SlideShare a Scribd company logo
Image Forgery In Cyber Crime
1 | P a g e
A
Seminar Report
on
“IMAGE FORGERY IN CYBER CRIME”
Submitted to North Maharashtra University, Jalgaon in Partial Fulfillment of the
Requirements for the Degree of Third Year in Computer Engineering.
Submitted By
Swapnil Govardhan Bendale
Guide
Prof. Y.V.Kolhe
DEPARTMENT OF COMPUTER ENGINEERING
J.T.MAHAJAN COLLEGE OF ENGINEERING,FAIZPUR
Academic Year : 2016-17
Image Forgery In Cyber Crime
2 | P a g e
INDEX
Sr No. Contents Page No.
1 Forgery 2
2 Image forgery And its history 3
3 Examples of Image Forgery 4
4 Applications Of Image Forgery. 12
5 Need for detection of Image Forgery. 15
6 Types Of Image Forgery. 17
7 Image Security & Steps to protect your image 20
8 Forgery Detection Algorithms 22
9 References 25
Image Forgery In Cyber Crime
3 | P a g e
Forgery
“Forgery” is a subjective word
An image can become a forgery based upon the context in which it is used,an image
altered for fun or someone who has taken an bad photo, but has been altered to improve its
appearance cannot be considered a forgery even though it has been altered from its original
capture.The other side of forgery are those who perpetuate a forgery for gain and prestige –
they create an image in which to dupe the recipient into believing the image is real and from
this be able to gain payment and fame.
Three type of forgery can be identified:
1) An image that is created using graphical software
2) An image where the content has been altered
3) An image where the context has been altered
Using graphical software is one method in which a forged image can be created.It needs
the creator to especially skilful in ensuring that the image they are creating is realistic, for
example, that the fall of light on objects in an image is consistent right across the image, that
shading is consistent, the absorption of light. An image created using this method can take
some time to develop. Creating an image by altering its content is another method.Duping the
recipient into believing that the objects in an image are something else from what they really
are! The image itself is not altered, and if examined will be proven as so This method is
where the context of the image is altered
Objects are be removed or added, for example, a person can be added or removed.The
easiest way is to cut an object from one image and insert it into another image – image
editing software makes this a simple task
Forgery is a copy that represented as the original counterfeit imitation - something copied
or derived from an original.
Forgery is one of the techniques of fraud, including identity theft.
The action of forging or producing is a copy of a document, signature, banknote, or work of
art.
Image Forgery In Cyber Crime
4 | P a g e
Image Forgery And its history
Image forgery means manipulation of the digital image to conceal some meaningful or
useful information of the image. Now a Days Digital images are easy to manipulate and edit
due to availability of powerful image processing and editing software. Image forgery is not
new. History has recorded that it happens as early as 1840s. Hippolyta Bayard, the first
person to create a fake image as recorded by history, is famous for a picture of him
committing suicide (see picture on the right). It all started as an act of frustration because he
had lost the chance of becoming ‘the inventor of the photography’ to Louis Daguerre.
Daguerre patented a photography process earlier than him and owns all the glory.
Fig No : 1.first fake image by Hippolyta Bayard
Digital Image Forgery does not differ very much in nature compared to conventional
Image Forgery. Instead of using photograph, digital image forgery deals with the digital
image. Nowadays, it is possible to add or remove important features from an image without
leaving any obvious traces of tampering.
The process of creating fake image has been tremendously simple with the introduction
of powerful computer graphics editing software such as Adobe Photoshop, GIMP, and Corel
Paint Shop, some of which are available for free.
There are many cases of Digital Image Forgery. All of this cases can be categorized into
3 major groups, based on the process involved in creating the fake image. The groups are
Image Retouching, Image Splicing, Copy-Move Attack.
Image Forgery In Cyber Crime
5 | P a g e
Examples of Image Forgery
1) Circa 1860:
This nearly iconic portrait of U.S. President Abraham Lincoln is a composite of Lincoln's
head and the body of Southern politician, John Calhoun. Putting the date of this photo into
context, note that the first permanent photographic image was created in 1826 and the
Eastman Dry Plate and Film Company (later to become Eastman Kodak) was created in
1884.
Image Forgery In Cyber Crime
6 | P a g e
2) Circa 1865:
In this photo by famed photographer Mathew Brady, General William Tecumseh
Sherman is seen posing with his generals. General Francis P. Blair [far right] was added to
the original photograph.
Image Forgery In Cyber Crime
7 | P a g e
3) Circa 1930:
Soviet premier, Joseph Stalin, routinely airbrushed his enemies out of images. In this
photo, a commissar was removed from the original photograph after falling out of favor with
Stalin.
Image Forgery In Cyber Crime
8 | P a g e
4) 1936:
In this doctored photograph, Chinese Communist leader Mao Zedong [first from the
right] had Po Ku [first from the left] removed from the original photograph, after Po Ku fell
out of favor with Mao.
Image Forgery In Cyber Crime
9 | P a g e
5) 1937:
In this doctored Nazi photograph, Adolf Hitler had Joseph Goebbels [second from right]
removed from the original photograph. It remains unclear why Goebbels had fallen out of
favor with Hitler.
Image Forgery In Cyber Crime
10 | P a g e
6) 1942:
In order to create a more heroic portrait of himself, Italian Fascist leader Benito
Mussolini had the horse handler removed from the original photograph.
Image Forgery In Cyber Crime
11 | P a g e
7) 1968:
When in the summer of 1968 communist leader Fidel Castro [right] approved of
the Soviet intervention in Czechoslovakia, Cuban writer and political activist Carlos
Franqui [middle] cut off relations with the regime and went into exile in Italy. His image
was subsequently removed from photographs.
Image Forgery In Cyber Crime
12 | P a g e
8) September 1971:
The chancellor of West Germany, Willy Brandt [far left], meets with Soviet leader
Leonid Brezhnev [far right], first secretary of the Communist Party. The two smoke and
drink, and it is reported that the atmosphere is cordial—and also that they are drunk. German
media publishes a photograph that shows the champagne bottles on the table. The Soviet
press, however, removed the bottles from the original photograph.
Image Forgery In Cyber Crime
13 | P a g e
Applications of Image Forgery
1) Adobe Photoshop:-
Adobe Photoshop is hands down, the most popular program for creating and modifying
images for the web.This is true not only because Photoshop is available on a wide array of
platforms ranging from Mac to Windows to UNIX, but because after 4 generations of
development, Adobe Photoshop has the most intuitive user interface, the most complete set
of tools, and the largest number of reference books around.
In fact as Deke McClelland says in Photoshop 3 Bible, “Some estimates say that
Photoshop sales exceed those of all of its competitors combined.”
“Photoshop is only one tool in a good designer’s arsenal. Other popular tools include Paint
Shop Pro, De Babelizer, or L View Pro for Windows and GIF Converter or Graphics
Converter for Macintosh. Fractal Design, Aldus and HSC also put out some excellent
programs.”One thing to keep in mind about using Photoshop is so powerful, it requires a
fairly souped up working environment.
Specially, it would be a good idea to have at least 32MB of RAM. After all, as a web
designer, you will be tasking your system while developing. Often you will have 2 browsers,
Photoshop, an HTML editor, a word processor, and two or three ftp/telnet sessions open all at
one time. Without enough resources, your computer will not have enough gusto to keep up
with you.
But, aside from altering images, Photoshop has a very vast array of tools that help you
“create” images from scratch. On the web, you will often need to make custom icons,
buttons, lines, balls or text art. Photoshop makes all of this excessively easy and fun.“It is
worth mentioning that Photoshop is not a “classic” drawing, or image creation, program.
Unlike a drawing program which stores information about images as mathematical
expressions(called Vectors), when Photoshop draws a line, the line is converted into little
dots, called pixels. When small enough, and with blended colors (anti-aliasing), these dots
can come to look like lines.
Think of pointillism. Of course, when magnified or reduced, the optical illusion is
dispelled and you get ugly choppy lines.”
Image Forgery In Cyber Crime
14 | P a g e
2) GIMP(GNU Image Manipulation Program):-
GIMP is an acronym for GNU Image Manipulation Program. It is a freely distributed
program for such tasks as photo retouching, image composition and image authoring. It has
many capabilities. It can be used as a simple paint program, and expert quality photo
retouching program, an online batch processing system, a mass production image renderer,
an image format converter, etc.
GIMP is expandable and extensible. It is designed to be augmented with plug-ins and
extensions to do just about anything. The advanced scripting interface allows everything
from the simplest task to the most complex image manipulation procedures to be easily
scripted.
GIMP is a raster graphics editor used for image retouching and editing, free-form
drawing, resizing, cropping, photo-montages, converting between different image formats,
and more specialized tasks.GIMP is written and developed under X11 on UNIX platforms.
But basically the same code also runs on MS Windows and Mac OS X.GIMP is
releasedunder LGPLv3 and GPLv3+ licenses and is available for Linux, OS X,
and Windows. The Libre Graphics Meeting (LGM) is a yearly event where developers of
GIMP and other projects meet up to discuss issues related to free and open source graphics
software. The GIMP developers hold birds of a feather (BOF) sessions at this event.
GIMP's fitness for use in professional environments is regularly reviewed and as such
often cited as a possible replacement for Adobe Photoshop. The maintainers seek to fulfill
GIMP's product vision rather than replicate the interface of Adobe Photoshop.GIMP itself is
released as source code. After a source code release installers and packages are made for
different operating systems by parties who may or may not be in contact with the maintainers
of GIMP.
Wilber is the official GIMP mascot. Wilber has relevance outside of GIMP as a racer
in Super TuxKart and was displayed on the Bibliothèquenationale de France(National
Library of France) as part of Project Blinkenlights.
Image Forgery In Cyber Crime
15 | P a g e
3) Corel Paint Shop:-
Corel DRAW is a vector-based drawing and illustration program. This means that when
you draw an object on the Corel DRAW drawing page, the shape of the object displayed
onscreen is defined by a mathematical formula. In fact, its accuracy can be measured to one
tenth of a micro.Before you begin the installation process, be sure to close any open
programs and any TSR’s running in the background, especially virus checkers and crash
utilities. These utilities will drastically slow the installation or not allow Corel DRAW to
install at all.
CorelDraw (styled CorelDraw) is a vector graphics editor developed and marketed
by Corel Corporation of Ottawa, Canada. It is also the name of Corel's Graphics Suite, which
bundles CorelDraw with a bitmap image editor, Corel Photo-Paint, and other graphics-related
programs (see below). The latest version is designated X7 (equivalent to version 17), and was
released in March 2014.
In 1987, Corel hired software engineers Michel Bouillon and Pat Beirne to develop a
vector-based illustration program to bundle with their desktop publishing systems. That
program, CorelDraw, was initially released in 1989. CorelDraw 1.x and 2.x runs under
Windows 2.x and 3.0. CorelDraw 3.0 came into its own with Microsoft's release of Windows
3.1. The inclusion of TrueType in Windows 3.1 transformed CorelDraw into a serious
illustration program capable of using system-installed outline fonts without requiring third-
party software such as Adobe Type Manager; paired with a photo editing program (Corel
Photo-Paint), a font manager and several other pieces of software, it was also part of the first
all-in-one graphics suite.
CorelDraw was originally developed for Microsoft Windows 3 and currently runs
on Windows XP, Windows Vista,Windows 7, and Windows 8. The current version, X7, was
released on 27 March 2014.CorelDraw is capable of handling multiple pages along with
multiple master layers. Multipage documents are easy to create and edit and the Corel print
engine allows for booklet and other imposition so even simple printers can be used for
producing finished documents.
Image Forgery In Cyber Crime
16 | P a g e
Need for detection of digital forgeries
One of the most recent case of image forgery is fake birth certificate of President of
America ‘Barrack Obama’ who is not eligible to be the president of America and he showed
his fake birth certificate and became the president of America. This has been proved in the
court and actions are taken regarding it and there is no real birth certificate found of Barack
Obama.
The birth certificate in question is actually a purported copy of Barack Obama’s original
birth certificate which is currently held by Hawaii’s Department of Health. This copy was
posted in April of 2011 on the official whitehouse.gov website where it still appears today.
No one knows where Obama’s real birth certificate is. The following document is an exact
copy of what appears on the website.
Obama’s supporters will tell everyone who will listen that Barack Obama produced
his real birth certificate in 2011. A single reporter – Savannah Guthrie of NBC news — was
allowed to see the “real” document, and then it was scanned as a PDF file and loaded into the
internet for everyone to see. As far as the Obama crowd is concerned, that’s the end of the
story.
The only problem for Obama is that numerous electronic document experts have shown,
using steps that anyone can repeat with if they have the proper software, that the document
the White House so proudly uploaded is not simply a scanned version of an original paper
document. Instead, it’s what’s called a “layered” document. A document that’s scanned will
Image Forgery In Cyber Crime
17 | P a g e
have only one layer, which is the image itself. A “layered,” electronically manipulated
document will show one electronic addition after another. The White House’s birth
certificate PDF has nine layers. This was an assembled electronic document, not a scanned
paper document.
Image Forgery In Cyber Crime
18 | P a g e
Types of image forgery
1) Image Retouching:-
 Image Retouching can be considered to be the less harmful kind of digital image forgery.
 Image Retouching does not significantly does not change an image, but instead, enhances
or reduces certain feature of an image(see picture below).
 This technique is popular among magazine photo editors. It can be said that almost all
magazine cover would employ this technique to ‘enhance’ certain features of an image so
that it is more attractive; ignoring the fact that such enhancement is ethically wrong.
Image Forgery In Cyber Crime
19 | P a g e
Image Forgery In Cyber Crime
20 | P a g e
2) Image Splicing:-
 This technique is more aggressive than image retouching. Image Splicing is a technique
that involves a composite of two or more images which are combined to create a fake
