Books by Dr. Manoj Kumar

Nowadays digital media manipulation has become a common trend. Digital media, especially images, ... more Nowadays digital media manipulation has become a common trend. Digital media, especially images, being one of the primary modes of communication, can be easily manipulated. Current research trends in digital image forensics focus on validating the authenticity of the image. Objectives: Objective of the present study is to authenticate objects in an image using light sources and their properties. Method: By locating the direction of the light source, forgery in the images can be easily detected. Inconsistencies between different light sources in the image highlight image tampering. This paper focuses on detection of image forgery using lighting inconsistencies. The proposed technique measures the lighting properties from different objects or surfaces present in the image. Finding: The model for digital forensics identifies the lighting discrepancies in the objects of an image and provides results indicating difference between real and fake images. Improvement: The proposed technique is an objective based method and identifies digital image forgery based on physics of the environment. Results are promising and reproducible making the technique an important tool for image forgery detection.

Digital Imaging experienced unprecedented growth in the past few years with the increase in easil... more Digital Imaging experienced unprecedented growth in the past few years with the increase in easily accessible handheld digital devices. This furthers the applications of digital images in many areas. With the amassed recognition and accessibility of low cost editing software, the integrity of images can be easily compromised. Recently, image forensics has gained popularity for such forgery detection. However, these techniques still lag behind to prove the authenticity of the images against counterfeits. Therefore, the issue of credibility of the images as a legal proof of some event or location become imperative. The proposed work showcases a state-of-the art forgery detection methodology based on the lighting fingerprints available within digital images. Any manipulation in the image(s) leaves dissimilar fingerprints, which can be used to prove the integrity of the images after the analysis. This technique performs various operations to obtain the intensity and structural information. Dissimilar features in an image are obtained using Laplacian method followed by surface normal estimation. Applying this information, source of the light direction is estimated in terms of angle w. The proposed technique demonstrates an efficient tool of digital image forgery detection by identifying dissimilar fingerprints based on lighting parameters. Evaluation of the proposed technique is successfully done using CASIA1 image dataset.

With the phenomenal development in processing power and the dropping cost of high-resolution imag... more With the phenomenal development in processing power and the dropping cost of high-resolution imaging devices and computer hardware, coupled with the availability of sophisticated userfriendly image manipulation programs, the instances of forgery in digital images has increased manifold. In the current scenario, Digital Image Forensics is an area that has gained immense importance and is instrumental for detecting image forgery. Digital image forgery detection includes Blind or Passive techniques that don't require any previous information of an image, as the tampered image carries inconsistencies that can be used to detect forgery. Imaging devices and processing techniques, however different from each other, carry a consistent pattern in the image which, if tampered would introduce a deviation from the original pattern. This deviation enables one to detect forgery of images. In this paper, various passive forgery detection techniques are discussed with a special focus on pixel-and physics-based techniques. This paper aims is to deliver an overview of emerging techniques in the field of Image Forgery Detection.

Image processing requires an estimation of position, direction and illumination of the objects pr... more Image processing requires an estimation of position, direction and illumination of the objects present in a scene. Nowadays, digital image manipulations have experienced a remarkable growth. These image manipulations can be detected by various forgery detection techniques that have been developed in the past few years. We describe a forgery detection technique based on estimations of multiple light source directions. This method uses a pixel patch from the image region to estimate the source light vector. The implementation is done for images where one and more light sources are available in the scene. The proposed technique is able to identify image forgery in terms of elevation angle Ī± obtained from a source of light and surface normal. This method is tested for both outdoor and indoor images under certain known parameters. The novelty of our method is that photo manipulation detection is done using a multiple light source detection approach. We demonstrate that the proposed technique produces accurate results by making certain assumptions about surface properties and illumination parameters.
Papers by Dr. Manoj Kumar
Nowadays big data became the new buzzword in the field of information and communication technolog... more Nowadays big data became the new buzzword in the field of information and communication technology. Presently, researchers are looking to extract the maximum value of big data applications from available big data. However, developing, maintaining and scaling the big data application is still a distant milestone. We build better big data application projects by using existing software development life cycle (SDLC) phase in software engineering. The result of research helped in identifying big data application potential projects that utilize big data successfully. The proposed paper helps in exploring software development life cycle (SDLC) phases in big data applications and perform phase gap analysis to find the detailed efforts in research.

