Mini Review Volume 5 Issue 4
1Shri Ram Murti Smarak College of Engineering & Technology, India
2Deptartment of Computer Engineering, Jawaharlal Nehru University, India
Correspondence: Satish Chand, Department of Computer Engineering, Netaji Subhas Institute of Technology, New Delhi, India
Received: July 29, 2017 | Published: September 27, 2017
Citation: Agarwal S, Chand S (2017) Digital Image Forensic: A Brief Review. Forensic Res Criminol Int J 5(4): 00161. DOI: 10.15406/frcij.2017.05.00161
“A picture is worth a thousand words” ancient idiom is more relevant in this era. Digital images are most popular representation of information sharing. This popularity creates an opportunity for the researchers to ensure trustworthiness of images. The forensic analysis of an image is performed using various techniques to ensure its credibility. Several anti-forensic techniques have also been evolved to hide the traces of forgery. This is like virus and antivirus battle.
In this era of digitalization, everyone is surrounded by digital contents like digital image, digital video through their electronic gadgets. Latest technologies have reduced the cost of camera radically that promote camera-enabled devices like mobile phones, tablets, laptops, etc. People are uploading approximately 24300 images per minute. In most of the cases, these contents are making life easy in some sense. This digital era is also providing high quality image editing applications/softwares that can make changes in images and videos easily. The motivation of these changes may possibly be used to create some rumor, which can influence political, corporate, legal, and personal issues. This demands forensic analysis of images to prove their originality. Previously, when the source is confirmed, the image integrity can be authenticated using digital signature or digital watermark and it is generally called active forensic analysis. Most of the time, the source of an image is unknown, i.e., only the image itself is available to analyze. This type of forensic analysis is called blind or passive. In current scenario, the techniques based on passive forensic analysis are more relevant. In this review article, we emphasis on passive forensic analysis techniques.1–11 and their challenges.
Generally, two types of fake images are created, i.e., using splicing and copy move. In splicing, two or more different images are used to create a fake image and in copy move, some image content of same image is used to create a fake image. While creating realistic looking fake images, various operations are performed like resampling, contrast enhancement, median filtering, etc. Forensic analysis of these operations also helps detecting forgery. In spite of that, various anti-forensics techniques.12-15 have been developed to hide the artifacts of forgery. Image forgery can be detected using various phenomena. The authors in.1,2 have used lighting effects to find the traces of forgery. In.1, the optimized 3-D lighting estimation based on surface reflection model has been discussed to detect splicing of human faces.
The texture operator is the popular choice for detecting forgery.3 As forged image is created, the internal statistics of the image get disturbed due to boundary modification or different operations. The high discriminative capability of texture operators helps revealing internal statistical properties of the images. Color/illumination map based techniques assume that the external objects illumination is different from the pristine image objects in a fake image. The technique.4 is a hybrid form of illumination map and texture operator. Some techniques exploit hardware limitations like chromatic aberration, CFA artifact, sensor noise, etc to detect forgery. The chromatic aberration is the malfunction to focus light of different wavelengths perfectly of an optical system. This irregularity helps the forensic analysis.16 of images. To reduce cost using single sensor and Color Filter Array (CFA) three basic colors: red, green and blue, are generated. Every model of camera has special CFA pattern and interpolation method, these uniqueness help image forensic analysis.5,6 Each image has some artifacts due to their capturing device, which is considered as hardware noise. The forged part in an image can be found by Photo-Response Non-Uniformity (PRNU) noise of the camera.7-9 A variety of PRNU noise confirms image forgery. The JPEG is one of the popular encoding techniques to achieve desired quality in reduced storage need.
The camera manufacturers configure their devices in a way to balance quality and compression. The splicing of two different images generate anomaly in quality that help in forgery detection. Sometimes the image needs be saved two times to create forged image that creates double quantization artifact in the histogram of DCT coefficients and the block synchronization gets disturbed. These artifacts help detecting forgery easily.10,11 As we have discussed above, various techniques are available for image forensic analysis. These techniques are somehow based on shortcomings of the forged image creation process. To hide the traces of forgery, some methods have been developed that are called anti-forensic methods.12-15 These methods hide the traces by using noise insertion, resampling, median filtering, etc. on the forged images. To counter anti-forensics, various techniques.17-19 are also available in which the median filtering detection is difficult due to its nonlinear nature. The techniques.18,19 are based on Markov process provide good results. There is lot of challenges in forensic analysis of digital images. As we can see, there is continuous battle between forensic, anti-forensic and counter anti-forensic techniques. New techniques are evolving day-by-day to hide the artifacts of forgery. Latest technology based camera are also making forensic analysis difficult. In spite of that, the forged images are being created using automated content-aware, seam carving type techniques. The wide applications of digital images have compelled the research community to develop universal robust forensic techniques.
None.
None.
The author declares there is no conflicts of interest.
©2017 Agarwal, et al. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.