image.
 In the picture below, ‘the shark’ is copied to the base image(helicopter rescue). The base
image is first flipped horizontally before the shark is pasted to create a more convincing
(and not to forget dramatic) picture of the helicopter rescue.
Image Forgery In Cyber Crime
21 | P a g e
3) Copy-Move Attack:-
 Copy-Move Attack is more or less similar to Image Splicing in view of the fact that both
techniques modify certain image region (of a base image), with the another image.
 However, instead of having an external image as the source, copy-move attack uses
portion of the original base image as its source. In other words, source and the destination
of the modified image originated from the same image.
 In copy-move attack, parts of the original image is copied, moved to a desired location,
and pasted. This is usually done in order to conceal certain details or to duplicate certain
aspects of an image.
 Blurring is usually applied along the border of the modified region to reduce to reduce
the effect of irregularities between the original and the pasted region.
 The picture below shows a sample image that has been tampered using copy-move
attack(left) and its original (right). Notice a repeated smoke pattern on the left image.
Image Forgery In Cyber Crime
22 | P a g e
Image security
There are many ways in which you can secure your home and business against crime and
avoid becoming another statistic.Established in 1992 image security offers comprehensive range
of sophisticated security products and security services to protect what means to u most.
Steps to protect your image
The Internet is a great way to show your photographs to the world. Putting images
up on the website is the child’s play compared to hanging a gallery show or publishing a
book. But what is to stop an unscrupulous website visitor from stealing your images ? In
truth, all the images that are seen by your visitors are already copied and stored in their
computer’s browser cache. But there are still effective, low cost ways of preventing their
misuse.
1) Adding your Copyright as a text layer
 This is the easiest and most effective way to protect your images. Placing the copyright
symbol and your name directly in an image tells everyone that your work is copyrighted.
We recommend including your website URL (or phone number if you don’t have your
own website ) so anyone who prints out or copies your picture can easily find you in the
future. This turns every copied image into an advertisement for you.
Image Forgery In Cyber Crime
23 | P a g e
 Each graphics program handles text differently, but look for the Text Tool on the toolbar
within your program. Use an easy to read font like Arial in a small point size. If your
image has light and dark areas that make text hard to read you can select the area behind
the text and reduce its contrast.
2)Size and compress your images properly
 There are 2 benefits to this approach. Smaller images will reduce both the quality of a
printout and will also speed page load time. Keep your image size under 450 pixels on
the long dimension. If anyone were to print it, it would be either print small, or if forced
to be a larger print the image will look pixilated (pixels will spread out). Next compress
your images until they just begin to show artifacts. This will help them load faster, and
further reduce the chance they will be misused. An added benefit of slicing is shorter load
time when you optimize each slice individually. In a program like ImageReady (part of
Photoshop 6), different parts of the same image can be optimized as GIF’s or JPEG’s.
3)Image slicing to protect your images
 Using your graphics program, you can slice your pictures into 2 or more slices. Right
clicking and saving would only get the view the part of the picture that was clicked on.
And the browsers cache will only have fragmented bits of images in it. The individual
image parts, which are really separate, picture loading into different cells within the same
table, are joined in the HTML when viewing the image on the web. An added benefit of
slicing is shorter load time when you optimize each slice individually. In a program like
ImageReady (part of Photoshop 6), different parts of the same image can be optimized as
GIF’s or JPEG’s.
4) Table background and Transparent GIF
 This is a bit complex, but quite effective. First create a table exactly the same size as the
image you want to protect. Next, set the image as the table background. Create a
transparent GIF with a similar name and exactly the same pixel dimensions as the
original image and insert it into the table. If someone tries to copy it by right clicking on
it, all they get is the transparent GIF.
5) Mouseover image swap
Image Forgery In Cyber Crime
24 | P a g e
 Another bit of JavaScript code can cause one image to replace another when the user’s
mouse passes over it. The replacement image can include a warning about not copying
your images.
Image Forgery In Cyber Crime
25 | P a g e
Forgery Detection Algorithms
1) Double Quantization Effect :-
 The first two histograms represent a typical file that was only saved once. The other two
demonstrate what happens to a JPEG image if it’s opened and saved as JPEG once again.
2) Error Level Analysis:-
Image Forgery In Cyber Crime
26 | P a g e
 Quantization deviation is significantly higher for the two cats on the left. This effect will
be significantly more pronounced if the object being pasted would be taken from a
different image.
3) Copy/Move Forgery and Clone Detection:-
 The second image is fake. Note that the other umbrella is not simply copying and pasting:
the pasted object is scaled to appear larger (closer). The third image outlines matching
points that allow detecting the cloned image.
Image Forgery In Cyber Crime
27 | P a g e
4) Inconsistent Image Quality:
 This is the same image, only the last three pictures are saved from the original with 90%,
70% and 50% quality respectively.
Image Forgery In Cyber Crime
Inconsistent Image Quality:-
This is the same image, only the last three pictures are saved from the original with 90%,
70% and 50% quality respectively.
This is the same image, only the last three pictures are saved from the original with 90%,
Image Forgery In Cyber Crime
28 | P a g e
References
[1] S. Bayram, I. Avcibas, B. Sankur, and N. Memon, “Image manipulation detection with binary
similarity measures,” in Proc. European Signal Processing Conf., Turkey, 2005.
[2] S. Bayram, I. Avcibas, B. Sankur, and N. Memon, “Image manipulation detection,” J.
Electron. Imaging, vol. 15, no. 4, p. 41102, 2006.
[3] S. Bayram, H. T. Sencar, and N. Memon, “Source camera identification based on CFA
interpolation,” in IEEE Int. Conf. Image Processing, Genova, Italy, 2005, pp. 69–72.
[4] S. Bayram, H. T. Sencar, and N. Memon, “Improvements on source camera model
identification based on CFA interpolation,” in Proc. IFIP WG 11.9 Int. Conf. Digital Forensics,
Orlando, FL, 2006, pp. 24–27
[5] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan
Kaufmann, 2002.
[6] Z. Fan and R. L. de Queiroz, “Identification of bitmap compression history: JPEG detection
and quantizer estimation,” IEEE Trans. Image Process., vol. 12, no. 2, pp. 230–235, 2003.
[7] H. Farid, “Detecting digital forgeries using bispectral analysis,” AI Lab, Massachusetts
Institute of Technology, Tech. Rep. AIM-1657, 1999.
[8] H. Farid, “Digital image ballistics from JPEG quantization,” Dept. Comput. Sci., Dartmouth
College, Tech. Rep. TR2006-583, 2006.
[9] H. Farid and S. Lyu, “Higher-order wavelet statistics and their application to digital
forensics,” in Proc. IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction
with CVPR), Madison, WI, 2003. [10] J. Fridrich, M. Chen, and M. Goljan, “Imaging sensor
noise as digital x-ray for revealing forgeries,” in Proc. 9th Int. Workshop on Information Hiding,
Sant Malo, France, 2007, pp. 342–358.

