Abstract

Due to the availability of media editing software, the authenticity and reliability of digital images are important. Region manipulation is a simple and effective method for digital image forgeries...

Highlights

  • IntroductionIn today’s scenario, manipulating an image is an easy task due to the availability of sophisticated image editing tools like Photoshop, GIMP (GNU image manipulation program), the NIK collection (offered by Google) and many more software which make image editing easy

  • In today’s scenario, manipulating an image is an easy task due to the availability of sophisticated image editing tools like Photoshop, GIMP (GNU image manipulation program), the NIK collection and many more software which make image editing easy

  • Most of the attacks are implemented in MATLAB apart from JPEG compression which is applied through PIXresizer software

Read more

Summary

Introduction

In today’s scenario, manipulating an image is an easy task due to the availability of sophisticated image editing tools like Photoshop, GIMP (GNU image manipulation program), the NIK collection (offered by Google) and many more software which make image editing easy. Due to this fact relying on any image is hard to believe. The authenticity of an image is a big question that can be answered through different image manipulation detection techniques. Digital watermark or digital signature is embedded into the images to authenticate the originality of an image. We have to rely only on the intrinsic properties of image to detect the authenticity of an image

Methods
Findings
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.