Repository logo
Collections
Browse
Statistics
  • English
  • हिंदी
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Publications
  3. Researchers
  4. Singh, Priyanka

Person:
Singh, Priyanka

Loading...
Profile Picture

Name

Priyanka Singh

Job Title

Email Address

Telephone

Birth Date

Specialization

Abstract

Biography

Research Projects

Organizational Units

Name

Full item page
3 results

Filters

2022 - 20233

Settings

search.filters.applied.f.isAuthorOfPublication: search.filters.isAuthorOfPublication.4e20d9ca-ff03-49ac-9407-104cb8c8fd4e×

Search Results

Now showing 1 - 3 of 3
  • Loading...
    Thumbnail Image
    PublicationMetadata only
    Can Zoom video conferencing tool be misused for real-time cybercrime?
    (Wiley, 01-01-2022) Mohanty, Manoranjan; Jena, Riyanka; Singh, Priyanka; Singh, Priyanka; Singh, Priyanka; Singh, Priyanka; Singh, Priyanka; Singh, Priyanka; DA-IICT, Gandhinagar; Jena, Riyanka (201921012)
    Video conferencing tool Zoom has boomed during this COVID pandemic situation. Although Zoom has been very useful for facilitating work-from-home and study-from-home arrangements, its misuse can result in cybercrime cases. The world has already seen the adverse effect of a Zoom-related cybercrime, Zoombombing. In this article, we discuss how Zoom can also be misused for launching real-time cybercrime, such as piracy and real-time pornography. The end-to-end encryption proposed to be used by Zoom can further complicate these cybercrime issues. The existing mechanisms may not be sufficient in dealing with these real-time issues. New mechanisms need to be found.This article is categorized under: Digital and Multimedia Science > Multimedia Forensics
  • Loading...
    Thumbnail Image
    PublicationMetadata only
    An image forensic technique based on JPEG ghosts
    (Springer, 01-04-2023) Singh, Divakar; Singh, Priyanka; Jena, Riyanka; Chakraborty, Rajat Subhra; DA-IICT, Gandhinagar; Jena, Riyanka (201921012)
    The unprecedented growth in the easy availability of photo-editing tools has endangered the power of digital images. An image was supposed to be worth more than a thousand words, but now this can be said only if it can be authenticated or the integrity of the image can be proved to be intact. In this paper, we propose a digital image forensic technique for JPEG images. It can detect any forgery in the image if the forged portion called a ghost image is having a compression quality different from that of the cover image. It is based on resaving the JPEG image at different JPEG qualities, and the detection of the forged portion is maximum when it is saved at the same JPEG quality as the cover image. Also, we can precisely predict the JPEG quality of the cover image by analyzing the similarity using Structural Similarity Index Measure (SSIM) or the energy of the images. The first maxima in SSIM or the first minima in energy correspond to the cover image JPEG quality. We created a dataset for varying JPEG compression qualities of the ghost and the cover images and validated the scalability of the experimental results. We also, experimented with varied attack scenarios, e.g. high-quality ghost image embedded in low quality of cover image, low-quality ghost image embedded in high-quality of cover image, and ghost image and cover image both at the same quality. The proposed method is able to localize the tampered portions accurately even for forgeries as small as 10 � 10 sized pixel blocks. Our technique is also robust against other attack scenarios like copy-move forgery, inserting text into image, rescaling (zoom-out/zoom-in) ghost image and then pasting on cover image.
  • Loading...
    Thumbnail Image
    PublicationMetadata only
    PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization
    (MDPI, 01-09-2023) Jena, Riyanka; Singh, Priyanka; Mohanty, Manoranjan; DA-IICT, Gandhinagar; Jena, Riyanka (201921012)
    The widespread availability of digital image-processing software has given rise to various forms of image manipulation and forgery, which can pose a significant challenge in different fields, such as law enforcement, journalism, etc. It can also lead to privacy concerns. We are proposing that a privacy-preserving framework to encrypt images before processing them is vital to maintain the privacy and confidentiality of sensitive images, especially those used for the purpose of investigation. To address these challenges, we propose a novel solution that detects image forgeries while preserving the privacy of the images. Our method proposes a privacy-preserving framework that encrypts the images before processing them, making it difficult for unauthorized individuals to access them. The proposed method utilizes a compression quality analysis in the encrypted domain to detect the presence of forgeries in images by determining if the forged portion (dummy image) has a compression quality different from that of the original image (featured image) in the encrypted domain. This approach effectively localizes the tampered portions of the image, even for small pixel blocks of size 10�10 in the encrypted domain. Furthermore, the method identifies the featured image's JPEG quality using the first minima in the energy graph.
 
Quick Links
  • Home
  • Search
  • Research Overview
  • About
Contact

DAU, Gandhinagar, India

library@dau.ac.in

+91 0796-8261-578

Follow Us

© 2025 Dhirubhai Ambani University
Designed by Library Team