More Related Content

PPTX
Lect 03 - first portion
Moe Moe Myint
 
PDF
Morphological operations
National Institute of Technology Durgapur
 
PPTX
Orb feature by nitin
NitinMauryaKashipur
 
PPTX
Animation
Avinash
 
PPT
Image segmentation
Md Shabir Alam
 
PPT
Fields of digital image processing slides
Srinath Dhayalamoorthy
 
PPTX
Erosion and dilation
Akhil .B
 
PPT
Digital Image Forgery
Mohamed Talaat
 
Lect 03 - first portion
Moe Moe Myint
 
Orb feature by nitin
NitinMauryaKashipur
 
Animation
Avinash
 
Image segmentation
Md Shabir Alam
 
Fields of digital image processing slides
Srinath Dhayalamoorthy
 
Erosion and dilation
Akhil .B
 
Digital Image Forgery
Mohamed Talaat
 

What's hot (20)

PPTX
Run length encoding
praseethasnair123
 
PPTX
Digital Image Fundamentals - II
Hemantha Kulathilake
 
PPTX
Images in matlab
Ali Alvi
 
PDF
Image Forgery Detection
nitishkumar883951
 
PPT
CS 354 Texture Mapping
Mark Kilgard
 
PPT
Chapter02.ppt
RishiJain193179
 
PPTX
Lect 02 second portion
Moe Moe Myint
 
PPT
Dip Image Segmentation
Mubbasher Khaliq
 
PPTX
Image segmentation
Gayan Sampath
 
PPTX
Lecture 1 for Digital Image Processing (2nd Edition)
Moe Moe Myint
 
PPTX
Image compression
Abdelrahman Almassry
 
PPTX
Introduction to image contrast and enhancement method
Abhishekvb
 
PDF
Digital Image Processing: Digital Image Fundamentals
Mostafa G. M. Mostafa
 
PPTX
Image enhancement techniques
Arshad khan
 
PPTX
Monitors & workstation,Donald ch-2
Iftikhar Ahmad
 
DOCX
EDGE DETECTION
VIKAS SINGH BHADOURIA
 
PPTX
Image compression .
Payal Vishwakarma
 
PPT
Morphological Image Processing
kumari36
 
PPTX
digital image processing
Abinaya B
 
Run length encoding
praseethasnair123
 
Digital Image Fundamentals - II
Hemantha Kulathilake
 
Images in matlab
Ali Alvi
 
Image Forgery Detection
nitishkumar883951
 
CS 354 Texture Mapping
Mark Kilgard
 
Chapter02.ppt
RishiJain193179
 
Lect 02 second portion
Moe Moe Myint
 
Dip Image Segmentation
Mubbasher Khaliq
 
Image segmentation
Gayan Sampath
 
Lecture 1 for Digital Image Processing (2nd Edition)
Moe Moe Myint
 
Image compression
Abdelrahman Almassry
 
Introduction to image contrast and enhancement method
Abhishekvb
 
Digital Image Processing: Digital Image Fundamentals
Mostafa G. M. Mostafa
 
Image enhancement techniques
Arshad khan
 
Monitors & workstation,Donald ch-2
Iftikhar Ahmad
 
EDGE DETECTION
VIKAS SINGH BHADOURIA
 
Image compression .
Payal Vishwakarma
 
Morphological Image Processing
kumari36
 
digital image processing
Abinaya B
 
Ad

Similar to Image Forgery In Cyber Crime (20)

