Abstract

recent technologies in the field of image processing have necessitated the attention to the field of image forensics. Increase in cyber communication system and availability of advanced digital processing tools, in the past decades has given birth to forgery attempts. Irrespective of various approaches used to protect the Image, proving integrity of the image received in communication is a difficult issue. Under such circumstances, no image can be treated secure against breaches. Moreover, knowledge of the manipulation model is a must for detecting a certain type of tampering. The aim of this paper is to highlight new developments regarding detection of tampering in comparison of various schemata used in the past decades for forgery detection. An assortment of various models used for providing information security to image based on authentication, integrity and confidentiality is presented. Methods of tamper detection have been assessed over the type of attack. An in depth classification of types of image security has been proposed which emphasizes total security issues. The paper puts forward chief developments in schemata of tampering detection.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call