Without any special training, people have the talent of understanding the image content. So the trustworthiness of photographs plays an important role in many areas such as criminal investigation and journalism. But in this digital world, the high-quantity commodity hardware and the low-cost image editing software give a cheap way of tampering the digital images without and clue of changing. In this paper, we introduce some passive-blind methods for detecting multi-image fakery, which means that adding a new object from another image into the image or replaying the original object by another object from a different photo. According to the characteristic of multi-image fakery, we propose two optional kinds of solution: technical method and analyzing method. Both of the two kinds of solution are effective and useful. Further more; the combine of them can reach a better performance.
KEYWORDS: Data hiding, Digital watermarking, Digital imaging, Computer security, Network security, Digital recording, Internet, Digital image processing, Current controlled current source, Imaging arrays
The paper provides a pre-stage of any data hiding method hiding message data in media data and a data extraction
method of extracting the hidden data, wherein message data is dispersively hidden in digital media data, such as images,
to prevent a third person from forging/modifying the message data easily. More specifically, the technique relates to a
data hiding method in which media data is expressed as a media array while message data is expressed as a message
array so that the array elements of the message array can be dispersively hidden in the media array randomly by
scrambling order of particular array element of the media array based on a private key. It needs to declare that the
proposed strategy aims only to enhance the watermark security. It is not used to improve the robustness of watermark.
The current version of this paper has had a correction made to it at the request of the author. Please see the linked Errata for further details.
KEYWORDS: Digital watermarking, Data hiding, Computer security, Quantization, Modulation, Sensors, Network security, Digital recording, Associative arrays, Binary data
The paper provides a pre-stage of any data hiding method hiding message data in media data and a data extraction
method of extracting the hidden data, wherein message data is dispersively hidden in digital media data, such as images,
to prevent a third person from forging/modifying the message data easily. More specifically, the technique relates to a
data hiding method in which media data is expressed as a media array while message data is expressed as a message
array so that the array elements of the message array can be dispersively hidden in the media array randomly by
scrambling order of particular array element of the media array based on a private key. It needs to declare that the
proposed strategy aims only to enhance the watermark security. It is not used to improve the robustness of watermark.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.