PDF
Image Forgery In Cyber Crime
Swapnil Bendale
 
PPTX
Image forgery and security
أحلام انصارى
 
PDF
Elucidating Digital deception: Spot counterfeit fragment
VIT-AP University
 
PDF
G010245056
IOSR Journals
 
PDF
Review of Digital Image Forgery Detection
rahulmonikasharma
 
PDF
An Approach for Copy-Move Attack Detection and Transformation Recovery
IRJET Journal
 
PDF
A novelty approach on forgery digital image
ijcsa
 
PDF
Digital Image Sham Detection Using Deep Learning
IRJET Journal
 
PDF
Imagically Image Forensic Tool
ijtsrd
 
PDF
Analysis and Detection of Image Forgery Methodologies
ijsrd.com
 
PDF
A Review on Various Forgery Detection Techniques
ijtsrd
 
PDF
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
IJECEIAES
 
PDF
AHP validated literature review of forgery type dependent passive image forge...
IJECEIAES
 
PDF
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
IRJET Journal
 
PPTX
A Web-based Service for Image Tampering Detection
Symeon Papadopoulos
 
PPTX
Image processing and It’s forensic significance
RituNaru
 
PDF
A Study of Image Tampering Detection
IRJET Journal
 
PDF
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET Journal
 
PPSX
From Digital Watermarking to Multimedia Forensics: How can they help to dete...
Shujun Li
 
PDF
20120140502012
IAEME Publication
 
Image Forgery In Cyber Crime
Swapnil Bendale
 
Image forgery and security
أحلام انصارى
 
Elucidating Digital deception: Spot counterfeit fragment
VIT-AP University
 
G010245056
IOSR Journals
 
Review of Digital Image Forgery Detection
rahulmonikasharma
 
An Approach for Copy-Move Attack Detection and Transformation Recovery
IRJET Journal
 
A novelty approach on forgery digital image
ijcsa
 
Digital Image Sham Detection Using Deep Learning
IRJET Journal
 
Imagically Image Forensic Tool
ijtsrd
 
Analysis and Detection of Image Forgery Methodologies
ijsrd.com
 
A Review on Various Forgery Detection Techniques
ijtsrd
 
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics
IJECEIAES
 
AHP validated literature review of forgery type dependent passive image forge...
IJECEIAES
 
An Enhanced Method to Detect Copy Move Forgery in Digital Images processing u...
IRJET Journal
 
A Web-based Service for Image Tampering Detection
Symeon Papadopoulos
 
Image processing and It’s forensic significance
RituNaru
 
A Study of Image Tampering Detection
IRJET Journal
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET Journal
 
From Digital Watermarking to Multimedia Forensics: How can they help to dete...
Shujun Li
 
20120140502012
IAEME Publication
 
Ad

Recently uploaded (20)

DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 

Image Forgery In Cyber Crime

  • 1. Image Forgery In Cyber Crime 1 | P a g e A Seminar Report on “IMAGE FORGERY IN CYBER CRIME” Submitted to North Maharashtra University, Jalgaon in Partial Fulfillment of the Requirements for the Degree of Third Year in Computer Engineering. Submitted By Swapnil Govardhan Bendale Guide Prof. Y.V.Kolhe DEPARTMENT OF COMPUTER ENGINEERING J.T.MAHAJAN COLLEGE OF ENGINEERING,FAIZPUR Academic Year : 2016-17
  • 2. Image Forgery In Cyber Crime 2 | P a g e INDEX Sr No. Contents Page No. 1 Forgery 2 2 Image forgery And its history 3 3 Examples of Image Forgery 4 4 Applications Of Image Forgery. 12 5 Need for detection of Image Forgery. 15 6 Types Of Image Forgery. 17 7 Image Security & Steps to protect your image 20 8 Forgery Detection Algorithms 22 9 References 25
  • 3. Image Forgery In Cyber Crime 3 | P a g e Forgery “Forgery” is a subjective word An image can become a forgery based upon the context in which it is used,an image altered for fun or someone who has taken an bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture.The other side of forgery are those who perpetuate a forgery for gain and prestige – they create an image in which to dupe the recipient into believing the image is real and from this be able to gain payment and fame. Three type of forgery can be identified: 1) An image that is created using graphical software 2) An image where the content has been altered 3) An image where the context has been altered Using graphical software is one method in which a forged image can be created.It needs the creator to especially skilful in ensuring that the image they are creating is realistic, for example, that the fall of light on objects in an image is consistent right across the image, that shading is consistent, the absorption of light. An image created using this method can take some time to develop. Creating an image by altering its content is another method.Duping the recipient into believing that the objects in an image are something else from what they really are! The image itself is not altered, and if examined will be proven as so This method is where the context of the image is altered Objects are be removed or added, for example, a person can be added or removed.The easiest way is to cut an object from one image and insert it into another image – image editing software makes this a simple task Forgery is a copy that represented as the original counterfeit imitation - something copied or derived from an original. Forgery is one of the techniques of fraud, including identity theft. The action of forging or producing is a copy of a document, signature, banknote, or work of art.
  • 4. Image Forgery In Cyber Crime 4 | P a g e Image Forgery And its history Image forgery means manipulation of the digital image to conceal some meaningful or useful information of the image. Now a Days Digital images are easy to manipulate and edit due to availability of powerful image processing and editing software. Image forgery is not new. History has recorded that it happens as early as 1840s. Hippolyta Bayard, the first person to create a fake image as recorded by history, is famous for a picture of him committing suicide (see picture on the right). It all started as an act of frustration because he had lost the chance of becoming ‘the inventor of the photography’ to Louis Daguerre. Daguerre patented a photography process earlier than him and owns all the glory. Fig No : 1.first fake image by Hippolyta Bayard Digital Image Forgery does not differ very much in nature compared to conventional Image Forgery. Instead of using photograph, digital image forgery deals with the digital image. Nowadays, it is possible to add or remove important features from an image without leaving any obvious traces of tampering. The process of creating fake image has been tremendously simple with the introduction of powerful computer graphics editing software such as Adobe Photoshop, GIMP, and Corel Paint Shop, some of which are available for free. There are many cases of Digital Image Forgery. All of this cases can be categorized into 3 major groups, based on the process involved in creating the fake image. The groups are Image Retouching, Image Splicing, Copy-Move Attack.
  • 5. Image Forgery In Cyber Crime 5 | P a g e Examples of Image Forgery 1) Circa 1860: This nearly iconic portrait of U.S. President Abraham Lincoln is a composite of Lincoln's head and the body of Southern politician, John Calhoun. Putting the date of this photo into context, note that the first permanent photographic image was created in 1826 and the Eastman Dry Plate and Film Company (later to become Eastman Kodak) was created in 1884.
  • 6. Image Forgery In Cyber Crime 6 | P a g e 2) Circa 1865: In this photo by famed photographer Mathew Brady, General William Tecumseh Sherman is seen posing with his generals. General Francis P. Blair [far right] was added to the original photograph.
  • 7. Image Forgery In Cyber Crime 7 | P a g e 3) Circa 1930: Soviet premier, Joseph Stalin, routinely airbrushed his enemies out of images. In this photo, a commissar was removed from the original photograph after falling out of favor with Stalin.
  • 8. Image Forgery In Cyber Crime 8 | P a g e 4) 1936: In this doctored photograph, Chinese Communist leader Mao Zedong [first from the right] had Po Ku [first from the left] removed from the original photograph, after Po Ku fell out of favor with Mao.
  • 9. Image Forgery In Cyber Crime 9 | P a g e 5) 1937: In this doctored Nazi photograph, Adolf Hitler had Joseph Goebbels [second from right] removed from the original photograph. It remains unclear why Goebbels had fallen out of favor with Hitler.
  • 10. Image Forgery In Cyber Crime 10 | P a g e 6) 1942: In order to create a more heroic portrait of himself, Italian Fascist leader Benito Mussolini had the horse handler removed from the original photograph.
  • 11. Image Forgery In Cyber Crime 11 | P a g e 7) 1968: When in the summer of 1968 communist leader Fidel Castro [right] approved of the Soviet intervention in Czechoslovakia, Cuban writer and political activist Carlos Franqui [middle] cut off relations with the regime and went into exile in Italy. His image was subsequently removed from photographs.
  • 12. Image Forgery In Cyber Crime 12 | P a g e 8) September 1971: The chancellor of West Germany, Willy Brandt [far left], meets with Soviet leader Leonid Brezhnev [far right], first secretary of the Communist Party. The two smoke and drink, and it is reported that the atmosphere is cordial—and also that they are drunk. German media publishes a photograph that shows the champagne bottles on the table. The Soviet press, however, removed the bottles from the original photograph.
  • 13. Image Forgery In Cyber Crime 13 | P a g e Applications of Image Forgery 1) Adobe Photoshop:- Adobe Photoshop is hands down, the most popular program for creating and modifying images for the web.This is true not only because Photoshop is available on a wide array of platforms ranging from Mac to Windows to UNIX, but because after 4 generations of development, Adobe Photoshop has the most intuitive user interface, the most complete set of tools, and the largest number of reference books around. In fact as Deke McClelland says in Photoshop 3 Bible, “Some estimates say that Photoshop sales exceed those of all of its competitors combined.” “Photoshop is only one tool in a good designer’s arsenal. Other popular tools include Paint Shop Pro, De Babelizer, or L View Pro for Windows and GIF Converter or Graphics Converter for Macintosh. Fractal Design, Aldus and HSC also put out some excellent programs.”One thing to keep in mind about using Photoshop is so powerful, it requires a fairly souped up working environment. Specially, it would be a good idea to have at least 32MB of RAM. After all, as a web designer, you will be tasking your system while developing. Often you will have 2 browsers, Photoshop, an HTML editor, a word processor, and two or three ftp/telnet sessions open all at one time. Without enough resources, your computer will not have enough gusto to keep up with you. But, aside from altering images, Photoshop has a very vast array of tools that help you “create” images from scratch. On the web, you will often need to make custom icons, buttons, lines, balls or text art. Photoshop makes all of this excessively easy and fun.“It is worth mentioning that Photoshop is not a “classic” drawing, or image creation, program. Unlike a drawing program which stores information about images as mathematical expressions(called Vectors), when Photoshop draws a line, the line is converted into little dots, called pixels. When small enough, and with blended colors (anti-aliasing), these dots can come to look like lines. Think of pointillism. Of course, when magnified or reduced, the optical illusion is dispelled and you get ugly choppy lines.”
  • 14. Image Forgery In Cyber Crime 14 | P a g e 2) GIMP(GNU Image Manipulation Program):- GIMP is an acronym for GNU Image Manipulation Program. It is a freely distributed program for such tasks as photo retouching, image composition and image authoring. It has many capabilities. It can be used as a simple paint program, and expert quality photo retouching program, an online batch processing system, a mass production image renderer, an image format converter, etc. GIMP is expandable and extensible. It is designed to be augmented with plug-ins and extensions to do just about anything. The advanced scripting interface allows everything from the simplest task to the most complex image manipulation procedures to be easily scripted. GIMP is a raster graphics editor used for image retouching and editing, free-form drawing, resizing, cropping, photo-montages, converting between different image formats, and more specialized tasks.GIMP is written and developed under X11 on UNIX platforms. But basically the same code also runs on MS Windows and Mac OS X.GIMP is releasedunder LGPLv3 and GPLv3+ licenses and is available for Linux, OS X, and Windows. The Libre Graphics Meeting (LGM) is a yearly event where developers of GIMP and other projects meet up to discuss issues related to free and open source graphics software. The GIMP developers hold birds of a feather (BOF) sessions at this event. GIMP's fitness for use in professional environments is regularly reviewed and as such often cited as a possible replacement for Adobe Photoshop. The maintainers seek to fulfill GIMP's product vision rather than replicate the interface of Adobe Photoshop.GIMP itself is released as source code. After a source code release installers and packages are made for different operating systems by parties who may or may not be in contact with the maintainers of GIMP. Wilber is the official GIMP mascot. Wilber has relevance outside of GIMP as a racer in Super TuxKart and was displayed on the Bibliothèquenationale de France(National Library of France) as part of Project Blinkenlights.
  • 15. Image Forgery In Cyber Crime 15 | P a g e 3) Corel Paint Shop:- Corel DRAW is a vector-based drawing and illustration program. This means that when you draw an object on the Corel DRAW drawing page, the shape of the object displayed onscreen is defined by a mathematical formula. In fact, its accuracy can be measured to one tenth of a micro.Before you begin the installation process, be sure to close any open programs and any TSR’s running in the background, especially virus checkers and crash utilities. These utilities will drastically slow the installation or not allow Corel DRAW to install at all. CorelDraw (styled CorelDraw) is a vector graphics editor developed and marketed by Corel Corporation of Ottawa, Canada. It is also the name of Corel's Graphics Suite, which bundles CorelDraw with a bitmap image editor, Corel Photo-Paint, and other graphics-related programs (see below). The latest version is designated X7 (equivalent to version 17), and was released in March 2014. In 1987, Corel hired software engineers Michel Bouillon and Pat Beirne to develop a vector-based illustration program to bundle with their desktop publishing systems. That program, CorelDraw, was initially released in 1989. CorelDraw 1.x and 2.x runs under Windows 2.x and 3.0. CorelDraw 3.0 came into its own with Microsoft's release of Windows 3.1. The inclusion of TrueType in Windows 3.1 transformed CorelDraw into a serious illustration program capable of using system-installed outline fonts without requiring third- party software such as Adobe Type Manager; paired with a photo editing program (Corel Photo-Paint), a font manager and several other pieces of software, it was also part of the first all-in-one graphics suite. CorelDraw was originally developed for Microsoft Windows 3 and currently runs on Windows XP, Windows Vista,Windows 7, and Windows 8. The current version, X7, was released on 27 March 2014.CorelDraw is capable of handling multiple pages along with multiple master layers. Multipage documents are easy to create and edit and the Corel print engine allows for booklet and other imposition so even simple printers can be used for producing finished documents.
  • 16. Image Forgery In Cyber Crime 16 | P a g e Need for detection of digital forgeries One of the most recent case of image forgery is fake birth certificate of President of America ‘Barrack Obama’ who is not eligible to be the president of America and he showed his fake birth certificate and became the president of America. This has been proved in the court and actions are taken regarding it and there is no real birth certificate found of Barack Obama. The birth certificate in question is actually a purported copy of Barack Obama’s original birth certificate which is currently held by Hawaii’s Department of Health. This copy was posted in April of 2011 on the official whitehouse.gov website where it still appears today. No one knows where Obama’s real birth certificate is. The following document is an exact copy of what appears on the website. Obama’s supporters will tell everyone who will listen that Barack Obama produced his real birth certificate in 2011. A single reporter – Savannah Guthrie of NBC news — was allowed to see the “real” document, and then it was scanned as a PDF file and loaded into the internet for everyone to see. As far as the Obama crowd is concerned, that’s the end of the story. The only problem for Obama is that numerous electronic document experts have shown, using steps that anyone can repeat with if they have the proper software, that the document the White House so proudly uploaded is not simply a scanned version of an original paper document. Instead, it’s what’s called a “layered” document. A document that’s scanned will
  • 17. Image Forgery In Cyber Crime 17 | P a g e have only one layer, which is the image itself. A “layered,” electronically manipulated document will show one electronic addition after another. The White House’s birth certificate PDF has nine layers. This was an assembled electronic document, not a scanned paper document.
  • 18. Image Forgery In Cyber Crime 18 | P a g e Types of image forgery 1) Image Retouching:-  Image Retouching can be considered to be the less harmful kind of digital image forgery.  Image Retouching does not significantly does not change an image, but instead, enhances or reduces certain feature of an image(see picture below).  This technique is popular among magazine photo editors. It can be said that almost all magazine cover would employ this technique to ‘enhance’ certain features of an image so that it is more attractive; ignoring the fact that such enhancement is ethically wrong.
  • 19. Image Forgery In Cyber Crime 19 | P a g e
