Publication:
Developing an Optimal Strategy to Address the Vulnerability of Image Tampering

dc.contributor.authorKumara, P. M. I. N
dc.date.accessioned2025-04-29T10:32:59Z
dc.date.available2025-04-29T10:32:59Z
dc.date.issued2024-12
dc.description.abstractThe paper proposes a hybrid image tampering detection system that incorporates the Convolutional Neural Networks into the pool of traditional forensic techniques such as Error Level Analysis and noise analysis. Its objective is to provide high detection accuracy in tampered images through deep learning and forensic methods. According to this method, ELA detects compression inconsistencies in the system, while noise analysis detects abnormal noise patterns in the image. A combination of these techniques provides the capability for the system to capture various methods for tampering, including copy-move forgery, splicing, and subtle retouching. It was trained and tested on the CASIA 2.0 dataset with high accuracy: 98% training accuracy and over 96% validation accuracy. It was successfully deployed as a real-time Flask web application wherein users can upload an image and perform the analysis very quickly. While powerful, the model has a limitation of only revealing a subset of lossless image format tampering and performs subtle manipulations. The future work will involve enhancing scalability and deepfake detection that can handle complex techniques of tampering. The research proposed herein provides a holistic and scalable solution for the detection of image tampering to be applied in digital forensics, verification of media, and cybersecurityen_US
dc.identifier.urihttps://rda.sliit.lk/handle/123456789/4081
dc.language.isoenen_US
dc.publisherSLIITen_US
dc.subjectDevelopingen_US
dc.subjectOptimal Strategyen_US
dc.subjectVulnerabilityen_US
dc.subjectImage Tamperingen_US
dc.titleDeveloping an Optimal Strategy to Address the Vulnerability of Image Tamperingen_US
dc.typeThesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
Thumbnail Image
Name:
MS22910172 - Thesis_Developing an Optimal Strategy to Address the Vulnerability of Image Tampering 1-10.pdf
Size:
270.94 KB
Format:
Adobe Portable Document Format
Description:
No Thumbnail Available
Name:
MS22910172 - Thesis_Developing an Optimal Strategy to Address the Vulnerability of Image Tampering.pdf
Size:
2.77 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: