Visual Truth in the Digital Age: A Review of Image and Video Authentication and Verification Approaches
Keywords:
Forgery Detection, Deepfake Detection, Image Tampering, Video Authentication, Audio Authentication, Multi- media Analysis, Media Integrity Verification, Content Authentic- ity VerificationAbstract
The authenticity and integrity of multimedia con- tent, including photos and videos, have become crucial in the age of the explosion of digital information. Concerns about the relia- bility of visual information have increased with the emergence of sophisticated tools for picture and video manipulation. Through a thorough investigation of multimedia forensics and an emphasis on the authentication of images and videos, our research aims to address these concerns. Through a thorough examination of the available literature and methodological analysis, this study digs into the diverse world of multimedia forensics. It examines the methods, algorithms, and strategies now in use for identifying modifications, digital forgeries, and tampering with photographs and videos. This review goes beyond the theoretical to offer useful approaches and ideas for judging the reliability of multimedia content in a variety of settings, including journalism, forensics, and the examination of digital evidence. The complexity of mul- timedia authenticity verification is explained in this study, which adds to the continuing conversation on digital media integrity and security. The conclusions and methodologies discussed here not only contribute to preserving the credibility of multimedia content but also have implications for improving digital forensic investigations, safeguarding intellectual property, and enhancing the reliability of visual data in the digital age. This study is an important resource for academics, professionals, and decision- makers who are debating how to uphold authenticity and trust in our visual media landscape as the lines between reality and digital representation become more and more hazy.
References
F. Peng, L. -B. Zhang and M. Long, ”FD-GAN: Face DeMorphing Gen- erative Adversarial Network for Restoring Accomplice’s Facial Image,” in IEEE Access, vol. 7, pp. 75122- 75131, 2019, doi: 10.1109/AC- CESS.2019.2920713.
C. Rathgeb, C. Busch et al. ”Face Morphing Attacks: A Threat to eLearning?,” 2021 IEEE Global Engineering Education Con- ference (EDUCON), Vienna, Austria, 2021, pp. 1149-1154, doi:
A. Gupta, S. Gupta and A. Mehra, ”Video authentication in digital forensic,” 2015 International Conference on Futuristic Trends on Com- putational Analysis and Knowledge Management (ABLAZE), Greater Noida, India, 2015, pp. 659- 663, doi: 10.1109/ABLAZE.2015.7154945.
Y. Li, ”Design of Video Forensics and Storage Framework Based on Embedded Technology,” 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 2021, pp. 135-138, doi: 10.1109/ICIRCA51532.2021.9544666.
K. Alghafli and T. Martin, ”Identification and recovery of video frag- ments for forensics file carving,” 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), Barcelona, Spain, 2016, pp. 267-272, doi: 10.1109/ICITST.2016.7856710.
Yu-Ming Liang, ”Video condensation for video forensics,” 2012 IEEE International Conference on Computational Intelligence and Cybernetics (CyberneticsCom), Bali, Indonesia, 2012, pp. 180-184, doi: 10.1109/Cy- berneticsCom.2012.6381642.
I. M. Bagkratsas and N. Sklavos, ”Digital Forensics, Video Forgery Recognition, for Cybersecurity Systems,” 2021 24th Euromicro Confer- ence on Digital System Design (DSD), Palermo, Italy, 2021, pp. 510- 513, doi: 10.1109/DSD53832.2021.00082.
A. Raj and D. Sankar, ”Counter Forensics: A New PRNU Based Method for Image Source Anonymization,” 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2019, pp. 1-7, doi: 10.1109/ICECCT.2019.8868948.
W. Fan, K. Wang, F. Cayre and Z. Xiong, ”Median Filtered Image Qual- ity Enhancement and Anti-Forensics via Variational Deconvolution,” in IEEE Transactions on Information Forensics and Security, vol. 10, no. 5, pp. 1076-1091, May 2015, doi: 10.1109/TIFS.2015.2398362.
