Using Sab-Iomha for an Alpha Channel based Image Forgery Detection
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 8
Abstract
Digital images are a very popular way of transfer-ring media. However, their integrity remains challenging because these images can easily be manipulated with the help of software tools and such manipulations cannot be verified through a naked-eye. Although there exist some techniques to validate digital images, but in practice, it is not a trivial task as the existing approaches to forgery detection are not very effective. Therefore, there is need for a simple and efficient solution for the challenge. On the other hand, digital image steganography is the concealing of a message within an image file. The secret message can be retrieved afterwards by the author to check the image file for its veracity. This research paper proposes Sabiomha, an image forgery technique that make use of image steganography. The proposed technique is also supported by a software tool to demonstrate its usefulness. Sabiomha works by inserting an invisible watermark to certain alpha bits of the image file. The watermark we have used to steganograph an image is composed of a combination of text inputs the author can use to sign the image. Any attempts to tamper the image would distort the sequence of the bits of the image pixel. Hence, the proposed technique can easily validate originality of a digital image by exposing any tampering. The usability of our contribution is demonstrated by using the software tool we developed to automate the proposed technique. The experiment which we performed to further validate our technique suggested that Sabimoha could be flawlessly applied to image files.
Authors and Affiliations
Muhammad Shahid Bhatti, Syed Asad Hussain, Abdul Qayyum, Abdul Karim Shahid, Muhammad Usman Akram, Sajid Ibrahim Hashmi
TX-Kw: An Effective Temporal XML Keyword Search
Inspired by the great success of information retrieval (IR) style keyword search on the web, keyword search on XML has emerged recently. Existing methods cannot resolve challenges addressed by using keyword search in Tem...
Text Summarization Techniques: A Brief Survey
In recent years, there has been a explosion in the amount of text data from a variety of sources. This volume of text is an invaluable source of information and knowledge which needs to be effectively summarized to be us...
Framework Utilizing Machine Learning to Facilitate Gait Analysis as an Indicator of Vascular Dementia
Vascular dementia (VD), the second most common type of dementia, effects approximately 13.9 per cent of people over the age of 71 in the United States alone. 26% of individuals develop VD after being diagnosed with conge...
GSM-Based Wireless Database Access For Food And Drug Administration And Control
GSM (Global system for mobile communication) based wireless database access for food and drug administration and control is a system that enables one to send a query to the database using the short messaging system...
Analytical Review on Test Cases Prioritization Techniques: An Empirical Study
For conclusively predicting the quality of any software system, software testing plays an important but a vital role. For finding faults early and to observe failures (anomalies) before implementation stage, software tes...