Fraud and Tamper Detection in Authenticity Verification through Gradient Based Image Reconstruction Technique for Security Systems

Authenticity verification for security systems is a very important research problem with respect to information security. One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law. Image editing software like Adobe Photoshop, Maya etc. and technically advanced digital photography are used to edit, manipulate or tamper the images easily without living obvious visual clues. The abusive use of digital forgeries has become a serious problem in various fields like authenticity verification, medical imaging, digital forensic, journalism, scientific publications etc. To carry out such forensic analysis, various technological instruments have been developed in the literature. In this paper the problem of detecting if an image has been forged is investigated. To detect tampering and forging, a novel methodology based on gradient based image reconstruction is proposed. Our method verifies the authenticity of image in two phases- modeling phase; where the image is reconstructed from its gradients by solving a poisson equation and forming a knowledge based model and simulation phase; where the absolute difference method and histogram matching criterion between the original and test image is used. Such a method allows concluding that if a tampering has occurred. Experimental results are presented to demonstrate the performance of our gradient- based image reconstruction approach and confirm that the technique is able to verify whether a forged image is presented to a security system for authenticity verification. Through this unique mechanism, one can secure the most reliable information and forging or tampering of images for gaining false authentication and hence fraud can be detected.

[1]  Hany Farid,et al.  Photo Fakery and Forensics , 2009, Adv. Comput..

[2]  Gerald Sommer,et al.  Phase Based Image Reconstruction in the Monogenic Scale Space , 2004, DAGM-Symposium.

[3]  Dani Lischinski,et al.  Gradient Domain High Dynamic Range Compression , 2023 .

[4]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[5]  Roberto Caldelli,et al.  A DFT-Based Analysis to Discern Between Camera and Scanned Images , 2010, Int. J. Digit. Crime Forensics.

[6]  Charlie C. L. Wang,et al.  Gradient based image completion by solving the Poisson equation , 2007, Comput. Graph..

[7]  William H. Press,et al.  The Art of Scientific Computing Second Edition , 1998 .

[8]  Patrick Pérez,et al.  Poisson image editing , 2003, ACM Trans. Graph..

[9]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[10]  Jian Sun,et al.  Poisson matting , 2004, ACM Trans. Graph..

[11]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[12]  Ramesh Raskar,et al.  Removing photography artifacts using gradient projection and flash-exposure sampling , 2005, SIGGRAPH 2005.

[13]  Jiaya Jia,et al.  Poisson matting , 2004, SIGGRAPH 2004.

[14]  David Salesin,et al.  Interactive digital photomontage , 2004, SIGGRAPH 2004.

[15]  H. Farid A Survey of Image Forgery Detection , 2008 .

[16]  Patrick Pérez,et al.  Reconstructing an image from its local descriptors , 2011, CVPR 2011.

[17]  F. A. Seiler,et al.  Numerical Recipes in C: The Art of Scientific Computing , 1989 .

[18]  Jan P. Allebach,et al.  Forensic techniques for classifying scanner, computer generated and digital camera images , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[19]  Nikos Papamarkos,et al.  Exact image reconstruction from a limited number of projections , 2008, J. Vis. Commun. Image Represent..

[20]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[21]  S. Leng,et al.  Exact fan-beam image reconstruction algorithm for truncated projection data acquired from an asymmetric half-size detector , 2005, Physics in medicine and biology.

[22]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[23]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[24]  Ramesh Raskar,et al.  Image fusion for context enhancement and video surrealism , 2004, NPAR '04.

[25]  Ramesh Raskar,et al.  Non-photorealistic camera: depth edge detection and stylized rendering using multi-flash imaging , 2004, SIGGRAPH 2004.

[26]  Luc Vincent,et al.  Morphological grayscale reconstruction in image analysis: applications and efficient algorithms , 1993, IEEE Trans. Image Process..

[27]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.