Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

PP-JPEG: A Privacy-Preserving JPEG Image Tampering Localization

Version 1 : Received: 15 July 2023 / Approved: 17 July 2023 / Online: 17 July 2023 (08:07:17 CEST)

A peer-reviewed article of this Preprint also exists.

Jena, R.; Singh, P.; Mohanty, M. PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization. J. Imaging 2023, 9, 172. Jena, R.; Singh, P.; Mohanty, M. PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization. J. Imaging 2023, 9, 172.

Abstract

The widespread availability of digital image processing softwares has given rise to various forms of image manipulation and forgery which can pose a significant challenge in different fields such as law enforcement, journalism etc,. it can also lead a privacy concern. We are proposing a privacy-preserving framework to encrypt images before processing them is vital to maintain the privacy and confidentiality of sensitive images, especially those used for purpose of Investigation. To address these challenges, we propose a novel solution that detects image forgeries while preserving the privacy of the images. Our method proposes a privacy-preserving framework that encrypts the images before processing them, making it difficult for unauthorized individuals to access them. The proposed method utilizes a compression quality analysis in the encrypted domain to detect the presence of forgeries in images if the forged portion (dummy image) has a compression quality different from the original image (featured image) in the encrypted domain. This approach effectively localizes the tampered portions of the image, even for small pixel blocks of size 10x10 in the encrypted domain. Furthermore, the method identifies the featured image's JPEG quality using the first minima in the energy graph.

Keywords

Image Forensics; Tampering Localization; Copy Move Forgery; Paillier Encryption

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.