Skip to main content

Sab - íomha: An Automated Image Forgery Detection Technique Using Alpha Channel Steganography

  • Conference paper
  • First Online:
Recent Advances in Information Systems and Technologies (WorldCIST 2017)

Abstract

Digital images nowadays have become a very popular way to transfer media. However, their security remains very challenging for at least two reasons; first, images can be easily tampered with the help of software tools; second, originality of the tampered images cannot be verified through a naked-eye.

The existing techniques to forgery detection are not very easy to use and are applicable to very specific settings. In this research paper, we propose a light-weight technique named Sab - íomha to detect image forgery. The approach uses invisible watermarking and entails with inserting a hidden cipher to certain bits of an image file. Any attempts to tamper with the image distort the sequence of the bits signed by the author in the first place. A software tool is also developed to automate the proposed technique and to demonstrate its usefulness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Harris C., Stephens M.: A combined corner and edge detector. In: Proceedings of the Alvey Vision Conference, pp. 147–151. IEEE Press (1988)

    Google Scholar 

  2. Bay, H., Ess, A., Tuytelaars, T., Gool, L.V.: Surf: speeded up robust features. Comput. Vis. Image Underst. 110(3), 346–359 (2008)

    Article  Google Scholar 

  3. Schetinger V., Oliveira M.M., da Silva R., Carvalho T.J.: Humans are easily fooled by digital images. CoRR, vol. abs/1509.05301 (2015). http://arxiv.org/abs/1509.05301

  4. Farid., H.: A survey of image forgery detection. IEEE Sig. Process. Mag. 26(2), 16–25 (2009)

    Article  Google Scholar 

  5. Fan W., Wang K., Cayre F., Xiong Z.: A variational approach to JPEG anti-forensics. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3058–3062. IEEE Press (2013)

    Google Scholar 

  6. de Carvalho, T.J., Riess, C., Angelopoulou, E., Pedrini, H., de Rezende Rocha, A.: Exposing digital image forgeries by illumination color classification. IEEE Trans. Inf. Forensics Secur. 8(7), 1182–1194 (2013)

    Article  Google Scholar 

  7. Kirchner, M., Winkler, P., Farid, H.: Impeding forgers at photo inception. In: Proceedings of SPIE Conference on Media Watermarking Security and Forensics (2013)

    Google Scholar 

  8. O’Brien, J.F., Farid, H.: Exposing photo manipulation with inconsistent reflections. ACM Trans. Graph. (TOG) 31(1), 1–11 (2012)

    Article  Google Scholar 

  9. Conotter, V., Boato, G., Farid, H.: Detecting photo manipulation on signs and billboards. In: Proceedings of the International Conference on Image Processing, pp. 1741–1744. IEEE Press (2010)

    Google Scholar 

  10. Kee, E., Farid, H.: Digital image authentication from thumbnails. In: Proceedings of the SPIE 7541, Media Forensics and Security II (2010)

    Google Scholar 

  11. Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. Image Process. 8(1), 58–68 (1999)

    Article  Google Scholar 

  12. Luo, W., Qu, Z., Pan, F., Huang, J.: A survey of passive technology for digital image forensics. Front. Comput. Sci. China 1, 166–179 (2007)

    Article  Google Scholar 

  13. Johnson, M.K., Farid, H.: Exposing digital forgeries in complex lighting environments. IEEE Trans. Inf. Forensics Secur. 3(2), 450–461 (2007)

    Article  Google Scholar 

  14. Fan, W., Wang, K., Cayre, F., Xiong, Z.: 3D lighting-based image forgery detection using shape- from-shading. In: Proceedings of the European Conference on Signal Processing, pp. 1777–1781 (2012)

    Google Scholar 

  15. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Shahid Bhatti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Bhatti, M.S., Hussain, S.A., Qayyum, A., Latif, I., Hasnain, M., Hashmi, S.I. (2017). Sab - íomha: An Automated Image Forgery Detection Technique Using Alpha Channel Steganography. In: Rocha, Á., Correia, A., Adeli, H., Reis, L., Costanzo, S. (eds) Recent Advances in Information Systems and Technologies. WorldCIST 2017. Advances in Intelligent Systems and Computing, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-56538-5_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56538-5_74

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56537-8

  • Online ISBN: 978-3-319-56538-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics