Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/4081
Title: | Developing an Optimal Strategy to Address the Vulnerability of Image Tampering |
Authors: | Kumara, P. M. I. N |
Keywords: | Developing Optimal Strategy Vulnerability Image Tampering |
Issue Date: | Dec-2024 |
Publisher: | SLIIT |
Abstract: | The paper proposes a hybrid image tampering detection system that incorporates the Convolutional Neural Networks into the pool of traditional forensic techniques such as Error Level Analysis and noise analysis. Its objective is to provide high detection accuracy in tampered images through deep learning and forensic methods. According to this method, ELA detects compression inconsistencies in the system, while noise analysis detects abnormal noise patterns in the image. A combination of these techniques provides the capability for the system to capture various methods for tampering, including copy-move forgery, splicing, and subtle retouching. It was trained and tested on the CASIA 2.0 dataset with high accuracy: 98% training accuracy and over 96% validation accuracy. It was successfully deployed as a real-time Flask web application wherein users can upload an image and perform the analysis very quickly. While powerful, the model has a limitation of only revealing a subset of lossless image format tampering and performs subtle manipulations. The future work will involve enhancing scalability and deepfake detection that can handle complex techniques of tampering. The research proposed herein provides a holistic and scalable solution for the detection of image tampering to be applied in digital forensics, verification of media, and cybersecurity |
URI: | https://rda.sliit.lk/handle/123456789/4081 |
Appears in Collections: | MSc 2024 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
MS22910172 - Thesis_Developing an Optimal Strategy to Address the Vulnerability of Image Tampering 1-10.pdf | 270.94 kB | Adobe PDF | View/Open | |
MS22910172 - Thesis_Developing an Optimal Strategy to Address the Vulnerability of Image Tampering.pdf Until 2050-12-31 | 2.84 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.