Affiliation:
1. Smt. Kashibai Navale College of Engineering, India & Savitribai Phule Pune University, India
2. Savitribai Phule Pune University, India
Abstract
Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.
Reference45 articles.
1. A fuzzy approach to deal with uncertainty in image forensics
2. A Universal Attack Against Histogram-Based Image Forensics
3. Image forgery localization via block-grained analysis of JPEG artifacts.;T.Bianchi;IEEE Transactions on,2012
4. JPEG image steganalysis utilizing both intrablock and interblock correlations
5. On Antiforensic Concealability With Rate-Distortion Tradeoff.;X.Chu;IEEE Transactions on,2015