analysis and to provide an aid for making a decision about a crime. Multimedia forensics [1], [2], [3] deals with developing technological instruments operating in the absence of watermarks [4], [5] or signatures inserted in the image. In fact, different from digital watermarking, forensics means are defined as “passive” because they can formulate an assessment on a digital document by resorting only to the digital asset itself. These techniques basically allow the user to determine if particular content has been tampered with [6], [7] or which was the acquisition device used [8], [9]. In particular, by focusing on the task of acquisition device identification, two main aspects must be studied: the first is to understand which kind of device has generated a digital image (e.g. a scanner, a digital camera or is a computer graphics product) [10], [11], while the second is to determine which specific camera or scanner (by recognizing model and brand) acquired that specific content [8], [9]. The other main multimedia forensics topic is image tampering detection [6] that is assessing the authenticity of a digital image. Information integrity is fundamental in a trial, but it is clear that the advent of digital pictures and relative ease of digital image processing today makes this authenticity uncertain. Modifying a digital image to change the meaning of what is represented in it can be crucial when used in a court of law where images are presented as basic evidence to influence the judgment. Furthermore, it is interesting, once established that something has been manipulated, to understand exactly what happened: if an object or a person has been covered, if a part of the image has been cloned, if something has been copied from another image, or if a combination of these processes has been carried out. In this paper, this issue is investigated, and the proposed method is able to detect that whether tampering has taken place. The rest of the paper is organized as follows: Section 2 reviews the problem formulation and solution methodology. Section 3 presents the experimental results and outcomes. Section 4 deals with the conclusion and future work. www.iosrjournals.org 1 | Page
  • 2. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image II. PROBLEM FORMULATION AND SOLUTION METHODOLOGY The problem of fraud detection has been faced by proposing different approaches each of these based on the same concept: a forgery introduces a correlation between the original image and the tampered one. Several methods search for this dependence by analyzing the image and then applying a feature extraction process. Reconstruction of the original test image has not been so far used for tamper detection. In [12] grayscale reconstruction has been formally defined for discrete images. Its authors have underscored relations to binary reconstruction and morphological geodesic transformations. In [13] another approach for image reconstruction from local phase vectors in the monogenic scale space is presented. In [14] fan-beam image reconstruction algorithm is presented by the authors who reconstruct an image via filtering a back projection image of differentiated projection data. In [15] a new method for the exact image reconstruction from projections is proposed. The original image is projected into several view angles and the projection samples are stored in an accumulator array. In [16] another novel approach is presented which consists first in using an off-the-shelf image database to find patches visually similar to each region of interest of the unknown input image, according to associated local descriptors which are then warped into input image domain according to interest region geometry and seamlessly stitched together. Final completion of still missing texture-free regions is obtained by smooth interpolation. None of these approaches [12, 13, 14, 15, and 16] conducts gradient maps in the image reconstruction. The approach presented in this paper verifies the authentication in two phases: in phase one (modeling phase), the image is reconstructed from the image gradients by solving a Poisson equation and in the phase two (simulation phase) absolute difference method and histogram matching criterion between the original and test image is used. 1.1 Poisson Image Reconstruction Using Image Gradients Image reconstruction from gradient fields is a very active research area. The gradient-based image processing techniques and the poisson equation solving techniques have been addressed in several related areas such as high dynamic range compression [17], Poisson image editing [18], image fusion for context enhancement [19], interactive photomontage [20], Poisson image matting [21] and photography artifacts removal [22]. In our