Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Modified Anti-Forensic Technique for

Removing Detectable Traces from


Digital Images

Abstract:

The increasing attractiveness and trust on digital photography has given rise to new acceptability
issues in the field of image forensics. There are many advantages to using digital images. Digital
cameras produce immediate images, allowing the photographer to outlook the images and
immediately decide whether the photographs are sufficient without the postponement of waiting
for the film and prints to be processed. It does not require external developing or reproduction.
Furthermore, digital images are easily stored. No conventional "original image" is prepared here
like traditional camera. Therefore when forensic researchers analyze the images they dont have
access to the original image to compare. Fraud by conventional photograph is relatively difficult,
requiring technical expertise. Whereas significant features of digital photography is the ease and
the decreased cost in altering the image. Manipulation of digital images is simpler. With some
fundamental software, a digitally-recorded image can easily be edited. The most of the
alterations include borrowing, cloning, removal and switching parts of a digital image. A number
of techniques are available to verify the authenticity of images. But the fact is that number of
image tampering is also increasing.

Existing method:
Even though these techniques are capable of finding the earlier processing information, a person
with good knowledge in image processing can do undetectable manipulations. Therefore forensic

researchers need to examine the authenticity of images to find how much trust can be put on the
available techniques. It is also desirable to find the drawbacks of these techniques. For this
purpose researchers have to develop both forensic and anti-forensic techniques to understand the
weaknesses. As mentioned earlier most of the existing techniques are created for finding the
processing history, especially the compression history.

Demerits:
1. The modifications in the image will not have access to the original image.

Proposed method:
To the best of knowledge there has been a little work in the field of anti-forensics. Most of them
are used to find the compression history such as JPEG detection, quantization table estimation.
JPEG compression history of an image deliver the information about the camera used to produce

an image, and it can be used to discover forged areas within picture. Therefore it is used as
evidence of image manipulation. In this section the traces left by compression and
Other processing are discussed and details of proposed approach is also presented

Merits:
1. The modification images are also saving.

You might also like