(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Image Processing and Computer Vision (TIPCV)

ISSN (Print):    ISSN (Online):2455-4707
Volume-8 Issue-23 February-2022
Full-Text PDF
Paper Title : A review and analysis of digital image forensic techniques
Author Name : Chaitanaya Singh and M. Adil Hashmi
Abstract :

In recent times, the popularity of digital photographs has increased due to their ability to convey more information than conventional image and text content. However, their easy accessibility has made ensuring their security a major concern. Therefore, serious problems can be quite challenging to minimize when testing and evaluating the validity of a study problem and identifying malevolent intruders. To address these challenges, various digital image forensics techniques have been proposed by numerous researchers to identify the forensics of an image and verify its content. The passive method and the active approach are the two most used techniques in digital forensics. In this paper, a digital image security forensics technique with different machine learning and deep learning classifiers was reviewed to demonstrate the effectiveness of the approach. The use of these techniques was explored to enhance the accuracy of digital image forensics.

Keywords : Digital photographs, Image forensics, Security, Machine learning.
Cite this article : Singh C, Hashmi MA. A review and analysis of digital image forensic techniques. ACCENTS Transactions on Image Processing and Computer Vision. 2022; 8 (23): 1-6. DOI:10.19101/TIPCV.2022.823001.
References :
[1]Zhang Y, Yan Y, Feng G. Feature compensation network based on non-uniform quantization of channels for digital image global manipulation forensics. Signal Processing: Image Communication. 2022; 107.
[Crossref] [Google Scholar]
[2]El-Bendary MA, Faragallah OS, Nassar SS. An efficient hidden marking approach for forensic and contents verification of digital images. Multimedia Tools and Applications. 2023:1-32.
[Crossref] [Google Scholar]
[3]Akbari Y, Al-maadeed S, Elharrouss O, Khelifi F, Lawgaly A, Bouridane A. Digital forensic analysis for source video identification: a survey. Forensic Science International: Digital Investigation. 2022.
[Crossref] [Google Scholar]
[4]Liu K, Li J, Hussain Bukhari SS. Overview of image inpainting and forensic technology. Security and Communication Networks. 2022; 2022:1-27.
[Crossref] [Google Scholar]
[5]Liu C. A proposal of digital image steganography and forensics based on the structure of file storage. In proceedings of the 11th international conference on computer engineering and networks 2022 (pp. 731-40). Springer Singapore.
[Crossref] [Google Scholar]
[6]Akbari Y, Al-Maadeed S, Al-Maadeed N, Al-Ali A, Khelifi F, Lawgaly A. A new forensic video database for source smartphone identification: description and analysis. IEEE Access. 2022; 10:20080-91.
[Crossref] [Google Scholar]
[7]Muhammad NA, Fatima R. Role of image processing in digital forensics and cybercrime detection. International Journal of Computational and Innovative Sciences. 2022; 1(1):1-4.
[Google Scholar]
[8]Bernacki J, Scherer R. Digital forensics: a fast algorithm for a digital sensor identification. Journal of Information and Telecommunication. 2022; 6(4):399-419.
[Crossref] [Google Scholar]
[9]Bansal D, Passi A. Image forgery detection and localization using block based and key-point based feature matching forensic investigation. Wireless Personal Communications. 2022:1-7.
[Crossref] [Google Scholar]
[10]Khan AA, Shaikh AA, Laghari AA, Dootio MA, Rind MM, Awan SA. Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction. International Journal of Electronic Security and Digital Forensics. 2022; 14(2):124-50.
[Crossref] [Google Scholar]
[11]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[12]Arava K, Paritala C, Shariff V, Praveen SP, Madhuri A. A generalized model for identifying fake digital images through the application of deep learning. In 3rd international conference on electronics and sustainable communication systems 2022 (pp. 1144-7). IEEE.
[Crossref] [Google Scholar]
[13]Saleem M, Warsi MR, Islam S. Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. Journal of Information Security and Applications. 2023.
[Crossref] [Google Scholar]
[14]Shahbazi Z, Byun YC. NLP-based digital forensic analysis for online social network based on system security. International Journal of Environmental Research and Public Health. 2022; 19(12).
[Crossref] [Google Scholar]
[15]Zhu N, Liu Z. Recaptured image forensics based on local ternary count of high order prediction error. Signal Processing: Image Communication. 2022.
[Crossref] [Google Scholar]
[16]Patil SS, Patidar K, Saxena G, Sharma N. A study and analysis of image security algorithms and the current challenges. ACCENTS Transactions on Image Processing and Computer Vision. 2021; 7(22): 1-6.
[Crossref]
[17]Alyahya H, Ismail MM, Al-Salman A. Deep ensemble neural networks for recognizing isolated Arabic handwritten characters. ACCENTS Transactions on Image Processing and Computer Vision. 2020; 6(21):68-79.
[Crossref] [Google Scholar]
[18]Das D, Bose P, Ruaro N, Kruegel C, Vigna G. Understanding security issues in the NFT ecosystem. In proceedings of the ACM SIGSAC conference on computer and communications security 2022 (pp. 667-81).
