Skip to main content

Identifying Forged Images Using Image Metadata

  • Conference paper
  • First Online:
Proceedings of ICETIT 2019

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 605))

  • 1581 Accesses

Abstract

Nowadays, we receive, send and click a number of images frequently. Multimedia messages especially images can be easily transferred to anyone in no time and no cost just like text messages. There are many software easily available that can modify an image. With such a wide usage of images in communication networks it becomes difficult to conclude if an image is an original one or a forged one. This paper proposes the usage of image metadata, which is much smaller in size as compared to contents of an image, to authenticate an image. Further, the architecture of a system using a neural network is proposed which extracts attributes from the metadata of an image to predict if an image is an original one or a forged one. The system is also capable of predicting the operation applied and the software/tool used to modify the original image in case of a forged image. Experiments have been conducted on JPEG images which are modified with operations like Crop, Rotate, Resize, Compress, Compress_Rotate and Crop_Rotate to validate our system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rodríguez-Santos, F., Delgado-Gutiérrez, G., Palacios-Luengas, L., Vázquez-Medina, R., Culhuacan, E.: Practical implementation of a methodology for digital images authentication using forensics techniques. Adv. Comput. Sci.: Int. J. 4(6), 179–186 (2015)

    Google Scholar 

  2. Sellva Manoj, D.S., Sujatha, G.: Digitized authentication for image forensics. Int. J. Sci. Eng. Res. 4(5), 1771–1774 (2013)

    Google Scholar 

  3. Parthiban, R.: Image authentication using JPEG headers. Int. J. Eng. Res. Technol. 3(4), 323–326 (2014)

    Google Scholar 

  4. Harran, M., Farrelly, W., Curran, K.: A method of verifying integrity and authenticating digital media. Appl. Comput. Inform. 14(2), 145–158 (2018)

    Article  Google Scholar 

  5. Gangwar, D.P., Pathania, A.: Authentication of digital image using exif metadata and decoding properties. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 3(8), 335–341 (2018)

    Google Scholar 

  6. Salama, U., Varadharajan, V., Hitchens, M.: Metadata based forensic analysis of digital information in the web. In: Annual Symposium of Information Assurance and Secure Knowledge Management, Albany, NY, pp. 9–15 (2012)

    Google Scholar 

  7. Knoll, T., Knoll J.: Adobe Photoshop. https://www.adobe.com/in/products/photoshop.html. Accessed 10 Jan 2019

  8. Photoscape. http://www.photoscape.org/ps/main/index.php. Accessed 11 Feb 2019

  9. Gozalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Pearson, New York (2002)

    Google Scholar 

  10. Harvey, P.: The Exif Tool. http://owl.phy.queensu.ca/~phil/exiftool/. Accessed 20 Jan 2019

  11. ABC Homepage. https://www.abc.net.au/news/2017-06-23/what-your-photos-and-their-metadata-say-about-you/8642630. Accessed 21 Nov 2018

  12. BitmapInfoHeader structure. https://docs.microsoft.com/en-us/previous-versions//dd183376(v=vs.85). Accessed 10 Jan 2019

  13. W3C Recommendation: PNG (Portable Network Graphics) Specification, 2nd edn. https://www.w3.org/TR/2003/PR-PNG-20030520/index-noobject.html#11Chunks. Accessed 15 Jan 2019

  14. PNG (Portable Network Graphics) Specification, Version 1.2. http://www.libpng.org/pub/png/spec/1.2/PNG-Chunks.html. Accessed 05 Jan 2019

  15. Jpeg File Format and Layout. http://vip.sugovica.hu/Sardi/kenezo/JPEG%20File%20Layout%20and%20Format.htm. Accessed 08 Jan 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arti Dua .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bedi, P., Mittal, A., Gangwar, M., Dua, A. (2020). Identifying Forged Images Using Image Metadata. In: Singh, P., Panigrahi, B., Suryadevara, N., Sharma, S., Singh, A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605. Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_94

Download citation

Publish with us

Policies and ethics