Show simple item record

dc.contributor.advisorRoy, Anil Kumar
dc.contributor.advisorMitra, Suman Kumar
dc.contributor.authorMall, Vinod Kumar
dc.date.accessioned2017-06-10T14:42:25Z
dc.date.available2017-06-10T14:42:25Z
dc.date.issued2014
dc.identifier.citationMall, Vinod Kumar (2014). Detection oftTampering in digital images using feature based hash generation. Dhirubhai Ambani Institute of Information and Communication Technology, xiii, 110 p. (Acc.No: T00490)
dc.identifier.urihttp://drsr.daiict.ac.in/handle/123456789/527
dc.description.abstractRecent years have witnessed an exponential growth in the use of digital images due to development of high quality digital cameras and multimedia technology. Easy availability of user-friendly image editing software has made modification of images a popular child’s play. In this environment, the integrity of an image cannot be taken for granted. Malicious tampering has serious ramification in legal documents, copyright issues, photojournalism, celebrities’ lifestyles, fashion statements, beauty and fitness products, entertainment sector, medical science, biometric images and forensic cases. The proposed work is based on features based hash generation of a digital image and thereby detection and localization of image tampering that is done with malicious intention, no matter howsoever small the tampering is. The hashing algorithm generates a short binary string by extracting the feature vectors of the image and mapping them into robust hash values. This hash mapping meets the two requirements of being sensitive to tampering in the image and being robust against content preserving manipulations. The first part of the work uses correlation coefficient to generate a hash representation of the image which is then utilized for tampering detection. This method is extended later to use properties of Singular Value Decomposition (SVD) to derive the hash values. SVD enables us to generate key based hash values. We show that this hash can be used in secured transmission of image information on the public network. We emphasize that the malicious tampering is generally done on the structural part of the image. Therefore, in the third part of our study, we have used Canny Edge Detector to extract the features of the image by detecting the edges present in it. Having the edges identified, tampering detection and localization are carried out. This method of tampering detection and localization has been found to be promising. The last part of the thesis discusses Comprehensive Image Index which is able to detect multiple types of tampering, viz., brightness, contrast, and structural, simultaneously. We observe that a structural tampering is always followed by brightness and contrast changes in the image. We also establish that even brightness or contrast or both change can be seen as a malicious tampering if exceeds a threshold value. The sensitivity of the technique and its robustness have been discussed quantitatively for each method.
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology
dc.subjectDigital Image
dc.subjectImage Processing
dc.subjectHash Generation
dc.classification.ddc621.3994 MAL
dc.titleDetection of tampering in digital images using feature based hash generation
dc.typeThesis
dc.degreePh.D
dc.student.id200921001
dc.accession.numberT00490


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record