Abstract
Nowadays, we receive, send and click a number of images frequently. Multimedia messages especially images can be easily transferred to anyone in no time and no cost just like text messages. There are many software easily available that can modify an image. With such a wide usage of images in communication networks it becomes difficult to conclude if an image is an original one or a forged one. This paper proposes the usage of image metadata, which is much smaller in size as compared to contents of an image, to authenticate an image. Further, the architecture of a system using a neural network is proposed which extracts attributes from the metadata of an image to predict if an image is an original one or a forged one. The system is also capable of predicting the operation applied and the software/tool used to modify the original image in case of a forged image. Experiments have been conducted on JPEG images which are modified with operations like Crop, Rotate, Resize, Compress, Compress_Rotate and Crop_Rotate to validate our system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
RodrÃguez-Santos, F., Delgado-Gutiérrez, G., Palacios-Luengas, L., Vázquez-Medina, R., Culhuacan, E.: Practical implementation of a methodology for digital images authentication using forensics techniques. Adv. Comput. Sci.: Int. J. 4(6), 179–186 (2015)
Sellva Manoj, D.S., Sujatha, G.: Digitized authentication for image forensics. Int. J. Sci. Eng. Res. 4(5), 1771–1774 (2013)
Parthiban, R.: Image authentication using JPEG headers. Int. J. Eng. Res. Technol. 3(4), 323–326 (2014)
Harran, M., Farrelly, W., Curran, K.: A method of verifying integrity and authenticating digital media. Appl. Comput. Inform. 14(2), 145–158 (2018)
Gangwar, D.P., Pathania, A.: Authentication of digital image using exif metadata and decoding properties. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 3(8), 335–341 (2018)
Salama, U., Varadharajan, V., Hitchens, M.: Metadata based forensic analysis of digital information in the web. In: Annual Symposium of Information Assurance and Secure Knowledge Management, Albany, NY, pp. 9–15 (2012)
Knoll, T., Knoll J.: Adobe Photoshop. https://www.adobe.com/in/products/photoshop.html. Accessed 10 Jan 2019
Photoscape. http://www.photoscape.org/ps/main/index.php. Accessed 11 Feb 2019
Gozalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Pearson, New York (2002)
Harvey, P.: The Exif Tool. http://owl.phy.queensu.ca/~phil/exiftool/. Accessed 20 Jan 2019
ABC Homepage. https://www.abc.net.au/news/2017-06-23/what-your-photos-and-their-metadata-say-about-you/8642630. Accessed 21 Nov 2018
BitmapInfoHeader structure. https://docs.microsoft.com/en-us/previous-versions//dd183376(v=vs.85). Accessed 10 Jan 2019
W3C Recommendation: PNG (Portable Network Graphics) Specification, 2nd edn. https://www.w3.org/TR/2003/PR-PNG-20030520/index-noobject.html#11Chunks. Accessed 15 Jan 2019
PNG (Portable Network Graphics) Specification, Version 1.2. http://www.libpng.org/pub/png/spec/1.2/PNG-Chunks.html. Accessed 05 Jan 2019
Jpeg File Format and Layout. http://vip.sugovica.hu/Sardi/kenezo/JPEG%20File%20Layout%20and%20Format.htm. Accessed 08 Jan 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Bedi, P., Mittal, A., Gangwar, M., Dua, A. (2020). Identifying Forged Images Using Image Metadata. In: Singh, P., Panigrahi, B., Suryadevara, N., Sharma, S., Singh, A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605. Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_94
Download citation
DOI: https://doi.org/10.1007/978-3-030-30577-2_94
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30576-5
Online ISBN: 978-3-030-30577-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)