Active Image Forgery Detection Using Cellular Automata
The adequate potential of digital images and the ease in their storage and distribution is such that they are more and more exploited to supply information in this digital epoch. As a consequence, they indicate a public source of evidence in our everyday life. Beside their benefits, the accessibility of them could bring a major detriment as they can be modified easily by a media processing application.
Detection of tampering with digital images is still an open work in the image processing domain. Over the past years there has been a swift expansion in the designing and developing of image forgery detection algorithms plus related software applications. All these algorithms are divided into two groups: active and passive. In the active approaches, we create and embed invaluable data as a cipher key into the original image to protect it against the forgery,while in the passive methods we only investigate some features of the image such as statistical anomalies, correlations and compressions to detect forgery.
This chapter presents an in-depth exploration of issues related to active digital image forgery detection algorithms which are derived from cellular automata. The aim of this chapter is to give a brief but comprehensive overview of the usage of cellular automata to develop active image forgery detection techniques. We conclude with experimental results in this topic and discuss future works in image forgery detection using cellular automata.
KeywordsCellular Automaton Image Encryption Stream Cipher Lower Upper Forgery Detection
Unable to display preview. Download preview PDF.
- 1.Anoop, S., Alakkaran, A.: A full image encryption scheme based on transform domains and stream ciphers. International Journal of Advanced Information Science and Technology 17(17), 5–10 (2013)Google Scholar
- 3.Bovik, A.C.: The essential guide to image processing. Academic Press (2009)Google Scholar
- 4.Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2007)Google Scholar
- 6.Golub, G.H., van Van Loan, C.F.: Matrix computations (Johns Hopkins studies in mathematical sciences), 3rd edn. The Johns Hopkins University Press (1996)Google Scholar
- 7.Intel: Sse4 programming reference. D91561 (2007)Google Scholar
- 8.Jin, J.: An image encryption based on elementary cellular automata. Optics and Lasers in Engineering (2012)Google Scholar
- 9.Krikor, L., Shaaban, Z.: Image encryption using DCT and stream cipher. European Journal of Scientific Research 32(1), 47–57 (2009)Google Scholar
- 12.Panda, S.P., Sahu, M., Rout, U.P., Nanda, S.K.: Encryption and decryption algorithm using two dimensional cellular automata rules in cryptography. International Journal of Communication Network & Security 1, 18–23 (2011)Google Scholar
- 14.Sharma, P., Lal, N., Diwakar, M.: Text security using 2d cellular automata rules. In: Proceedings of the Conference on Advances in Communication and Control Systems 2013. Atlantis Press (2013)Google Scholar
- 15.Stallings, W.: Cryptography and Network Security, 3rd edn. Practice Hall (2003)Google Scholar
- 16.Tafti, A.P., Malakooti, M., Ashourian, M., Janosepah, S.: Digital image forgery detection through data embedding in spatial domain and cellular automata. In: Int. Conf. on Digital Content, Multimedia Technology and its Applications (IDCTA), pp. 11–15 (2011)Google Scholar
- 17.Toffoli, T., Margolus, N.: Cellular Automata Machines: A new environment for modelling. MIT press (1987)Google Scholar
- 18.Urias, J.: Cryptography primitives based on a cellular automaton. In: Coding Theory, Cryptography and Related Areas, pp. 244–248 (2000)Google Scholar
- 19.Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of the ACIVS Advanced Concepts for Intelligent Vision Systems (2002)Google Scholar
- 20.Xiaoyang, Y., Yang, S., Yang, Y., Shuchun, Y., Hao, C., Yanxia, G.: An encryption method for QR code image based on ECA. International Journal of Security & Its Applications 7(5) (2013)Google Scholar