approach, a new criterion is developed, where the image is reconstructed from its gradients by solving a poisson equation and hence used for authenticity verification. In 2D, a modified gradient vector field: G’ = [G’x, G’y] (1) may not be integrable. Let I’ denote the image reconstructed from G’, we employ one of the direct methods recently proposed in [17] to minimize: ||∇I’ – G || (2) so that: G ≈ ∇I’ (3) By introducing a Laplacian and a divergence operator, I’ can be obtained by solving the Poisson differential equation: [24, 25] ∇2I’ = div([G’x,G’y]) (4) Since both the Laplacian and div are linear operators, approximating those using standard finite differences yields a large system of linear equations. We use the full multigrid method [23] to solve the Laplacian equation with Gaussian-Seidel smoothing iterations [25]. For solving the Poisson equation more efficiently, an alternative is to use a rapid Poisson solver [25], which uses a sine transform based on the method [24] to invert the Laplacian operator. However, the complexity with the rapid Poisson solver will be O(n(log(n))). Therefore, the full multigrid method [23] is employed in our implementation. The image is zero- padded on all sides to reconstruct the image . 1.2 Absolute Difference In the present work our approach is to find the absolute difference between the original and the reconstructed image. Subtraction gives the difference between the two images, but the result may have a negative sign and can be lost. The function that finds how different the two images are- regardless of the arithmetic sign- is the absolute difference: N(x, y) = |O1(x, y) – O2(x, y)| (5) where, O1 (x, y) and O2(x, y) are pixels in the original images, |x| is the absolute difference operator, and N(x, y) is the resultant new pixel. The absolute difference operator returns +x whether the argument is –x or +x. www.iosrjournals.org 2 | Page
  • 3. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image 1.3 Histogram Normalization Histogram is a graphical representation of the intensity distribution of an image. It quantifies the number of pixels for each intensity value considered. Histogram Equalization is a method that improves the contrast in an image, in order to stretch out the intensity range. Equalization implies mapping one distribution (the given histogram) to another distribution (a wider and more uniform distribution of intensity values) so that the intensity values are spread over the whole range. To accomplish the equalization effect, the remapping should be the cumulative distribution function (CDF) For the histogram H(i), its cumulative distribution H’(i) is: H’(i) = Σ H(j), where 0 ≤ j < i (6) To use this as a remapping function, we have to normalize H’(i) such that the maximum value is 255 or the maximum value for the intensity of the image ). Finally, we use a simple remapping procedure to obtain the intensity values of the equalized image: equalized(x, y) = H’(src(x,y)) (7) In our work first we perform the histogram normalization and then the histogram equalization criteria is used where the normalized histogram values of the original and test image are utilized for matching the two images. The proposed research work has two different phases: modeling phase and simulation phase. The schematic workflow diagram for the modeling phase has been shown in the Fig. 1. Figure 1: Schematic diagram for Modeling and Simulation Phase In the modeling phase, first an input image (IO) is enhanced and scaled for the removal of distortion with loss-less information, and then the poisson image reconstruction from image gradients technique is applied to obtain the reconstructed image(IO’). Now the absolute difference (AO) of the image and reconstructed image is obtained and the results are stored in corpus for matching the test data. In the simulation phase, the model has been utilized for simulating trained and test patterns. To summarize this simulation process first a test image (I T) is studied with proper enhancement. In the enhancement stage removal of noise from the image has been carried out and then it is reconstructed using the proposed reconstruction technique to obtain reconstructed image (I T’) and then the absolute difference between IT and IT’ is calculated to obtain AT. (For a particular subject AO is stored in the corpus which is retrieved during simulation phase for the comparison). Finally, A T is compared with AO and the results are obtained which may allow or reject the subject and hence his authenticity verification is completed. 2.4 Algorithm used The methodology adopted in the present paper has been depicted below: Algorithm 1: Modeling and Simulation of original and reconstructed image Modeling phase Step 1: Read an image (IO). Step 2: Convert into grayscale image, say R. (Enhancement stage) Step 3: Perform Scaling on the image. Step 4: Enhance the image using median filtering and convolution theorem (I O). Step 5: Reconstruct the image using proposed methodology (IO’). Step 6: Find the absolute difference between original and reconstructed image (AO). Step 7: Store the original image, reconstructed image and absolute difference (IO, IO’, AO) Simulation phase Step 8: Input a test image (IT) Step 9: Reconstruct IT to obtain IT’ and find the absolute difference (AT) between IT and IT’ Step 10: Compare AT and AO to find a match and hence allow or reject the subject accordingly. www.iosrjournals.org 3 | Page
