Digital Forensic Approach for Medical Image Manipulation Detection Based on Variance Map and Error Level Analysis
DOI:
https://doi.org/10.71417/jitie.v1i2.39Keywords:
Digital Forensics, Manipulation Detection, Medical Images, Variance MapAbstract
Forgery of medical radiological images, such as CT scans, can lead to serious clinical and legal implications, necessitating robust digital forensic techniques capable of identifying subtle changes in medical images. This research develops an image manipulation detection system based on Variance Map analysis and Error Level Analysis (ELA) as the primary methods. These are reinforced by several supporting techniques, including Fast Fourier Transform (FFT), Local Binary Pattern (LBP), Canny edge detection, and copy-move examination for detecting local repetition patterns. The system is designed to independently analyze a single medical image and produce visual indicators that reveal anomalies in noise patterns, compression artifacts, or textural structure. Testing results indicate that this multi-method approach successfully highlights areas suspected of undergoing digital modification, providing a forensic overview that can serve as initial input for medical image validation. Overall, this study demonstrates that integrating multiple digital forensic methods can significantly enhance the accuracy of manipulation identification in radiological images.
Downloads
References
Chen, M., Fridrich, J., Goljan, M., & Lukáš, J. (2008). Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 3(1), 74–90. https://doi.org/10.1109/TIFS.2007.916285
Čisar, P. (2025). Digital image forgery detection techniques: A comprehensive review of texture and frequency-based approaches. Journal of Visual Communication and Image Representation, 92, 103765. https://doi.org/10.1016/j.jvcir.2024.103765
Dong, J., Wang, W., & Tan, T. (2008). Casually forged image detection using local texture features. In Proceedings of the IEEE International Conference on Image Processing (pp. 1540–1543). IEEE. https://doi.org/10.1109/ICIP.2008.4712089
Dong, J., Wang, W., Tan, T., & Shi, Y. Q. (2008). Run-length and edge statistics based approach for image splicing detection. Proceedings of the IEEE International Conference on Image Processing.
Farid, H. (2016). Image forgery detection. IEEE Signal Processing Magazine, 33(2), 16–25. https://doi.org/10.1109/MSP.2015.2510047
Mishra, A. (2013). Digital image forensics: A review. International Journal of Computer Applications, 64(1), 1–7. https://doi.org/10.5120/10657-5535
Mishra, M. (2013). Digital image tamper detection techniques: A comprehensive study. International Journal of Computer Science and Business Informatics, 2(1), 1–12.
Siregar, R. R., Srg, M. A., & Ramadhan, M. (2022). Digital image forgery detection using Gray Level Co-occurrence Matrix (GLCM) features. Journal of Physics: Conference Series, 2161(1), 012017. https://doi.org/10.1088/1742-6596/2161/1/012017
Srg, S. A. R., Zarlis, M., & Wanayumini. (2022). Klasifikasi citra daun dengan GLCM (Gray Level Co-occurrence) dan K-NN (K-Nearest Neighbor). Matrik: Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer, 21(2). https://doi.org/10.30812/matrik.v21i2.1572
Stamm, M. C., Wu, M., & Liu, K. J. R. (2013). Information forensics: An overview of the first decade. IEEE Access, 1, 167–200. https://doi.org/10.1109/ACCESS.2013.2264911
Verdoliva, L. (2020). Media forensics and deepfakes: An overview. IEEE Journal of Selected Topics in Signal Processing, 14(5), 910–932. https://doi.org/10.1109/JSTSP.2020.3002101
Wang, W., Dong, J., & Tan, T. (2010). Image tampering detection based on stationary wavelet transform and local binary pattern. In Proceedings of the IEEE International Conference on Multimedia and Expo (pp. 164–169). IEEE. https://doi.org/10.1109/ICME.2010.5583061
Zhou, P., Han, X., Morariu, V. I., & Davis, L. S. (2018). Learning rich features for image manipulation detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 1053–1061). IEEE. https://doi.org/10.1109/CVPR.2018.00116
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Mashal Tama Ulwan, Rafa Muhammad Indra, Abimanyu Yudha Wiratama (Author)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.












