Literature Survey
Literature Survey
Literature Survey
2 B.E Students, 7 th sem Information Science and Engineering, MIT Thandavapura, Mysore,
Karnataka, India
M. C. Stamm and K. J. R. Liu, [5] proposed M. Stamm and K. Liu [6] focuses on recovering
different methods not only for the detection of the possible information about the
global and local contrast enhancement but also unmodified version of image and the
for identifying the use of histogram operations used to modify it, once image
equalization and for the detection of the global alterations have been detected. An iterative
addition of noise to a previously JPEG- method based on probabilistic model is
compressed image. The methodologies used proposed to jointly estimate the contrast
are as follows. enhancement mapping used to alter the
image as well as the histogram of the
i). Detecting globally applied contrast unaltered version of the image. The
enhancement in image probabilistic model identifies the histogram
entries that are the most likely to occur with
Contrast enhancement operations are the corresponding enhancement artifacts.
viewed as non linear pixel mapping which
introduce artifacts into an image histogram.
Non linear mappings are separated into P. Ferrara, et al. [7] proposed a paper in
regions where the mapping is locally which a comparison between two forensic
contractive. The contract mapping maps techniques for the reverse engineering of a
multiple unique input pixel values to the same chain composed by a double JPEG
output pixel value. Result in the addition of compression interleaved by a linear contrast
sudden peak to an image histogram. enhancement is presented. The first approach
is based on the well known peak-to-valley
ii).Detecting locally applied contrast behaviour of the histogram of double-
enhancement in image quantized DCT coefficients, while the second
approach is based on the distribution of the
Contrast enhancement operation
first digit of DCT coefficients. These methods
may be locally applied to disguise visual clues
have been extended to the study of the
of image tampering. Localized detection of
considered processing chain, for both the
these operations can be used as evidence of
chain detection and the estimation of its
cut-and-paste type forgery. The forensic
parameters. More specifically, the proposed
technique is extended into a method to detect
approaches provide an estimation of the
such type of cut-and- paste forgery.
quality factor of the previous JPEG
compression and the amount of linear
iii).Detecting Histogram equalization in image
contrast enhancement.
Just like any other contrast
enhancement operation, histogram G. Cao, Y. Zhao, R. Ni and X. Li [8] proposed
equalization operation introduces sudden two novel algorithms to detect the contrast
peaks and gaps into an image histogram. The enhancement involved manipulations in
techniques are extended into method for digital images. First for detecting the contrast
detecting histogram equalization in image enhancement based manipulation involved in
JPEG compressed images and the second one
iv). Detecting Noise in image is used for detecting composite image. The
methodologies are:
Additive noise may be globally
applied to an image not only to cover visual i. Global Contrast Enhancement Detection
evidence of forgery, but also in an attempt to
destroy forensically significant indicators of Algorithm proposed in this paper, detects the
other tampering operations. Though the contrast enhancement not only in
uncompressed or high quality JPEG
compressed images but also in middle/low
quality ones. The main identifying feature of
gray level histogram used is zero-height gap
bin. Fig. 1 shows the definition of zero-height
4. CONCLUSION
This paper presents a brief survey on image
manipulation detection methods for contrast
enhanced and cut-and- paste type of forged
images. Many approaches have been proposed
for such type of retouching forgery detection,
each one has certain merits and demerits. The
techniques described in [8] overcome the
gap bin. limitations of previous approaches. The
techniques that are robust against the post
processing operations and anti-forensic
Fig 1: Definition of zero-height gap techniques need to be developed.
bin
REFERENCES
[1] S. Bayram, I. Avcubas, B. Sankur, and N.
ii. Identify Source-Enhanced Composite Memon, “Image manipulation detection,” J.
Images Electron. Imag., vol. 15, no. 4, pp. 04110201–
04110217, 2006.
A novel algorithm is proposed to identify the
source-enhanced composite image created by [2] A. Swaminathan, M. Wu, and K. J. R. Liu,
enforcing contrast adjustment on either single “Digital image forensics via intrinsic
fingerprints,” IEEE Trans. Inf. Forensics
Security, vol. 3, no. 1, pp. 101–117, Mar. 2008.
BIOGRAPHIES
HEMANTH K.M
Currently pursuing B.E in
Information Science and
Engineering under V T U,
Karnataka in Maharaja Institution
of Technology Thandavapura
Mysore
Ganesh P Hegde
Currently pursuing B.E in
Information Science and
Engineering under V T U,
Karnataka in Maharaja Institution
of Technology Thandavapura
Mysore