Loading

Insights on Schemes towards Image Counterfeit Attacks & Their Effectiveness
Shashikala S1, Lokesh N2

1Shashikala S*, Assistant Professor, Department of Computer Science & Application, New Horizon College Kasturi Nagar, Bangalore, India.
2Lokesh N*, Professor, Department of Computer Science & Engineering, Rajarajeshwari College of Engineering, Bangalore, India
Manuscript received on December 15, 2019. | Revised Manuscript received on December 24, 2019. | Manuscript published on January 10, 2020. | PP: 3604-3611 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8451019320/2020©BEIESP | DOI: 10.35940/ijitee.C8451.019320
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper reviews significant schemas pertaining to image forensics where the prime emphasize has been laid towards exploring the mechanisms which identify image counterfeit with higher accuracy. The study reviewed the prime contribution published in the last four years and also addressed the unsolved research problems which are needed to be objectified. The extraction of the research gap further extensively elaborated, which identify the gap needed to be filled up. The extensive review of literature also provides better insight into the design aspects associated with the conventional techniques which are defensive against counterfeit image attacks. The future direction of this investigational study aims to come up with a solution model which can address the accuracy and complexity problems which exist in the conventional system. 
Keywords: Counterfeit Image Attacks, Image Security, Manipulated Region Detection.
Scope of the Article:  Image Security