  • 20. Image Forgery In Cyber Crime 20 | P a g e 2) Image Splicing:-  This technique is more aggressive than image retouching. Image Splicing is a technique that involves a composite of two or more images which are combined to create a fake image.  In the picture below, ‘the shark’ is copied to the base image(helicopter rescue). The base image is first flipped horizontally before the shark is pasted to create a more convincing (and not to forget dramatic) picture of the helicopter rescue.
  • 21. Image Forgery In Cyber Crime 21 | P a g e 3) Copy-Move Attack:-  Copy-Move Attack is more or less similar to Image Splicing in view of the fact that both techniques modify certain image region (of a base image), with the another image.  However, instead of having an external image as the source, copy-move attack uses portion of the original base image as its source. In other words, source and the destination of the modified image originated from the same image.  In copy-move attack, parts of the original image is copied, moved to a desired location, and pasted. This is usually done in order to conceal certain details or to duplicate certain aspects of an image.  Blurring is usually applied along the border of the modified region to reduce to reduce the effect of irregularities between the original and the pasted region.  The picture below shows a sample image that has been tampered using copy-move attack(left) and its original (right). Notice a repeated smoke pattern on the left image.
  • 22. Image Forgery In Cyber Crime 22 | P a g e Image security There are many ways in which you can secure your home and business against crime and avoid becoming another statistic.Established in 1992 image security offers comprehensive range of sophisticated security products and security services to protect what means to u most. Steps to protect your image The Internet is a great way to show your photographs to the world. Putting images up on the website is the child’s play compared to hanging a gallery show or publishing a book. But what is to stop an unscrupulous website visitor from stealing your images ? In truth, all the images that are seen by your visitors are already copied and stored in their computer’s browser cache. But there are still effective, low cost ways of preventing their misuse. 1) Adding your Copyright as a text layer  This is the easiest and most effective way to protect your images. Placing the copyright symbol and your name directly in an image tells everyone that your work is copyrighted. We recommend including your website URL (or phone number if you don’t have your own website ) so anyone who prints out or copies your picture can easily find you in the future. This turns every copied image into an advertisement for you.
  • 23. Image Forgery In Cyber Crime 23 | P a g e  Each graphics program handles text differently, but look for the Text Tool on the toolbar within your program. Use an easy to read font like Arial in a small point size. If your image has light and dark areas that make text hard to read you can select the area behind the text and reduce its contrast. 2)Size and compress your images properly  There are 2 benefits to this approach. Smaller images will reduce both the quality of a printout and will also speed page load time. Keep your image size under 450 pixels on the long dimension. If anyone were to print it, it would be either print small, or if forced to be a larger print the image will look pixilated (pixels will spread out). Next compress your images until they just begin to show artifacts. This will help them load faster, and further reduce the chance they will be misused. An added benefit of slicing is shorter load time when you optimize each slice individually. In a program like ImageReady (part of Photoshop 6), different parts of the same image can be optimized as GIF’s or JPEG’s. 3)Image slicing to protect your images  Using your graphics program, you can slice your pictures into 2 or more slices. Right clicking and saving would only get the view the part of the picture that was clicked on. And the browsers cache will only have fragmented bits of images in it. The individual image parts, which are really separate, picture loading into different cells within the same table, are joined in the HTML when viewing the image on the web. An added benefit of slicing is shorter load time when you optimize each slice individually. In a program like ImageReady (part of Photoshop 6), different parts of the same image can be optimized as GIF’s or JPEG’s. 4) Table background and Transparent GIF  This is a bit complex, but quite effective. First create a table exactly the same size as the image you want to protect. Next, set the image as the table background. Create a transparent GIF with a similar name and exactly the same pixel dimensions as the original image and insert it into the table. If someone tries to copy it by right clicking on it, all they get is the transparent GIF. 5) Mouseover image swap
  • 24. Image Forgery In Cyber Crime 24 | P a g e  Another bit of JavaScript code can cause one image to replace another when the user’s mouse passes over it. The replacement image can include a warning about not copying your images.
  • 25. Image Forgery In Cyber Crime 25 | P a g e Forgery Detection Algorithms 1) Double Quantization Effect :-  The first two histograms represent a typical file that was only saved once. The other two demonstrate what happens to a JPEG image if it’s opened and saved as JPEG once again. 2) Error Level Analysis:-
  • 26. Image Forgery In Cyber Crime 26 | P a g e  Quantization deviation is significantly higher for the two cats on the left. This effect will be significantly more pronounced if the object being pasted would be taken from a different image. 3) Copy/Move Forgery and Clone Detection:-  The second image is fake. Note that the other umbrella is not simply copying and pasting: the pasted object is scaled to appear larger (closer). The third image outlines matching points that allow detecting the cloned image.
  • 27. Image Forgery In Cyber Crime 27 | P a g e 4) Inconsistent Image Quality:  This is the same image, only the last three pictures are saved from the original with 90%, 70% and 50% quality respectively. Image Forgery In Cyber Crime Inconsistent Image Quality:- This is the same image, only the last three pictures are saved from the original with 90%, 70% and 50% quality respectively. This is the same image, only the last three pictures are saved from the original with 90%,
  • 28. Image Forgery In Cyber Crime 28 | P a g e References [1] S. Bayram, I. Avcibas, B. Sankur, and N. Memon, “Image manipulation detection with binary similarity measures,” in Proc. European Signal Processing Conf., Turkey, 2005. [2] S. Bayram, I. Avcibas, B. Sankur, and N. Memon, “Image manipulation detection,” J. Electron. Imaging, vol. 15, no. 4, p. 41102, 2006. [3] S. Bayram, H. T. Sencar, and N. Memon, “Source camera identification based on CFA interpolation,” in IEEE Int. Conf. Image Processing, Genova, Italy, 2005, pp. 69–72. [4] S. Bayram, H. T. Sencar, and N. Memon, “Improvements on source camera model identification based on CFA interpolation,” in Proc. IFIP WG 11.9 Int. Conf. Digital Forensics, Orlando, FL, 2006, pp. 24–27 [5] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan Kaufmann, 2002. [6] Z. Fan and R. L. de Queiroz, “Identification of bitmap compression history: JPEG detection and quantizer estimation,” IEEE Trans. Image Process., vol. 12, no. 2, pp. 230–235, 2003. [7] H. Farid, “Detecting digital forgeries using bispectral analysis,” AI Lab, Massachusetts Institute of Technology, Tech. Rep. AIM-1657, 1999. [8] H. Farid, “Digital image ballistics from JPEG quantization,” Dept. Comput. Sci., Dartmouth College, Tech. Rep. TR2006-583, 2006. [9] H. Farid and S. Lyu, “Higher-order wavelet statistics and their application to digital forensics,” in Proc. IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR), Madison, WI, 2003. [10] J. Fridrich, M. Chen, and M. Goljan, “Imaging sensor noise as digital x-ray for revealing forgeries,” in Proc. 9th Int. Workshop on Information Hiding, Sant Malo, France, 2007, pp. 342–358.