In the field of machine translation ample amount of work has been done to improve the essence of ... more In the field of machine translation ample amount of work has been done to improve the essence of translation systems. It all started in 1949 when Warren Weaver proposed the first idea of using computer for translation. Since then several approaches have been followed out to ameliorate the quality of translation. But even after continuing development in this field, we haven't reached the level where we could get the exact translation of the source text. The aim of this paper is to brief about different approaches of machine translation and introduce a mechanism for the evaluation of the efficiency of translation systems based on the lexical, syntactical and semantics differences between source text and translated text. This mechanism provides a statistical analysis of translation systems, the results of this analysis can be used as a rating mechanism on the translation systems used worldwide. In this paper, we have emphasized on translation between English and Hindi.
The most popular challenges in steganalysis is to identify the char-acterstics, to discover the s... more The most popular challenges in steganalysis is to identify the char-acterstics, to discover the stego-images. In this, we derive a steganalysis measure using Gaussian distribution, for image modeling. By using Gaussian distribution model the distribution of DCT coefficients and quantify a ratio of two Fourier coefficients of the distribution of DCT coefficients [9]. This derive steganalysis measure is evaluated against three steganographic methods i.e. first one is LSB (Least Significant Bit), the second one is SSIS (Spread Spectrum Image Steganography), and the last one is Steg-Hide tool, which is based on graph theoretic approach. Classification of image features dataset is done by using different classification techniques such as SVM.

The rapid evaluation of image manipulation and tampering has evoked the need for protecting digit... more The rapid evaluation of image manipulation and tampering has evoked the need for protecting digital data. Therefore a copyright protection method is used to protect the user information known as watermarking. Watermarking is the major image processing technique used to authenticate digital data. In this paper a hybrid approach is proposed to protect the digital data and also authenticates the user information. The proposed approach is an improvement over traditional video watermarking approaches. It uses fractions from the watermarked image to embed into the unique frames of the original video. The whole approach is divided into three steps which are described in the next sections of this paper. To check the resilience and robustness of this approach, various attacks are implemented over the watermarked video. After attacks, watermark image is extracted from the watermarked video to check the robustness of this approach. The quality of the recovered watermarked image is analysed using bit error rate. Experimental results show that this approach is very robust compared to other approaches.

Authentication and copyright protection of digital data is a matter of big concern in the present... more Authentication and copyright protection of digital data is a matter of big concern in the present times. As forgery techniques are becoming more sophisticated day by day, incidents of copying and tampering of digital data without the owner " s permission are on the rise. Digital data can be manipulated and copied easily, therefore it becomes important to protect owner data by using some rights protection system. In this paper, various approaches to protect digital data (Audio, Video etc.) using watermarking techniques are discussed. Watermarking is one of the best approach to protect digital data and prove user authenticity. Watermarking technique provides protection against illegal distribution of digital data. Watermarking is a process to embed some noise tolerant signal in the original signal. This technique is very effective against various types of attacks on the digital data and hence provides a robust solution for data theft cases. This paper is a review of different watermarking techniques for protecting digital data.

Nowadays digital media manipulation has become a common trend. Digital media, especially images, ... more Nowadays digital media manipulation has become a common trend. Digital media, especially images, being one of the primary modes of communication, can be easily manipulated. Current research trends in digital image forensics focus on validating the authenticity of the image. Objectives: Objective of the present study is to authenticate objects in an image using light sources and their properties. Method: By locating the direction of the light source, forgery in the images can be easily detected. Inconsistencies between different light sources in the image highlight image tampering. This paper focuses on detection of image forgery using lighting inconsistencies. The proposed technique measures the lighting properties from different objects or surfaces present in the image. Finding: The model for digital forensics identifies the lighting discrepancies in the objects of an image and provides results indicating difference between real and fake images. Improvement: The proposed technique is an objective based method and identifies digital image forgery based on physics of the environment. Results are promising and reproducible making the technique an important tool for image forgery detection.

