Total views : 275

Identifying Photo Forgery using Lighting Elements


  • Department of Computer Science and Engineering, The NorthCap University, Gurugram - 122017, Haryana, India
  • Department of Applied Sciences, The NorthCap University, Gurugram - 122017, Haryana, India


Nowadays digital media manipulation has become a common trend. Digital media, especially images, being one of the primary modes of communication, can be easily manipulated. Current research trends in digital image forensics focus on validating the authenticity of the image. Objectives: Objective of the present study is to authenticate objects in an image using light sources and their properties. Method: By locating the direction of the light source, forgery in the images can be easily detected. Inconsistencies between different light sources in the image highlight image tampering. This paper focuses on detection of image forgery using lighting inconsistencies. The proposed technique measures the lighting properties from different objects or surfaces present in the image. Finding: The model for digital forensics identifies the lighting discrepancies in the objects of an image and provides results indicating difference between real and fake images. Improvement: The proposed technique is an objective based method and identifies digital image forgery based on physics of the environment. Results are promising and reproducible making the technique an important tool for image forgery detection.


Authenticity, Image Forensics, Image Tampering Detection, Lighting

Full Text:

 |  (PDF views: 204)


  • Redi JA, Taktak W, Dugelay J-L. Digital image forensics: a booklet for beginners. Multimedia Tools and Applications. 2011; 133–62.
  • Farid MKJAH. Exposing digital forgeries by detecting inconsistencies in lighting. ACM Multimedia and Security Workshop; 2005.
  • Khan ES, Kulkarni EA. An efficient method for detection of copy-move forgery using discrete wavelet transform. International Journal on Computer Science and Engineering. 2010; 2(5):1801–6.
  • Chaudhary MP, Lalit G. Lifting scheme using HAAR and biorthogonal wavelets for image compression. International Journal of Engineering Research and Applications. 2013; 3(4):474–8.
  • Dan QT, Li SS, Wu G. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. ICME; 2007.
  • Kee E, Johnson M, Farid H. Digital image authentication from JPEG headers. IEEE Transactions on Information Forensics and Security. 2011 Sep; 6:1066–75.
  • Pan X, Lyu S. Region duplication detection using image feature matching. IEEE Transactions on Information Forensics and Security. 2010; 5(4):857–67.
  • Popescu A, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing. 2005; 53(10):3948–59.
  • Kirchner M. Efficient estimation of CFA pattern configuration in digital camera Images. Society of Photo-Optical Instrumentation Engineers (SPIE); 2010.
  • Fridrich J. Digital image forensic using sensor noise. IEEE Signal Processing Magazine. 2009; 26(2):26–37.
  • Kaur N, Mahajan N. Image forgery detection using SIFT and PCA classifiers for panchromatic images. Indian Journal of Science and Technology. 2016 Sep; 9(35):1–6.
  • Elwin GKJGR. Image forgery detection using multidimensional spectral hashing based polar cosine transform. Indian Journal of Science and Technology. 2015 May; 8(9):28–39.
  • Vashisth S, Singh H, Yadav AK, Singh K. Devil’s vortex phase structure as frequency plane mask for image encryption using the fractional mellin transform. International Journal of Optics. 2014; 1–9.
  • Vashisth S, Singh H, Yadav AK, Singh K. Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval. Optik - International Journal for Light and Electron Optics. 2014 Sep; 125(18).
  • Jeyakumar K. Image compression and fusion based technology using wavelet transform. Indian Journal of Science and Technology. 2015 Nov; 8(32):1–8.
  • Johnson M, Farid H. Exposing digital forgeries through specular highlights on the eye. 9th International Workshop on Information Hiding; Saint Malo, France. 2007.
  • Zhang W, Cao JZX, Zhu J, Wang P. Detecting photographic composites using shadows. IEEE International Conference on Multimedia and Expo; 2009. p. 1042–5.
  • Kee E, O’Brien JF, Farid H. Exposing photo manipulation from shading and shadows. ACM Transactions on Graphics. 2014; 33(5):1-21.
  • Carvalho T, Farid H, Kee E. Exposing photo manipulation from user guided 3D lighting analysis. SPIE Symposium on Electronic Imaging; San Francisco, CA. 2015.
  • Singh H, Yadav AK, Vashisth S, Singh K. Optical image encryption using devil’s vortex toroidal lens in the fresnel transform domain. International Journal of Optics. 2015; 1–20.
  • Cristin VCRR. Exposing image manipulation with curved surface reflection. Indian Journal of Science and Technology. 2016 Oct; 9(38):1–9.
  • Stevens KA. Surface tilt (the direction of slant): A neglected psychophysical variable. Perception and Psychophysics. 1983; 33(3):241–50.
  • Belkasoft. Forgery Detection Plugin. Belkasoft forensics made easier. Available from:
  • Kumar G, Gaharwar S, Nath VV, Gaharwar R. Neurofuzzy based first responder for image forgery identification. Orient Journal of Computer Science and Technology. 2016 Apr; 9(1):12–6.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.