  • 4. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image A. Modeling and Simulating In the modeling phase, let IO be the original image of a subject which has to be modeled for the formation of knowledge based corpus. After enhancing and proper scaling of the original image IO, the image is poisson reconstructed from its gradients as: IO’ = Poisson_reconstruction (IO) (8) Now the absolute difference between the original and reconstructed image is calculated as : AO = Absolute_difference (IO, IO’) (9) Now store the triplet (IO, IO’, AO) in the corpus so as to form the knowledge based model (corpus). The equations (8) and (9) can be repeatedly used to register n number of subjects, and store their details for authentication verification. In the simulation phase, when the tampered or forged image will be presented to the security system for authentication, the system will reconstruct the test image (I T) as: IT’ = Poisson_reconstruction (IT) (10) And then the absolute difference between the original test image (I T) and reconstructed test image (IT’) is calculated as: AT = Absolute_difference (IT, IT’) (11) Now the resultant AT is compared with AO (the absolute difference stored in corpus of the original and reconstructed original image in modeling phase) If (AT == AO) “Authenticity Verified as TRUE!” Else “Authenticity Verified as FALSE!” Hence, the result will reject the subject due to a mismatch and the images obtained by forgery or tampering for authenticity verification will be regarded as fake or invalid and any hidden data (for destroying the security system or secret communication) will be clearly identified. III. EXPERIMENTAL RESULTS AND OUTCOMES The solution methodology for the above stated problem is implemented using soft computing tools and the experimental outcomes are shown in Fig. 2. As show in Fig. 2, the original image is passed through the modeling phase steps mentioned in Algorithm 1 and the results are shown in Fig. 2 (2.1) to (2.6). Now the corpus contains the triplet (I O, IO’, AO) for the registered subject’s original image. Image 20 200 40 150 60 80 100 100 120 50 140 0 10 20 30 40 50 60 70 80 90 (2.1) (2.2) (2.3) Reconstructed Absolute Difference of the original image and reconstructed image 220 20 200 180 40 160 60 140 120 80 100 100 80 60 120 40 140 20 10 20 30 40 50 60 70 80 90 (2.4) (2.5) www.iosrjournals.org 4 | Page
  • 5. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 50 100 150 200 250 300 (2.6) Figure 2: Results for modeling phase (Original Image): (2.1) Original Image (I O), (2.2) Grayscale Image, (2.3) Enhanced and Scaled Image, (2.4) Reconstructed Image (IO’), (2.5) Absolute difference (AO) of IO and IO’, (2.6) Normalized Histogram of absolute difference shown in (2.5). Image 220 20 200 180 40 160 60 140 120 80 100 100 80 120 60 40 140 20 160 20 40 60 80 100 (3.1) (3.2) (3.3) Reconstructed Absolute Difference of the original image and reconstructed image 220 20 200 180 40 160 60 140 120 80 100 100 80 120 60 40 140 20 160 20 40 60 80 100 (3.4) (3.5) 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 50 100 150 200 250 300 (3.6) Fig. 3: Results for simulation phase [Test (tampered) Image]: (3.1) Original Image (I T), (3.2) Grayscale Image, (3.3) Enhanced and Scaled Image, (3.4) Reconstructed Image (IT’), (3.5) Absolute difference of I T and IT’, (3.6) Normalized Histogram of absolute difference shown in (3.5). As shown in Fig. 3, the test image (tampered) is passed through the steps of simulation phase mentioned in Algorithm 1and the results are shown in Fig. 3 (3.1) to (3.6). Next the histogram of absolute difference obtained in Fig. 3 (3.6) is normalized and compared with the normalized histogram of original image shown in Fig. 2 (2.6), and the so obtained result is inequality, since, the value of the difference is not zero and www.iosrjournals.org 5 | Page
