Abstract
In this age of digitization, digital images are used as a prominent carrier of visual information. Images are becoming increasingly ubiquitous in everyday life. Unprecedented involvement of digital images can be seen in various paramount fields like medical science, journalism, sports, criminal investigation, image forensic, etc., where authenticity of image is of vital importance. Various tools are available free of cost or with a negligible amount of cost for manipulating images. Some tools can manipulate images to such an extent that it becomes impossible to discriminate by human visual system that image is forged or genuine. Hence, image forgery detection is a challenging area of research. It is evident that good quality work has been carried out in the past decade in the field of image forgery detection. However, there is still a need to pay much attention in this field, as image manipulation tools are becoming more and more sophisticated. The main purpose of this paper is to review the various existing methods developed for detecting the image forgery. A categorization of various forgery detection techniques has been presented in the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Revolvy.com: Hippolyte Bayard (French, 1801–1887). https://www.revolvy.com/topic/Hippolyte Bayard&item_type = topic
Loc.gov: Civil War Glass Negatives and Related Prints. https://www.loc.gov/pictures/collection/cwp/mystery.html (2008)
Photo Tampering Throught History. http://pth.izitru.com/
Tait, A.: How a badly faked photo of Vladimir Putin took over Twitter. http://www.newstatesman.com/science-tech/social-media/2017/07/how-badly-faked-photo-vladimir-putin-took-over-twitter (2017)
Tyagi, V.: Understanding Digital Image Processing. CRC Press (2018). ISBN 9781315123905
Wang, S., Zheng, D., Zhao, J., Tam, W.J., Speranza, F.: An image quality evaluation method based on digital watermarking. IEEE Trans. Circuits Syst. Video Technol. 17, 98–105 (2007)
Singh, P., Chadha, R.S.: A survey of digital watermarking techniques, applications and attacks. IEEE Int. Conf. Ind. Inform. 2, 165–175 (2013)
Arnold, M., Schmucker, M., Wolthusen, S.D.: Techniques and Applications of Digital Watermarking and Content Protection. A Cataloging in Publication Record, Artech House Inc, Norwood, MA, USA (2003)
Lu, C., Liao, H.M., Member, S.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimed. 5, 161–173 (2003)
Schneider, M., Chang, S.: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. pp. 227–230 (1996)
Cox, I.J., Miller, M.L., Bloom, J.A., Kalker, T.: Digital Watermarking and Steganography Second Edition
Christlein, V., Riess, C.C., Jordan, J., Riess, C.C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7, 1841–1854 (2012)
Hsu, Y., Chang, S.: Camera response functions for image forensics: an automatic algorithm for splicing detection. IEEE Trans. Inf. Forensics Secur. 5, 816–825 (2010)
Carvalho, T.J.De, Member, S., Riess, C., Member, A., Angelopoulou, E., Pedrini, H., Rocha, A.D.R.: Exposing digital image forgeries by illumination color classification. IEEE Trans. Inf. Forensics Secur. 8, 1182–1194 (2013)
Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Inf. Forensics Secur. 53, 758–767 (2005)
Lanh, T.V.L.T., Van Chong, K.-S., Chong, K.-S., Emmanuel, S., Kankanhalli, M.S.: A survey on digital camera image forensic methods. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 16–19 (2007)
Farid, H.: A survey of image forgery detection techniques. IEEE Signal Process. Mag. 26, 16–25 (2009)
Warif, N.B.A., Wahab, A.W.A., Idris, M.Y.I.: Copy-move forgery detection: survey, challenges and future directions. J. Netw. Comput. Appl. (2016)
Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Signal Process. Image Commun. 25, 389–399 (2010)
Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10, 226–245 (2013)
Qazi, T., Hayat, K., Khan, S.U., Madani, S.A., Khan, I.A., Kołodziej, J., Li, H., Lin, W., Yow, K.C., Xu, C.-Z.: Survey on blind image forgery detection. Image Process. IET. 7, 660–670 (2013)