F. Ding, G. Zhu, Y. Li, X. Zhang, P. K. Atrey and S. Lyu, ”Anti- Forensics for Face Swapping Videos via Adversarial Training,” in IEEE Transactions on Multimedia, vol. 24, pp. 3429-3441, 2022, doi: 10.1109/TMM.2021.3098422.
S. Pawar, G. Pradhan, B. Goswami and S. Bhutad, ”Identifying Fake Images Through CNN Based Classification Using FIDAC,” 2022 In- ternational Conference on Intelligent Controller and Computing for Smart Power (ICICCSP), Hyderabad, India, 2022, pp. 01-06, doi: 10.1109/ICICCSP53532.2022.9862034
Shah, D., Patel, D., Adesara, J. et al. Integrating machine learning and blockchain to develop a system to veto the forgeries and provide efficient results in education sector. Vis. Comput. Ind. Biomed. Art 4, 18 (2021). https://doi.org/10.1186/s42492- 021-00084-y.
Solaiyappan, Siddharth, and Yuxin Wen. ”Machine learning based med- ical image deepfake detection: A comparative study.” Machine Learning with Applications 8 (2022): 100298.
Sarode, Shantanu, Utkarsha Khandare, Shubham T. Jadhav, Avinash Jannu, Vishnu Kamble and Digvijay Patil. “Document Manipulation Detection and Authenticity Verification Using Machine Learning and Blockchain.” (2020)
Md. Majharul Haque, Md. Nasim Adnan, Mohammod Akbar Kabir, Mohammad Rifat Ahmmad Rashid, Abu Sadat Mohammad Yasin and Muhammad Shakil Pervez, “An Innovative Approach of Verification Mechanism for both Electronic and Printed Documents” International Journal of Advanced Computer Science and Applications (IJACSA), 11(8), 2020. http://dx.doi.org/10.14569/IJACSA.2020.0110876
Mohd Dilshad Ansari, S. P. Ghrera and Vipin Tyagi (2014) PixelBased Image Forgery Detection: A Review, IETE Journal of Education, 55:1, 40-46, DOI: 10.1080/09747338.2014.921415
Kobayashi, M., Okabe, T., Sato, Y. (2009). Detecting Video Forgeries Based on Noise Characteristics. In: Wada, T., Huang, F., Lin, S. (eds) Advances in Image and Video Technology. PSIVT 2009. Lecture Notes in Computer Science, vol 5414. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92957-427.
Redi, J., Taktak, W., Dugelay, J. (2010). Digital image forensics: a booklet for beginners. Multimedia Tools and Applications, 51, 133-162. https://doi.org/10.1007/s11042-010-0620-1.
Ding, W., Xie, Y., Wang, Y. (2019). Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value. Multimedia Tools and Applications, 78, 5305-5328. https://doi.org/10.1007/s11042-018-5732-z.
Tzeng, C., Tsai, W. (2001). A new technique for authen- tication of image/video for multimedia applications. , 23-26. https://doi.org/10.1145/1232454.1232464.
Han, S., Chu, C. (2009). Content-based image authentication: current status, issues, and challenges. International Journal of Information Security, 9, 19-32. https://doi.org/10.1007/s10207-009-0093-2.
Han, S., Chu, C., Yang, S. (2007). Content-based image authentication: current status, issues, and challenges. International Journal of Informa- tion Security, 9, 19-32. https://doi.org/10.1007/s10207-009-0093-2.
Debnath, S., Ramalakshmi, K., Senbagavalli, M. (2022). Multimodal Authentication System based on Audio-Visual data: A Review. 2022 International Conference for Advancement in Technology (ICONAT), 1-5. https://doi.org/10.1109/ICONAT53423.2022.9725889.
Queluz, T. (2001). Authentication of digital images and video: Generic models and a new contribution. Signal Process. Image Commun., 16, 461-475. https://doi.org/10.1016/S0923-5965(00)00010-2.
Mohan, J., Rajesh, R. (2020). ENHANCING home security through visual CRYPTOGRAPHY. Microprocess. Microsystems, 80, 103355. https://doi.org/10.1016/j.micpro.2020.103355.