  • 6. Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image comes to be 0.0049, and hence the image is declared as tampered and finally rejected. If the image was not tampered then, the so obtained difference (between the normalized histogram of absolute difference of the test image and reconstructed test image (Fig. 3.6) and the normalized histogram of absolute difference of the original image and reconstructed original image (Fig. 2.6) would be 0.00 In this manner the authenticity of the individual’s can be verified and the test images can be classified as tampered (or forged) or original, and hence the tampering can be detected. IV. CONCLUSION AND FURTHER WORK A novel gradient-based image reconstruction algorithm by solving poisson equation for detecting image tampering in authenticity verification has been proposed in this paper. Our authenticity verification approach is conducted in two phases. At first, the image is reconstructed from the gradients by solving a poisson equation, and next normalized histogram criterion and absolute difference method is used to match the original and test image. Experimental results demonstrate both the feasibility and the efficiency of our algorithm. REFERENCES [1] S. Lyu and H. Farid, “How realistic is photorealistic?,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 845–850, 2005. [2] H. Farid, “Photo fakery and forensics,” Advances in Computers, vol. 77, pp. 1–55, 2009. [3] J. A. Redi, W. Taktak, and J. L. Dugelay, “Digital image forensics: a booklet for beginners,” Multimedia Tools and Applicatio ns, vol. 51, no. 1, pp. 133–162, 2011. [4] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital watermarking. San Francisco, CA: Morgan Kaufmann, 2002. [5] M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker, 2004. [6] H. Farid, “A survey of image forgery detection,” IEEE Signal Processing Magazine, vol. 2, no. 26, pp. 16–25, 2009. [7] A. Popescu and H. Farid, “Statistical tools for digital forensics,” in Proc of Int.’l Workshop on Information Hiding, Toronto , Canada, 2005. [8] A. Swaminathan, M. Wu, and K. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101–117, 2008. [9] M. Chen, J. Fridrich, M. Goljan, and J. Lukas, “Determining image origin and integrity using sensor noise,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74–90, 2008. [10] N. Khanna, G. T.-C. Chiu, J. P. Allebach, and E. J. Delp, “Forensic techniques for classifying scanner, computer generated and digital camera images,” in Proc. of IEEE ICASSP, Las Vegas, USA, 2008. [11] R. Caldelli, I. Amerini, and F. Picchioni, “A DFT-based analysis to discern between camera and scanned images,” International Journal of Digital Crime and Forensics, vol. 2, no. 1, pp. 21–29, 2010. [12] Luc Vincent, “Morphological Grayscale Reconstruction in Image Analysis: Applications and Efficient Algorithms” IEEE Transactions on Image Processing, vol. 2, no. 2, 1993. [13] Di Zang and G. Sommer, “Phase Based Image Reconstruction in the Monogenic Scale Space” DAGM-Symposium, 2004. [14] S. Leng, T. Zhuang, B. Nett and Guang-Hong Chen, “Exact fan-beam image reconstruction algorithm for truncated projection data acquired from an asymmetric half-size detector” Phys. Med. Biol. 50 (2005) 1805–1820. [15] A. L. Kesidis, N. Papamarkos, “Exact image reconstruction from a limited number of projections” J. Vis. Commun. Image R. 19 (2008) 285–298. [16] P. Weinzaepfel, H. Jegou, P. Perez, “Reconstructing an image from its local descriptors ” Computer Vision and Pattern Recognition (2011). [17] R. Fatta, D. Lischinski, M. Werman, “Gradient domain high dynamic range compression” ACM Transactions on Graphics 2002;21(3):249-256. [18] P. P´erez ,M. Gangnet , A. Blake, “ Poisson image editing” ACM Transactions on Graphics 2003;22(3):313-318. [19] R. Raskar, A. Ilie , J.Yu, “ Image fusion for context enhancement and video surrealism”, In: Proceedings of Non-Photorealistic Animation and Rendering ’04, France, 2004. p. 85-95. [20] A. Agarwala , M. Dontcheva, M. Agrawala , S. Drucker, A.Colburn, B. Curless, D Salesin , M. Cohen M, “ Interactive digital photomontage. ACM Transactions on Graphics” 2004;23(3):294-302. [21] J. Sun, J. Jia, CK. Tang , HY Shum , “Poisson matting. ACM Transactions on Graphics” 2004;23(3):315-321. [22] A. Agrawal , R. Raskar, SK. Nayar , Y. Li, “Removing flash artifacts using gradient analysis” ACM Transactions on Graphics 2005;24(3):828-835. [23] W. Press, S. Teukolsky, W. Vetterling, B. Flannery “Numerical Recipes in C: The Art of Scientific Computing” Cambridge University Press; 1992. [24] R. Raskar, K. Tan, R. Feris , J. Yu, M. Turk “Non-photorealistic camera: depth edge detection and stylized rendering using multi- flash imaging” ACM Transactions on Graphics 2004;23(3):679-688. [25] J. Shen, X. Jin, C. Zhou, Charlie C. L. Wang, “Gradient based image completion by solving the Poisson equation,” PCM’05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing – Volume Part I 257-268 www.iosrjournals.org 6 | Page