Ansari, M.D., Ghrera, S.P., Tyagi, V.: Pixel-based image forgery detection: a review. IETE J. Educ. 55, 40–46 (2014)
Ali, M., Deriche, M.: A bibliography of pixel-based blind image forgery detection techniques. Signal Process. Image Commun. 39, 46–74 (2015)
Lukas, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Proceedings of SPIE, vol. 6072, pp. 60720Y–60720Y–11 (2006)
Yatziv, L., Sapiro, G.: Fast image and video colorization using chrominance blending. IEEE Trans. Image Process. 1120–1129 (2006)
Chuan, Y.Y., Curless, B., Salesin, D.H., Szeliski, R.: A bayesian approach to digital matting. Comput. Vis. Pattern Recognit. (2001)
Farid, H.: Detecting digital forgeries using bispectral analysis. Mit Ai Memo Aim-1657 Mit (1999)
Ng, T., Chang, S., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits System, pp. 7–10 (2004)
Ng, T., Chan, S.F.: A model of Image Splicing. In: IEEE International Conference on Image Process (2004)
Johnson, M.K., Farid, H.: Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of 7th Workshop on Multimed Security—MM&Sec’05, pp. 1–10 (2005)
Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions. Int. Work. Digit. Watermarking 177–187 (2006)
Li, X., Jing, T., Li, X.: Image splicing detection based on moment features and Hilbert-Huang transform. IEEE Int. Conf. Inf. Theory Inf. Secur. (2010)
Columbia DVMM Research Lab,Image Splicing Detection Evaluation Dataset. www.ee.columbia.edu/dvmm/researchProjects/AuthenticationWatermarking/Blind (2004)
Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of 9th Workshop Multimedia Security, pp. 51–62 (2007)
Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. IWDW Int. Work. Digit. Watermarking. 5450 LNCS, 76–87 (2009)
Wang, W., Dong, J., Tan, T.: Effective image splicing detection based on image chroma. In: IEEE International Conference on Image Process, pp. 1257–1260 (2009)
Kakar, P., Member, S., Sudha, N., Member, S., Ser, W., Member, S.: Exposing digital image forgeries by detecting discrepancies in motion blur. IEEE Trans. Multimed. 13, 443–452 (2011)
Rao, M.P., Rajagopalan, A.N., Member, S.: Harnessing motion blur to unveil splicing. IEEE Trans. Inf. Forensics Secur. 9, 583–595 (2014)
El-Alfy, E.S., Qureshi, M.A.: Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal. Appl. 18, 713–723 (2015)
Bahrami, K., Member, S., Kot, A.C., Li, L., Li, H., Member, S.: Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans. Inf. Forensics Secur. 6013, 1–10 (2015)
Zhao, X., Wang, S., Li, S., Li, J.: Passive image-splicing detection by a 2-D noncausal Markov model. IEEE Trans. Circuits Syst. Video Technol. 25, 185–199 (2015)
Pun, C.M., Liu, B., Yuan, X.C.: Multi-scale noise estimation for image splicing forgery detection. J. Vis. Commun. Image Represent. 38, 195–206 (2016)
Park, T.H., Han, J.G., Moon, Y.H., Eom, I.K.: Image splicing detection based on inter-scale 2D joint characteristic function moments in wavelet domain. EURASIP J. Image Video Process 30 (2016)
Zhang, Q., Lu, W.: Joint image splicing detection in DCT and contourlet transform domain. J. Vis. Commun. Image Represent. (2016)
Shen, X., Shi, Z., Chen, H.: Splicing image forgery detection using textural features based on the grey level co-occurrence matrices. IET Image Process. 11, 44–53 (2017)
Farid, H.: How to Detect Faked Photos (2017)
Chen, W., Shi, Y.Q., Su, W.: Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In: Security Steganography and Watermarking Multimedia Contents IX, vol. 6505, pp. 1–8 (2007)
He, Z., Sun, W., Lu, W., Lu, H.: Digital image splicing detection based on approximate run length. Pattern Recognit. Lett. 32, 1591–1597 (2011)
He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit. 45, 4292–4299 (2012)
Xu, B., Liu, G., Dai, Y.: Detecting image splicing using merged features in chroma space. Sci. World J. (2014)
Han, J.G., Park, T.H., Moon, W.H., Eom, I.K.: Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion. J. Electron. Imaging. (2016)
Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 8th IEEE International Workshop Information Forensics Security WIFS (2016)
