Skip to main content

Image Forensics Technology for Digital Camera

  • Conference paper
Advances in Multimedia Information Processing - PCM 2004 (PCM 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3333))

Included in the following conference series:

Abstract

Even though digital devices, especially digital cameras and camcoders, are getting popular, they are not counted in legal disputes as trustworthy devices. In this paper an image forensics technology is proposed to make digital image capturing devices have legal proof capabilities. For the images taken by digital devices to have legal proof capability, integrity should be guaranteed. Electronic signature was proposed as a means of guaranteeing the integrity of the digital files of images. However, electronic signatures require additional data of digital digest, and cannot survive digital manipulations such as lossy compression, or RST (rotation, scaling, and transformation). This paper suggests a novel algorithm of image forensics that guarantees integrity in nor-mal processing by hiding forensics information into images and identifies locations of forgery and alteration. Images produced by the proposed method maintains high image quality as PSNR over 50[dB] and guarantees integrity up to the quality factor of 85% against JPEG compression.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kruse II, W.G., Heiser, J.G.: Computer Forensics. Addison-Wesley, Boston (2001)

    Google Scholar 

  2. http://www.itl.nist.gov/div897/pubs/fip186.htm

  3. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal 25, 313–335 (1996)

    Article  Google Scholar 

  4. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia, NEC Res. Inst., Princeton, NJ, Tech. Rep. 95–10 (1995)

    Google Scholar 

  5. Lin, C.-Y., Chang, S.-F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January 2000, pp. 140–151 (2000)

    Google Scholar 

  6. Maeno, K., et al.: New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Non-Uniform Quantization. In: Proc. SPIE Security and Watermarking of Multimedia Contents, San Jose, California, January 2002, pp. 659–670 (2002)

    Google Scholar 

  7. Lin, E.T., et al.: Detection of image alterations using semi-fragile watermarks. In: Proc. SPIE Security and Watermarking of Multimedia Contents, San Jose, California, January 2000, pp. 23–28 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J., Byun, Y., Choi, J. (2004). Image Forensics Technology for Digital Camera. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30543-9_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30543-9_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23985-7

  • Online ISBN: 978-3-540-30543-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics