Active Image Forgery Detection Using Cellular Automata

  • Ahmad Pahlavan Tafti
  • Hamid Hassannia
Part of the Emergence, Complexity and Computation book series (ECC, volume 10)


The adequate potential of digital images and the ease in their storage and distribution is such that they are more and more exploited to supply information in this digital epoch. As a consequence, they indicate a public source of evidence in our everyday life. Beside their benefits, the accessibility of them could bring a major detriment as they can be modified easily by a media processing application.

Detection of tampering with digital images is still an open work in the image processing domain. Over the past years there has been a swift expansion in the designing and developing of image forgery detection algorithms plus related software applications. All these algorithms are divided into two groups: active and passive. In the active approaches, we create and embed invaluable data as a cipher key into the original image to protect it against the forgery,while in the passive methods we only investigate some features of the image such as statistical anomalies, correlations and compressions to detect forgery.

This chapter presents an in-depth exploration of issues related to active digital image forgery detection algorithms which are derived from cellular automata. The aim of this chapter is to give a brief but comprehensive overview of the usage of cellular automata to develop active image forgery detection techniques. We conclude with experimental results in this topic and discuss future works in image forgery detection using cellular automata.


Cellular Automaton Image Encryption Stream Cipher Lower Upper Forgery Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anoop, S., Alakkaran, A.: A full image encryption scheme based on transform domains and stream ciphers. International Journal of Advanced Information Science and Technology 17(17), 5–10 (2013)Google Scholar
  2. 2.
    Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: A survey. Digital Investigation 10(3), 226–245 (2013)CrossRefGoogle Scholar
  3. 3.
    Bovik, A.C.: The essential guide to image processing. Academic Press (2009)Google Scholar
  4. 4.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2007)Google Scholar
  5. 5.
    Farid, H.: Image forgery detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)CrossRefGoogle Scholar
  6. 6.
    Golub, G.H., van Van Loan, C.F.: Matrix computations (Johns Hopkins studies in mathematical sciences), 3rd edn. The Johns Hopkins University Press (1996)Google Scholar
  7. 7.
    Intel: Sse4 programming reference. D91561 (2007)Google Scholar
  8. 8.
    Jin, J.: An image encryption based on elementary cellular automata. Optics and Lasers in Engineering (2012)Google Scholar
  9. 9.
    Krikor, L., Shaaban, Z.: Image encryption using DCT and stream cipher. European Journal of Scientific Research 32(1), 47–57 (2009)Google Scholar
  10. 10.
    Lafe, O.: Data compression and encryption using cellular automata transforms. Engineering Applications of Artificial Intelligence 10(6), 581–591 (1997)CrossRefGoogle Scholar
  11. 11.
    Mao, K.: Identifying critical variables of principal components for unsupervised feature selection. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35(2), 339–344 (2005)CrossRefGoogle Scholar
  12. 12.
    Panda, S.P., Sahu, M., Rout, U.P., Nanda, S.K.: Encryption and decryption algorithm using two dimensional cellular automata rules in cryptography. International Journal of Communication Network & Security 1, 18–23 (2011)Google Scholar
  13. 13.
    Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 9(3), 279–287 (2003)CrossRefGoogle Scholar
  14. 14.
    Sharma, P., Lal, N., Diwakar, M.: Text security using 2d cellular automata rules. In: Proceedings of the Conference on Advances in Communication and Control Systems 2013. Atlantis Press (2013)Google Scholar
  15. 15.
    Stallings, W.: Cryptography and Network Security, 3rd edn. Practice Hall (2003)Google Scholar
  16. 16.
    Tafti, A.P., Malakooti, M., Ashourian, M., Janosepah, S.: Digital image forgery detection through data embedding in spatial domain and cellular automata. In: Int. Conf. on Digital Content, Multimedia Technology and its Applications (IDCTA), pp. 11–15 (2011)Google Scholar
  17. 17.
    Toffoli, T., Margolus, N.: Cellular Automata Machines: A new environment for modelling. MIT press (1987)Google Scholar
  18. 18.
    Urias, J.: Cryptography primitives based on a cellular automaton. In: Coding Theory, Cryptography and Related Areas, pp. 244–248 (2000)Google Scholar
  19. 19.
    Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of the ACIVS Advanced Concepts for Intelligent Vision Systems (2002)Google Scholar
  20. 20.
    Xiaoyang, Y., Yang, S., Yang, Y., Shuchun, Y., Hao, C., Yanxia, G.: An encryption method for QR code image based on ECA. International Journal of Security & Its Applications 7(5) (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.University of WisconsinMilwaukeeUSA
  2. 2.Department of Advanced ComputingFan Pardaz Higher Education InstituteTehranIran

Personalised recommendations