Silva, E., Carvalho, T., Ferreira, A., Rocha, A.: Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J. Vis. Commun. Image Represent. 29, 16–32 (2015)
Lee, J.C., Chang, C.P., Chen, W.K.: Detection of copy-move image forgery using histogram of orientated gradients. Inf. Sci. (Ny) 321, 250–262 (2015)
Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10, 2084–2094 (2015)
Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10, 2284–2297 (2015)
Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. (2015)
Pun, C., Member, S., Yuan, X., Bi, X.: Oversegmentation and feature point matching. IEEE Trans. Inf. Forensics Secur. 10, 1705–1716 (2015)
Gürbüz, E., Ulutaş, G., Ulutaş, M.: Rotation invariant copy move forgery detection method. In: Proceedings of 9th International Conference on Electrical and Electronics Engineering, pp. 202–206 (2015)
Zhao, F., Zhang, R., Guo, H., Zhang, Y.: Effective digital image copy-move location algorithm robust to geometric transformations. In: IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC) (2015)
Wenchang, S.H.I., Fei, Z., Bo, Q.I.N., Bin, L.: Improving image copy-move forgery detection with particle swarm optimization techniques. China Commun. 139–149 (2016)
Zandi, M., Mahmoudi-Aznaveh, A., Talebpour, A.: Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans. Inf. Forensics Secur. 11, 2499–2512 (2016)
Ferreira, A., Felipussi, S.C., Alfaro, C., Fonseca, P., Vargas-Munoz, J.E., Dos Santos, J.A., Rocha, A.: Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans. Image Process. 25, 4729–4742 (2016)
Zhu, Y., Shen, X., Chen, H.: Copy-move forgery detection based on scaled ORB. Multimed. Tools Appl. 75, 3221–3233 (2016)
Bi, X., Pun, C.M., Yuan, X.C.: Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf. Sci. (Ny) 345, 226–242 (2016)
Wang, X., Li, S., Liu, Y.: A new keypoint-based copy-move forgery detection for small smooth regions. Multimed. Tools Appl. (2016)
Tralic, D., Grgic, S., Sun, X., Rosin, P.L.: Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed. Tools Appl. 16881–16903 (2016)
Yang, B., Sun, X., Guo, H., Xia, Z., Chen, X.: A copy-move forgery detection method based on CMFD-SIFT. Multimed. Tools Appl. (2017)
Lee, J.C.: Copy-move image forgery detection based on Gabor magnitude. J. Vis. Commun. Image Represent. 31, 320–334 (2015)
Bi, X.L., Pun, C.M., Yuan, X.C.: Multi-scale feature extraction and adaptive matching for copy-move forgery detection. Multimed. Tools Appl. 1–23 (2016)
Ustubioglu, B., Ulutas, G., Ulutas, M., Nabiyev, V.V.: A new copy move forgery detection technique with automatic threshold determination. AEU Int. J. Electron. Commun. 70, 1076–1087 (2016)
Zheng, J., Liu, Y., Ren, J., Zhu, T., Yan, Y., Yang, H.: Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimens. Syst. Signal Process. 27, 989–1005 (2016)
Huang, D., Huang , C., Hu, W.: Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed. Tools Appl. 76(1), 1509–1530 (2017)
Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Resampling Resampling Detecting Resampling Experiment Results (2005)
Dempster, A., Laird, N., Rubin, D.: Maximum lilelihood from in- complete data via the EM algorithm. J. Roy. Stat. Soc. 99, 1–38 (1977)
Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of 10th ACM Workshop Multimedia Security—MM&Sec’11 (2008)
Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3, 529–538 (2008)
Li, S.P., Han, Z., Chen, Y.Z., Fu, B., Lu, C., Yao, X.: Resampling forgery detection in JPEG-compressed images. In: Proceedings of 2010 3rd International Congress on Image Signal Process CISP 2010, vol. 3, pp. 1166–1170 (2010)
Lien, C.-C., Shih, C.-L., Chou, C.-H.: Fast Forgery detection with the intrinsic resampling properties. J. Inf. Secur. 1, 11–22 (2010)
Qian, R., Li, W., Yu, N., Hao, Z.: Image forensics with rotation-tolerant resampling detection. In: IEEE International Conference on Multimedia Expo Workshops ICMEW, pp. 61–66 (2012)
Birajdar, G.K., Mankar, V.H.: Blind method for rescaling detection and rescale factor estimation in digital images using periodic properties of interpolation. AEU Int. J. Electron. Commun. 68, 644–652 (2014)
David, V., Fernando, P.: A Random Matrix Approach to the Forensic Analysis of Upscaled Images. IEEE Trans. Inf. Forensics, XX (2017)
Wang, R., Ping, X.J.: Detection of resampling based on singular value decomposition. In: Proceedings of Fifth International Conference on Image Graph, pp. 879–884 (2009)
Feng, X., Cox, I.J., Doërr, G.: Normalized energy density-based forensic detection of resampled images. IEEE Trans. Multimed. 14, 536–545 (2012)
Hou, X.D., Zhang, T., Xiong, G., Zhang, Y., Ping, X.: Image resampling detection based on texture classification. Multimed. Tools Appl. 72, 1681–1708 (2013)
Gloe, T., Ohme, R.: The dresden image database for benchmarking digital image forensics. In: ACM Symposium on Applied Computing, pp. 1584–1590
Qiao, T., Zhu, A., Retraint, F.: Exposing image resampling forgery by using linear parametric model. Multimed. Tools Appl. (2017)
Su, Y., Jin, X., Zhang, C., Chen, Y..: Hierarchical image resampling detection based on blind deconvolution q. J. Vis. Commun. Image Represent. 1–11 (2017)
Peng, A., Wu, Y., Kang, X.: Revealing traces of image resampling and resampling antiforensics. Adv. Multimed. (2017)
Bayar, B., Stamm, M.C.: On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection. In: IEEE International Conference on Acoustics Speech Signal Process, pp. 2152–2156 (2017)
Lin, X., Li, C., Hu, Y.: Exposing image forgery through the detection of contrast enhancement. In: International Conference on Image Process, pp. 4467–4471 (2013)
Stamm, M., Ray, K.J.: Blind forensics of contrast enhancement in digital images. In: Proceedings of International Conference on Image Process ICIP, pp. 3112–3115 (2008)
Cao, G., Zhao, Y., Ni, R.: Detection of image sharpening based on histogram aberration and ringing Artifacts. In: IEEE International Conference on Multimedia and Expo, pp. 1026–1029 (2009)
Cao, G., Zhao, Y., Ni, R., Kot, A.C.: Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Process. Lett. 18, 603–606 (2011)
Cao, G., Zhao, Y., Ni, R., Li, X.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9, 515–525 (2014)
Ding, F., Zhu, G., Yang, J., Xie, J., Shi, Y.Q.: Edge perpendicular binary coding for USM sharpening detection. IEEE Signal Process. Lett. 22, 327–331 (2015)
Zhu, N., Deng, C., Gao, X.: Image sharpening detection based on multiresolution overshoot artifact analysis. Multimed. Tools Appl. (2016)
Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: International Conference on Multimedia and Expo, pp. 549–552 (2006)
Dong, J., Wang, W.: CASIA tampered image detection evaluation database
Dong, J., Wang, W.: CASIA2 tampered image detection evaluation (TIDE) database
Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD—New database for copy-move forgery detection
Amerini, I., Ballan, L., Caldelli, R., Bimbo, A. Del, Serra, G.: A SIFT-based forensic method for copy—move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 1099–1110 (2011)
Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., Serra, G.: Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process. Image Commun. 659–669 (2013)
Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security, pp. 119–124 (2014)
Xie, D., Liang, L., Jin, L., Xu, J., Li, M.: A benchmark dataset for facial beauty perception. http://www.hcii-lab.net/data/SCUT-FBP
Bas, P., Filler, T., Pevný, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of Information Hiding, Prague, Czech Repub, pp. 59–70 (2011)
Stich, M., Schaefer, G.: UCID—an uncompressed colour image database. In:Proceedings of SPIE, Storage Retrieval Methods and Application Multimedia, pp. 472–480 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Meena, K.B., Tyagi, V. (2019). Image Forgery Detection: Survey and Future Directions. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds) Data, Engineering and Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-6351-1_14
Download citation
DOI: https://doi.org/10.1007/978-981-13-6351-1_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6350-4
Online ISBN: 978-981-13-6351-1
eBook Packages: Computer ScienceComputer Science (R0)