Skip to main content

Authenticity and Integrity Enhanced Active Digital Image Forensics Based on Visual Cryptography

  • Conference paper
  • First Online:
Book cover Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 105))

Abstract

Digital image forensics is an emerging research area which focuses on validating the authenticity, integrity of images, and detection of image forgeries. Digital image watermarking and digital signatures are presently used in active digital image forensics, but these methods provide only the authenticity and certain level of integrity and robustness. In this paper, we proposed a new method for active digital image forensics based on visual cryptographic schemes which provide improved authenticity, confidentiality, integrity, and robustness. Here, we have presented an overview of active digital image forensics and visual cryptographic schemes which have been discussed based on several studies. We have also discussed the demerits of the existing model and proposed a new model for image authentication and tampering detection. The proposed method is demonstrated with a simple example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Redi, J.A., Taktak, W., Dugelay, J.-L.: Digital image forensics: a booklet for beginners. Multimed Tools Appl. 51(1), 133–162 (2011). https://doi.org/10.1007/s11042-010-0620-1(Springerlink.com)

    Article  Google Scholar 

  2. Carvalho, T., Faria, F.A., Pedrini, H., Torres, R.D.S., Rocha, A.: Illuminant-based transformed spaces for image forensics. IEEE Trans. Inf. Forensics Security 11(4), 720–733 (2016). (IEEE) https://doi.org/10.1109/tifs.2015.2506548

    Article  Google Scholar 

  3. Warbhe, A.D., Dharaskar, R.V., Thakare, V.M.: Computationally Efficient Digital Image Forensic Method for Image Authentication. Procedia Computer Sci. 78, 464–470 (2016). (Elsevier), https://doi.org/10.1016/j.procs.2016.02.089

    Article  Google Scholar 

  4. Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Security 10, 2084–2094 (2015). (IEEE) https://doi.org/10.1109/tifs.2015.2445742

    Article  Google Scholar 

  5. Bahrami, K., Kot, A.C., Li, L., Li, H.: Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans. Inf. Forensics Security 10(5), 999–1009 (2015). (IEEE) https://doi.org/10.1109/tifs.2015.2394231

    Article  Google Scholar 

  6. Naor, M., Shamir, A.: Visual Cryptography, Advances in Cryptology-Eurocrypt’94. LNCS 950, pp. 1–12 (1995)

    Google Scholar 

  7. Monoth, T., Anto, B.P.: Analysis and design of tamperproof and contrast-enhanced secret sharing based on visual cryptography schemes. Ph.D thesis, Kannur University, Kerala, India, (2012). http://shodhganga.inflibnet.ac.in

  8. Hwang, K.-F.: Chang, C.-C.: Recent development of visual cryptography. In: Intelligent Watermarking Techniques, Chap. 16, pp. 459–479, (2004) World Scientific

    Chapter  Google Scholar 

  9. Singh, M.N. Joshi, S.: Digital image forensics: progress and challenges. In: Proceedings of 31st National convention of Electronics and Telecommunication Engineers, Researchgate (October 2015)

    Google Scholar 

  10. Singh, S., Bhardwaj, R.: Image Forgery detection using QR method based on one dimensional cellular automata. In: Ninth International Conference on Contemporary Computing (IC3) 2016, IEEE Explore (2017). https://doi.org/10.1109/ic3.2016.7880197

  11. Komal, S., Mehta, A.K.: A review on digital watermarking techniques. Appl. Attacks. IJECS 4, 11237–11245, 015

    Google Scholar 

  12. Monoth, T., Babu, A.P.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010). (ELSEVIER)

    Article  Google Scholar 

  13. Tyagi, S., Singh, H.V., Agarwal, R., Gangwar, S.K.: Digital watermarking techniques for security applications. In: International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES–16), IEEE Explore (2016). https://doi.org/10.1109/iceteeses.2016.7581413

  14. Guojuan, Z., Dianji, L.: An Overview of digital watermarking in image forensics. In: Fourth International Joint Conference on Computational Sciences and Optimization (CSO), IEEE Xplore (2011). https://doi.org/10.1109/cso.2011.85

  15. Yadav, U., Sharma J.P., Sharma, D., Sharma, P.K.: Different watermarking techniques & its applications: a review. Int. J. Sci. Eng. Res. 5(4) (2014)

    Google Scholar 

  16. Singh, P,. Chadha, R.S.: A Survey of digital watermarking techniques, applications and attacks. Int. J.Eng. Innovative Technol. (IJEIT), 2(9) (March 2013)

    Google Scholar 

  17. Durvey, M., Satyarthi, D.: A review paper on digital watermarking. Int. J. Emerging Trends & Technol. Comput. Sci. (IJETTCS) 3(4) (2014)

    Google Scholar 

  18. Kusuma Kumari, B.M.: A Survey of digital watermarking techniques and its applications. Int. J. Sci. Res. (IJSR), 2(12) (2013)

    Google Scholar 

  19. von Wangenheim, A., Custódio, R.F., Martina, J.E., de Back Giuliano, I., Andrade, R.: Digital signature of medical reports: an issue still not resolved. Revista da Associação Médica Brasileira (English Edition), 59(3), 209–212 (January 2013). (ELSEVIER)

    Google Scholar 

  20. Liu, C.: Security analysis of liu-zhang-deng digital signature scheme. In: 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014), Procedia Computer Science 32, pp. 485–488 (2014). (ELSEVIER)

    Article  Google Scholar 

  21. Heckeroth, J., Boywitt, C.D.: Examining authenticity: an initial exploration of the suitability of handwritten electronic signatures. Forensic Sci. Int. 275, 144–154 (2017). (ELSEVIER)

    Article  Google Scholar 

  22. Fernández-Alemán, J.L., Señor, I.C., Lozoya, P.Á.O., Toval, A.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Inf. 46, 541–562 (2013). (ELSEVIER)

    Article  Google Scholar 

  23. Hodeisha, M.E., Bukauskasb, L., Humbe, V.T.: An Optimal (k, n) visual secret sharing scheme for information security. In: 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6–8 September 2016, Cochin, India Procedia Computer Science, vol. 93, pp. 760–767,2016. (ELSEVIER)

    Google Scholar 

  24. Dahata, A.V., Chavan, P.V.: Secret sharing based visual cryptography scheme using CMY color space. Procedia Comput. Sci. 78:563–570 (2016). (ELSEVIER)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. E. Jisha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jisha, T.E., Monoth, T. (2019). Authenticity and Integrity Enhanced Active Digital Image Forensics Based on Visual Cryptography. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 105. Springer, Singapore. https://doi.org/10.1007/978-981-13-1927-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1927-3_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1926-6

  • Online ISBN: 978-981-13-1927-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics