Public Release: 

NJIT electrical engineer cracks code to detect media tampering

An NJIT electrical engineer has cracked the code that will enable researchers around the world to detect tampering with electronic images

New Jersey Institute of Technology


IMAGE: NJIT Professor of Electrical and Computer Engineering Yun-Qing Shi (left) discusses a techical problem with his graduate student. view more

Credit: Guy Chan for NJIT

An NJIT electrical engineer has cracked the code that will enable researchers around the world to detect tampering with electronic images.

"Using our program, we can usually inspect a photograph on a computer screen and know that someone has changed it," said Yun-Qing Shi, a professor of electrical and computer engineering. "We still cannot say, nor can anyone else, where in the media the image has been changed. But we will get there."

Earlier this year, "System and Method of Steganalysis," developed by Shi and his collaborator Guorong Xuan received a U.S. patent. The research has already been licensed. Since 2003, Shi has received four other patents in this area and awaits news of more than two dozen pending patents. Steganalysis is a method of determining whether data has been hidden in a digital medium. Image tampering came to the world's attention following changes to two widely-recognized images-- a Los Angeles Times photo of the Iraqi War in 2003 and a BBC News image of the Israeli air strike against Beirut in 2006. Since then, Shi, an expert in information assurance and digital data forensics who lectures worldwide, has made it his business to highlight new and better ways to detect tampering with electronic images.

"In our digital age," said Shi, "digital media has been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at any time. While the great convenience has been appreciated, information assurance has become an urgent and critical issue faced by the digital world."

In many applications, data hiding, cryptography or a combination of both, will not reveal a problem. Rather, the science of digital data forensics, which gathers evidence of data composition, origin, and history, is necessary. Although this research field remains in its infancy, it is attracting increasing attention from the multimedia-security research community.

Shi lectures often about safety features multi-media users should put in place when posting any kind of media on the Internet. A common safety feature is simply being active: This means taking the time to add or hide secret codes in the original image or media. Codes might be as simple as crediting the photographer or adding a publication date and location.

A digital signature also works. "The signature is generated electronically and then one of many available methods can be employed to hide it," Shi said. Such a tact enables the user to verify the authenticity of a photo by extracting the embedded signature, then comparing it to other signatures possibly written over it.

Of course in most circumstances, most people don't have the time nor technical knowledge to embed a signature or sign their medium. How can an expert like Shi know if the image has been touched? "Thanks to our new patents if a user hasn't embedded identifying information, we will still be able to detect a forged image," said Shi. What our research can't yet determine is where the image has been touched. That's why our research is still ongoing."

Shi is the chair of the local North Jersey IEEE Signal Processing Chapter, a founding editor-in-chief of LNCS Transactions on Data Hiding and Multimedia Security (Springer), an editorial board member of Multidimensional Systems and Signal Processing (Springer), a member of IEEE Circuits and Systems Society and other IEEE committees, and a fellow of IEEE.

He's been a reviewer for Mathematical Reviews; a contributing author for the Comprehensive Dictionary of Electrical Engineering and has chaired more than a half dozen IEEE conferences and taught four tutorials. He received his doctorate from the University of Pittsburgh.


NJIT, New Jersey's science and technology university, at the edge in knowledge, enrolls more than 8,000 students in bachelor's, master's and doctoral degrees in 92 degree programs offered by six colleges: Newark College of Engineering, New Jersey School of Architecture, College of Science and Liberal Arts, School of Management, Albert Dorman Honors College and College of Computing Sciences. NJIT is renowned for expertise in architecture, applied mathematics, wireless communications and networking, solar physics, advanced engineered particulate materials, nanotechnology, neural engineering and e-learning. In 2009, Princeton Review named NJIT among the nation's top 25 campuses for technology and among the top 150 for best value. U.S. News & World Report's 2008 Annual Guide to America's Best Colleges ranked NJIT in the top tier of national research universities.

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.