Abstract
The adequate potential of digital images and the ease in their storage and distribution is such that they are more and more exploited to supply information in this digital epoch. As a consequence, they indicate a public source of evidence in our everyday life. Beside their benefits, the accessibility of them could bring a major detriment as they can be modified easily by a media processing application.
Detection of tampering with digital images is still an open work in the image processing domain. Over the past years there has been a swift expansion in the designing and developing of image forgery detection algorithms plus related software applications. All these algorithms are divided into two groups: active and passive. In the active approaches, we create and embed invaluable data as a cipher key into the original image to protect it against the forgery,while in the passive methods we only investigate some features of the image such as statistical anomalies, correlations and compressions to detect forgery.
This chapter presents an in-depth exploration of issues related to active digital image forgery detection algorithms which are derived from cellular automata. The aim of this chapter is to give a brief but comprehensive overview of the usage of cellular automata to develop active image forgery detection techniques. We conclude with experimental results in this topic and discuss future works in image forgery detection using cellular automata.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anoop, S., Alakkaran, A.: A full image encryption scheme based on transform domains and stream ciphers. International Journal of Advanced Information Science and Technology 17(17), 5–10 (2013)
Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: A survey. Digital Investigation 10(3), 226–245 (2013)
Bovik, A.C.: The essential guide to image processing. Academic Press (2009)
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2007)
Farid, H.: Image forgery detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)
Golub, G.H., van Van Loan, C.F.: Matrix computations (Johns Hopkins studies in mathematical sciences), 3rd edn. The Johns Hopkins University Press (1996)
Intel: Sse4 programming reference. D91561 (2007)
Jin, J.: An image encryption based on elementary cellular automata. Optics and Lasers in Engineering (2012)
Krikor, L., Shaaban, Z.: Image encryption using DCT and stream cipher. European Journal of Scientific Research 32(1), 47–57 (2009)
Lafe, O.: Data compression and encryption using cellular automata transforms. Engineering Applications of Artificial Intelligence 10(6), 581–591 (1997)
Mao, K.: Identifying critical variables of principal components for unsupervised feature selection. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35(2), 339–344 (2005)
Panda, S.P., Sahu, M., Rout, U.P., Nanda, S.K.: Encryption and decryption algorithm using two dimensional cellular automata rules in cryptography. International Journal of Communication Network & Security 1, 18–23 (2011)
Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 9(3), 279–287 (2003)
Sharma, P., Lal, N., Diwakar, M.: Text security using 2d cellular automata rules. In: Proceedings of the Conference on Advances in Communication and Control Systems 2013. Atlantis Press (2013)
Stallings, W.: Cryptography and Network Security, 3rd edn. Practice Hall (2003)
Tafti, A.P., Malakooti, M., Ashourian, M., Janosepah, S.: Digital image forgery detection through data embedding in spatial domain and cellular automata. In: Int. Conf. on Digital Content, Multimedia Technology and its Applications (IDCTA), pp. 11–15 (2011)
Toffoli, T., Margolus, N.: Cellular Automata Machines: A new environment for modelling. MIT press (1987)
Urias, J.: Cryptography primitives based on a cellular automaton. In: Coding Theory, Cryptography and Related Areas, pp. 244–248 (2000)
Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of the ACIVS Advanced Concepts for Intelligent Vision Systems (2002)
Xiaoyang, Y., Yang, S., Yang, Y., Shuchun, Y., Hao, C., Yanxia, G.: An encryption method for QR code image based on ECA. International Journal of Security & Its Applications 7(5) (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Tafti, A.P., Hassannia, H. (2014). Active Image Forgery Detection Using Cellular Automata. In: Rosin, P., Adamatzky, A., Sun, X. (eds) Cellular Automata in Image Processing and Geometry. Emergence, Complexity and Computation, vol 10. Springer, Cham. https://doi.org/10.1007/978-3-319-06431-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-06431-4_7
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06430-7
Online ISBN: 978-3-319-06431-4
eBook Packages: EngineeringEngineering (R0)