Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Image Forgery Detection Techniques

S. Manjunatha, Dr. Malini. M. Patil

Abstract


Image forgery detection is emerging as one of the hot research topic in the area of image forensics. In this modern digital era due to availability of advanced technology, powerful computer photo editing tools and software packages digital images can be easily forged. In the fields such as forensics, medical imaging, industrial photography and e-commerce authenticating the originality of images and detecting traces of manipulation without any prior knowledge of the image content or any embedded information is a challenging task and quite impossible to say images are authentic. As a result, photographs have almost lost their trustworthiness. In this paper an attempt is made to present a survey on classification of Image forgery detection techniques and a state-of-the-art review of the forgery detection techniques with complete bibliography.


Keywords


Image Forgery Detection, Image Forensics, Copy-Move Forgery, Image Processing

Full Text:

PDF

References


. J.a. Redi, W. Taktak, and J. L. Dugelay.” Digital image forensics: a booklet for beginners,” multimedia Tool Appl., Vol 51, no.1, pp 133-62, Jan.2011.

. J. Wang.G.Liu, Z. Zhang. Y. Dainad Z. Wang. “Fast and robust forensics for image region- duplication forgery,” Acta Automatica Sinica, Vol.35, no.12, pp 1488-95,Dec 2009.

. V.Tyagi, “Detection of forgery in images stored in digital form,” project report submitted to DRDO, New Delhi, 2010.

. Henry Farid, “Image Forgery Detection”, IEEE Signal Processing Magazine, March 2007.

. S. Bayram, I. Avcibas, B. Sankur, and N. Memon, “Image manipulation detection,” J. Electron. Imaging, vol. 15, no. 4, p. 41102, 2006.

. H. Farid, “Detecting digital forgeries using bi spectral analysis,” AI Lab, Massachusetts Institute of Technology, Tech. Rep. AIM-1657, 1999.

. J. Fridrich, D. Soukal, and J. Lukás, “Detection of copy move forgery in digital images,” in Proc. Digital Forensic Research Workshop, Aug. 2003.

. Y.-F. Hsu and S.-F. Chang, “Image splicing detection using camera response function consistency and automatic segmentation,” in Proc. Int. Conf. Multimedia and Expo, Beijing, China, 2007.

. M. K. Johnson and H. Farid, “Exposing digital forgeries by detecting inconsistencies in lighting,” in Proc. ACM Multimedia and Security Workshop, New York, NY, 2005, pp. 1–10.

. M. K. Johnson and H. Farid, “Exposing digital forgeries through chromatic aberration,” in Proc. ACM Multimedia and Security Workshop, Geneva, Switzerland, 2006, pp. 48–55.

. M. K. Johnson and H. Farid, “Metric measurements on a plane from a single image,” Dept. Computer. Sci., Dartmouth College, Tech. Rep. TR2006- 579, 2006.

. M. K. Johnson and H. Farid, “Detecting photographic composites of people,” in Proc. 6th Int. Workshop on Digital Watermarking, Guangzhou, China, 2007.

. M. K. Johnson and H. Farid, “Exposing digital forgeries in complex lighting environments,” IEEE Trans. Inform. Forensics Security, vol. 3, no. 2, pp. 450– 461, 2007.

. S. Katzenbeisser and F. A. P. Petitcolas, "Information Techniques for Steganography and Digital Watermarking". Norwood, MA: Artec House, 2000.

. J. Lukas and J. Fridrich, “Estimation of primary quantization matrix in double compressed JPEG images,” in Proc. Digital Forensic Research Workshop, Cleveland, OH, Aug. 2003.

. T.-T. Ng and S.-F. Chang, “A model for image splicing,” in Proc. IEEE Int. Conf. Image Processing, Singapore, 2004, vol. 2, pp. 1169–1172.

. A.C. Popescu and H. Farid, “Exposing digital forgeries by detecting duplicated image regions,” Dept. Computer. Sci., Dartmouth College, Tech. Rep. TR2004-515, 2004.

. A. C. Popescu and H. Farid, “Exposing digital forgeries by detecting traces of re-sampling,” IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 758–767, 2005.

. A. C. Popescu and H. Farid, “Exposing digital forgeries in color filter array interpolated images,” IEEE Trans. Signal Processing, vol. 53, no. 10, pp. 3948–3959, 2005.

. A. Swaminathan, M. Wu, and K. J. R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Inform. Forensics Security, vol. 3, no. 1, pp. 101–117, 2008.

. H. Farid, “Digital ballistics from jpeg quantization: A follow-up study,” Dept. Comp. Sci., Dartmouth College, Tech. Rep. TR2008-638, 2008.

. Minati Mishra and Munesh Chandra Adahikary, "Digital Image Tamper Detection Techniques – A Comprehensive Study", international Journal of Computer Science and Business Informatics, 2013, Vol.2, No.1, Pp.1-12.

. Pradyumna Deshpande and Prashasti Kanikar, Pixel Based "Digital Image Forgery Detection Techniques", International Journal of Engineering Research and Applications, 2012, Vol. 2, Issue 3, Pp. 539- 543.

. Wei Wang et al, "A Survey of Passive Image Tampering Detection, Springer", 2009, Pp. 308–322.

. M. K. Johnson and H. Farid, “Exposing digital forgeries through chromatic aberration,” in Proc. ACM Multimedia Security Workshop, Geneva, Switzerland, 2006, pp. 48–55.

. S. Bayram, I.Avcibas, B. Sankur, and N. Memon, “Image manipulation detection,” J. Electron. Imaging, vol. 15, no. 4, p. 041102, 2006.

. A. Anoop, "Image forgery and its detection: A survey," IEEE Sponsored 2J/d International Conference on Innovations in Information, Embedded and Communication systems (ICIIECS), 2015.

. A. Kaur, and R. Sharma, "Copy-move forgery detection using DCT and SIFT," International Journal of Computer Applications 70, no. 7 :30-34 ,2013

. K. Li and C. Xiao-ping. "Copy-move Forgery Detection in Digital Image," 3rd International Congress on Image and Signal Processing (CISP2010)978-1-4244-6516-3/10/$26.00 © IEEE 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.