Watermarking is a major image processing application used to authenticate user documents by embed... more Watermarking is a major image processing application used to authenticate user documents by embedding and hiding some authenticated piece of information behind an image, audio or the video file. For example, copyright symbols or signatures are often used. Our proposed work is to develop and implement an improved layered approach to video watermarking. The traditional watermarking approach tends to embed an entire watermark image within each video frame or within random video frames to give the appearance of a hidden watermark to the casual observer. This work proposes a more efficient and secure approach to perform watermarking, by using sub image classification. That is to say, selected frames only will contain a fractional number of pixels from the watermark image. We take k bits from the watermark and store then within a video frame, depending on the size of that watermark image. Our algorithm is capable of hiding high capacity information over video frames. The novel approach is to partially distribute the watermarking data over a set of frames until the entire watermark is eventually distributed throughout the entire video. The originality our technique is that it is a histogram inspired and reversible watermarking approach as defined with visual cryptography. Our approach hides similar watermarking pixels with frames of a similar appearance. Differing sets of watermark pixels are thus embedded within dissimilar frames, thus making the system more robust. It will provide a high degree of authentication, as the extraction of information from a single frame only will not reveal the entire watermarking data, or even give any obvious indication that it contains a fraction of the watermark pixels. The resilience of our technique will be tested by performing various systematic attacks upon a series of videos watermarked in this manner.
Reliable Feature Detection for Steganalysis

Cyber-crime is an emerging issue in the today Internet-world. Cyber-crime is a term which describ... more Cyber-crime is an emerging issue in the today Internet-world. Cyber-crime is a term which describes; the crime activity has been done by using the computer, online network as a tool. Cyber-crime is an unauthorized access to data, modification in data, denial of services or any other attacks related to data security. This crime can be done in many forms or by using different-different techniques like Hacking, Phishing, and Vishing etc. For making and protecting the cyber-security more secure law agencies are defining new concepts. In this paper we described IT laws in India and Ireland which are mandatory to handle cyber-crimes investigation. A digital forensic investigator should be aware of these IT laws for carrying his/her forensics investigation. Digital investigation includes the laws and their proceedings to carry out the solutions in an appropriate legal manner. For digital forensics investigator awareness of these IT laws and their consequences is the first step to handle the cyber-crimes.
Review on Cryptographic WLAN protocols and their weakness
Steganography is an art of hiding information in innocuous looking cover objects. The main goal o... more Steganography is an art of hiding information in innocuous looking cover objects. The main goal of steganography is to avoid drawing intuition about transmission of message. The terms 'Steganography' and 'Steganalysis' are used in information hiding process. Steganography basically deals with hiding information in digital media while steganalysis is the method of detecting the presence of hidden message in it. The term 'Steganography' is often confused with 'Cryptography' which converts message into indecipherable form. Progress made in the field of steganography in terms of using different multimedia files such as images, audio, video, text files as cover objects for hiding information is attracting more people to work in this area.

In today's high tech environment every organization, individual computer users use internet for a... more In today's high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software's and do harmful activities. So in this paper we described that how we can monitor them from security purposes. We know that internet play a vital role in our day to day life for communication. We share our sensitive data within the organization or outside by using internet but important thing is to secure the communication between two parties which are sharing their private information. So to achieve high privacy of communication we need to design and develop secure web browsing solutions by using highly secure communicative architecture. Web browsing highly rely on the features that a web browser supports to provide security. Web browsers like IE, Firefox, Netscape, Opera and Mozilla etc. can be installed on our machine. Even we use different-2 operating systems to install these applications. Security related to machines are also equally important for security concerns. As internet share huge amount of data and it is also flooded with many spyware, spam, viruses and Trojan horses which affects the security. Once these malwares comes into the system then they start to effect the OS services and starts to create security bugs. So to prevent the impact of these spy programs and to maintain high level of security we need to adopt secure web browsing solutions like SSL/TLS, VPN, HTTPS, secure PROXIES etc. In the following sections we will discuss about these security solutions and how they can be more effective to secure web browsing and machine security.
Uploads
Books by Dr. Manoj Kumar
Papers by Dr. Manoj Kumar