[Crossref] [Google Scholar]
[19]Rustad S, Syukur A, Andono PN. Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University-Computer and Information Sciences. 2022; 34(6):3559-68.
[Crossref] [Google Scholar]
[20]Prasanalakshmi B, Murugan K, Srinivasan K, Shridevi S, Shamsudheen S, Hu YC. Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography. The Journal of Supercomputing. 2022; 78(1):361-78.
[Crossref] [Google Scholar]
[21]Lin X, Li JH, Wang SL, Cheng F, Huang XS. Recent advances in passive digital image security forensics: a brief review. Engineering. 2018; 4(1):29-39.
[Crossref] [Google Scholar]
[22]Shuja SM, Khan RF, Shah MA, Khattak HA, Abbass A, Khan SU. On efficiency of scrambled image forensics service using support vector machine. In Services–SERVICES 2019: 15th world congress, held as part of the services conference federation, SCF 2019, San Diego, CA, USA, , Proceedings 2019 (pp. 16-30). Springer International Publishing.
[Crossref] [Google Scholar]
[23]Boato G, Dang-Nguyen DT, De Natale FG. Morphological filter detector for image forensics applications. IEEE Access. 2020; 8:13549-60.
[Crossref] [Google Scholar]
[24]Aditya K, Grzonkowski S, Lekhac NA. Enabling trust in deep learning models: a digital forensics case study. In international conference on trust, security and privacy in computing and communications/12th international conference on big data science and engineering (TrustCom/BigDataSE) 2018 (pp. 1250-5). IEEE.
[Crossref] [Google Scholar]
[25]Kakkad V, Patel M, Shah M. Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidisciplinary Modeling, Experiments and Design. 2019; 2:233-48.
[Crossref] [Google Scholar]
[26]Karthika P, Vidhya SP. Image security performance analysis for SVM and ANN classification techniques. International Journal of Recent Technology and Engineering. 2019; 8(4S2):436-42.
[Google Scholar]
[27]Cha S, Kang U, Choi E. The image forensics analysis of jpeg image manipulation (lightning talk). In international conference on software security and assurance (ICSSA) 2018 (pp. 82-5). IEEE.
[Crossref] [Google Scholar]
[28]Elkandoz MT, Alexan W, Hussein HH. Double-layer image security scheme with aggregated mathematical sequences. In international conference on advanced communication technologies and networking (CommNet) 2019 (pp. 1-7). IEEE.
[Crossref] [Google Scholar]
[29]Karthika P, Babu RG, Jayaram K. Biometric based on steganography image security in wireless sensor networks. Procedia Computer Science. 2020; 167:1291-9.
[Crossref] [Google Scholar]
[30]Roy A, Dixit R, Naskar R, Chakraborty RS. Digital image forensics. Singapore: Springer; 2020.
[Crossref] [Google Scholar]
[31]Babu RG, Karthika P, Elangovan K. Performance analysis for image security using SVM and ANN classification techniques. In 3rd international conference on electronics, communication and aerospace technology 2019 (pp. 460-5). IEEE.
[Crossref] [Google Scholar]
[32]Shankar K, Lakshmanaprabu SK. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology. 2018; 7(9):22-7.
[Google Scholar]
[33]Susanto A, Rachmawanto EH, Mulyono IU, Sari CA, Sarker MK, Sazal MR. Triple layer image security using bit-shift, chaos, and stream encryption. Bulletin of Electrical Engineering and Informatics. 2020; 9(3):980-7.
[Crossref] [Google Scholar]
[34]Hasan MK, Islam S, Sulaiman R, Khan S, Hashim AH, Habib S, et al. Lightweight encryption technique to enhance medical image security on internet of medical things applications. IEEE Access. 2021; 9:47731-42.
[Crossref] [Google Scholar]
[35]Arora H, Soni GK, Kushwaha RK, Prasoon P. Digital image security based on the hybrid model of image hiding and encryption. In 6th international conference on communication and electronics systems 2021 (pp. 1153-7). IEEE.
[Crossref] [Google Scholar]
[36]Kumar M, Kumar S, Nagar H. Comparative analysis of different steganography technique for image or data security. International Journal of Advanced Science & Technology. 2020; 29(4): 11246-53.
[Google Scholar]
[37]Barni M, Kallas K, Nowroozi E, Tondi B. On the transferability of adversarial examples against CNN-based image forensics. In international conference on acoustics, speech and signal processing (ICASSP) 2019 (pp. 8286-90). IEEE.
[Crossref] [Google Scholar]
[38]Sun Y, Shen X, Liu C, Zhao Y. Recaptured image forensics algorithm based on image texture feature. International Journal of Pattern Recognition and Artificial Intelligence. 2020; 34(03).
[Crossref] [Google Scholar]
[39]Yang P, Baracchi D, Ni R, Zhao Y, Argenti F, Piva A. A survey of deep learning-based source image forensics. Journal of Imaging. 2020; 6(3):1-24.
[Crossref] [Google Scholar]
[40]Chen Y, Kang X, Wang ZJ, Zhang Q. Densely connected convolutional neural network for multi-purpose image forensics under anti-forensic attacks. In proceedings of the 6th ACM workshop on information hiding and multimedia security 2018 (pp. 91-6).
[Crossref] [Google Scholar]
[41]Chen Q, Liao Q, Jiang ZL, Fang J, Yiu S, Xi G, et al. File fragment classification using grayscale image conversion and deep learning in digital forensics. In security and privacy workshops (SPW) 2018 (pp. 140-7). IEEE.
[Crossref] [Google Scholar]
[42]Ferreira WD, Ferreira CB, da Cruz Júnior G, Soares F. A review of digital image forensics. Computers & Electrical Engineering. 2020; 85:106685.
[Crossref] [Google Scholar]