Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 4, Issue 3, 2017, Page No: 23-29
doi:dx.doi.org/10.20431/2349-4859.0403004

Image Forensics Techniques for Robust Image Security: A Brief Survey

Harsh Mathur1,Dr.S.Veenadhari2

1.PhD Scholar, Aisect University.
2.Associate Professor, Aisect University, India.

Citation :Harsh Mathur,Dr.S.Veenadhari, Image Forensics Techniques for Robust Image Security: A Brief Survey International Journal of Research Studies in Computer Science and Engineering 2017,4(3) : 23-29

Abstract

The rising of Cyber Crime has drawn attention toward Digital Forensics and cyber security. it is a branch of forensic science which deals with cyber crime. It essentially includes the detection, recovery and investigation of material found in digital hardware. Digital images and recordings expect most basic part in digital crime scene investigation. They are the prime affirmations of any cyber-crime scene. So the commitment of the image is basic. Digital Photography is having a fast and constantly developing scattering as of late, since it licenses anyone to take a subjective number of good quality images, rapidly and at no cost, and to store them effortlessly on a significant number of digital support, or share them on the Internet. At the same time, with the wide availability of advanced tools for editing image like (e.g. Adobe Photoshop, Gimp),modifying a digital photo, with little or no obvious signs of tampering have become also very easy and widespread. A digitally modified image can be vague from a bona fide image. The altering, be that as it may, may bother some fundamental factual properties of the image. Under this assumption there are many different techniques are proposed that quantify and detect statistical perturbations found in different forms of tampered images. In these literature a comparative analysis and performance of some of them has evaluated.


Download Full paper: Click Here