Skip to main content

Active Image Forgery Detection Using Cellular Automata

  • Chapter
Cellular Automata in Image Processing and Geometry

Part of the book series: Emergence, Complexity and Computation ((ECC,volume 10))

Abstract

The adequate potential of digital images and the ease in their storage and distribution is such that they are more and more exploited to supply information in this digital epoch. As a consequence, they indicate a public source of evidence in our everyday life. Beside their benefits, the accessibility of them could bring a major detriment as they can be modified easily by a media processing application.

Detection of tampering with digital images is still an open work in the image processing domain. Over the past years there has been a swift expansion in the designing and developing of image forgery detection algorithms plus related software applications. All these algorithms are divided into two groups: active and passive. In the active approaches, we create and embed invaluable data as a cipher key into the original image to protect it against the forgery,while in the passive methods we only investigate some features of the image such as statistical anomalies, correlations and compressions to detect forgery.

This chapter presents an in-depth exploration of issues related to active digital image forgery detection algorithms which are derived from cellular automata. The aim of this chapter is to give a brief but comprehensive overview of the usage of cellular automata to develop active image forgery detection techniques. We conclude with experimental results in this topic and discuss future works in image forgery detection using cellular automata.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anoop, S., Alakkaran, A.: A full image encryption scheme based on transform domains and stream ciphers. International Journal of Advanced Information Science and Technology 17(17), 5–10 (2013)

    Google Scholar 

  2. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: A survey. Digital Investigation 10(3), 226–245 (2013)

    Article  Google Scholar 

  3. Bovik, A.C.: The essential guide to image processing. Academic Press (2009)

    Google Scholar 

  4. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2007)

    Google Scholar 

  5. Farid, H.: Image forgery detection. IEEE Signal Processing Magazine 26(2), 16–25 (2009)

    Article  Google Scholar 

  6. Golub, G.H., van Van Loan, C.F.: Matrix computations (Johns Hopkins studies in mathematical sciences), 3rd edn. The Johns Hopkins University Press (1996)

    Google Scholar 

  7. Intel: Sse4 programming reference. D91561 (2007)

    Google Scholar 

  8. Jin, J.: An image encryption based on elementary cellular automata. Optics and Lasers in Engineering (2012)

    Google Scholar 

  9. Krikor, L., Shaaban, Z.: Image encryption using DCT and stream cipher. European Journal of Scientific Research 32(1), 47–57 (2009)

    Google Scholar 

  10. Lafe, O.: Data compression and encryption using cellular automata transforms. Engineering Applications of Artificial Intelligence 10(6), 581–591 (1997)

    Article  Google Scholar 

  11. Mao, K.: Identifying critical variables of principal components for unsupervised feature selection. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 35(2), 339–344 (2005)

    Article  Google Scholar 

  12. Panda, S.P., Sahu, M., Rout, U.P., Nanda, S.K.: Encryption and decryption algorithm using two dimensional cellular automata rules in cryptography. International Journal of Communication Network & Security 1, 18–23 (2011)

    Google Scholar 

  13. Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems 9(3), 279–287 (2003)

    Article  Google Scholar 

  14. Sharma, P., Lal, N., Diwakar, M.: Text security using 2d cellular automata rules. In: Proceedings of the Conference on Advances in Communication and Control Systems 2013. Atlantis Press (2013)

    Google Scholar 

  15. Stallings, W.: Cryptography and Network Security, 3rd edn. Practice Hall (2003)

    Google Scholar 

  16. Tafti, A.P., Malakooti, M., Ashourian, M., Janosepah, S.: Digital image forgery detection through data embedding in spatial domain and cellular automata. In: Int. Conf. on Digital Content, Multimedia Technology and its Applications (IDCTA), pp. 11–15 (2011)

    Google Scholar 

  17. Toffoli, T., Margolus, N.: Cellular Automata Machines: A new environment for modelling. MIT press (1987)

    Google Scholar 

  18. Urias, J.: Cryptography primitives based on a cellular automaton. In: Coding Theory, Cryptography and Related Areas, pp. 244–248 (2000)

    Google Scholar 

  19. Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of the ACIVS Advanced Concepts for Intelligent Vision Systems (2002)

    Google Scholar 

  20. Xiaoyang, Y., Yang, S., Yang, Y., Shuchun, Y., Hao, C., Yanxia, G.: An encryption method for QR code image based on ECA. International Journal of Security & Its Applications 7(5) (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmad Pahlavan Tafti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Tafti, A.P., Hassannia, H. (2014). Active Image Forgery Detection Using Cellular Automata. In: Rosin, P., Adamatzky, A., Sun, X. (eds) Cellular Automata in Image Processing and Geometry. Emergence, Complexity and Computation, vol 10. Springer, Cham. https://doi.org/10.1007/978-3-319-06431-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06431-4_7

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06430-7

  • Online ISBN: 978-3-319-06431-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics