Skip to main content

Image Forgery Detection: Survey and Future Directions

  • Chapter
  • First Online:
Data, Engineering and Applications

Abstract

In this age of digitization, digital images are used as a prominent carrier of visual information. Images are becoming increasingly ubiquitous in everyday life. Unprecedented involvement of digital images can be seen in various paramount fields like medical science, journalism, sports, criminal investigation, image forensic, etc., where authenticity of image is of vital importance. Various tools are available free of cost or with a negligible amount of cost for manipulating images. Some tools can manipulate images to such an extent that it becomes impossible to discriminate by human visual system that image is forged or genuine. Hence, image forgery detection is a challenging area of research. It is evident that good quality work has been carried out in the past decade in the field of image forgery detection. However, there is still a need to pay much attention in this field, as image manipulation tools are becoming more and more sophisticated. The main purpose of this paper is to review the various existing methods developed for detecting the image forgery. A categorization of various forgery detection techniques has been presented in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Revolvy.com: Hippolyte Bayard (French, 1801–1887). https://www.revolvy.com/topic/Hippolyte Bayard&item_type = topic

  2. Loc.gov: Civil War Glass Negatives and Related Prints. https://www.loc.gov/pictures/collection/cwp/mystery.html (2008)

  3. Photo Tampering Throught History. http://pth.izitru.com/

  4. Tait, A.: How a badly faked photo of Vladimir Putin took over Twitter. http://www.newstatesman.com/science-tech/social-media/2017/07/how-badly-faked-photo-vladimir-putin-took-over-twitter (2017)

  5. Tyagi, V.: Understanding Digital Image Processing. CRC Press (2018). ISBN 9781315123905

    Google Scholar 

  6. Wang, S., Zheng, D., Zhao, J., Tam, W.J., Speranza, F.: An image quality evaluation method based on digital watermarking. IEEE Trans. Circuits Syst. Video Technol. 17, 98–105 (2007)

    Google Scholar 

  7. Singh, P., Chadha, R.S.: A survey of digital watermarking techniques, applications and attacks. IEEE Int. Conf. Ind. Inform. 2, 165–175 (2013)

    Google Scholar 

  8. Arnold, M., Schmucker, M., Wolthusen, S.D.: Techniques and Applications of Digital Watermarking and Content Protection. A Cataloging in Publication Record, Artech House Inc, Norwood, MA, USA (2003)

    Google Scholar 

  9. Lu, C., Liao, H.M., Member, S.: Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimed. 5, 161–173 (2003)

    Google Scholar 

  10. Schneider, M., Chang, S.: A robust content based digital signature for image authentication. In: IEEE International Conference on Image Processing. pp. 227–230 (1996)

    Google Scholar 

  11. Cox, I.J., Miller, M.L., Bloom, J.A., Kalker, T.: Digital Watermarking and Steganography Second Edition

    Google Scholar 

  12. Christlein, V., Riess, C.C., Jordan, J., Riess, C.C., Angelopoulou, E.: An evaluation of popular copy-move forgery detection approaches. IEEE Trans. Inf. Forensics Secur. 7, 1841–1854 (2012)

    Google Scholar 

  13. Hsu, Y., Chang, S.: Camera response functions for image forensics: an automatic algorithm for splicing detection. IEEE Trans. Inf. Forensics Secur. 5, 816–825 (2010)

    Google Scholar 

  14. Carvalho, T.J.De, Member, S., Riess, C., Member, A., Angelopoulou, E., Pedrini, H., Rocha, A.D.R.: Exposing digital image forgeries by illumination color classification. IEEE Trans. Inf. Forensics Secur. 8, 1182–1194 (2013)

    Google Scholar 

  15. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Inf. Forensics Secur. 53, 758–767 (2005)

    MathSciNet  MATH  Google Scholar 

  16. Lanh, T.V.L.T., Van Chong, K.-S., Chong, K.-S., Emmanuel, S., Kankanhalli, M.S.: A survey on digital camera image forensic methods. In: 2007 IEEE International Conference on Multimedia and Expo, pp. 16–19 (2007)

    Google Scholar 

  17. Farid, H.: A survey of image forgery detection techniques. IEEE Signal Process. Mag. 26, 16–25 (2009)

    Google Scholar 

  18. Warif, N.B.A., Wahab, A.W.A., Idris, M.Y.I.: Copy-move forgery detection: survey, challenges and future directions. J. Netw. Comput. Appl. (2016)

    Google Scholar 

  19. Mahdian, B., Saic, S.: A bibliography on blind methods for identifying image forgery. Signal Process. Image Commun. 25, 389–399 (2010)

    Google Scholar 

  20. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques: a survey. Digit. Investig. 10, 226–245 (2013)

    Google Scholar 

  21. Qazi, T., Hayat, K., Khan, S.U., Madani, S.A., Khan, I.A., Kołodziej, J., Li, H., Lin, W., Yow, K.C., Xu, C.-Z.: Survey on blind image forgery detection. Image Process. IET. 7, 660–670 (2013)

    Google Scholar 

  22. Ansari, M.D., Ghrera, S.P., Tyagi, V.: Pixel-based image forgery detection: a review. IETE J. Educ. 55, 40–46 (2014)

    Google Scholar 

  23. Ali, M., Deriche, M.: A bibliography of pixel-based blind image forgery detection techniques. Signal Process. Image Commun. 39, 46–74 (2015)

    Google Scholar 

  24. Lukas, J., Fridrich, J., Goljan, M.: Detecting digital image forgeries using sensor pattern noise. In: Proceedings of SPIE, vol. 6072, pp. 60720Y–60720Y–11 (2006)

    Google Scholar 

  25. Yatziv, L., Sapiro, G.: Fast image and video colorization using chrominance blending. IEEE Trans. Image Process. 1120–1129 (2006)

    Google Scholar 

  26. Chuan, Y.Y., Curless, B., Salesin, D.H., Szeliski, R.: A bayesian approach to digital matting. Comput. Vis. Pattern Recognit. (2001)

    Google Scholar 

  27. Farid, H.: Detecting digital forgeries using bispectral analysis. Mit Ai Memo Aim-1657 Mit (1999)

    Google Scholar 

  28. Ng, T., Chang, S., Sun, Q.: Blind detection of photomontage using higher order statistics. In: IEEE International Symposium on Circuits System, pp. 7–10 (2004)

    Google Scholar 

  29. Ng, T., Chan, S.F.: A model of Image Splicing. In: IEEE International Conference on Image Process (2004)

    Google Scholar 

  30. Johnson, M.K., Farid, H.: Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of 7th Workshop on Multimed Security—MM&Sec’05, pp. 1–10 (2005)

    Google Scholar 

  31. Fu, D., Shi, Y.Q., Su, W.: Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions. Int. Work. Digit. Watermarking 177–187 (2006)

    Google Scholar 

  32. Li, X., Jing, T., Li, X.: Image splicing detection based on moment features and Hilbert-Huang transform. IEEE Int. Conf. Inf. Theory Inf. Secur. (2010)

    Google Scholar 

  33. Columbia DVMM Research Lab,Image Splicing Detection Evaluation Dataset. www.ee.columbia.edu/dvmm/researchProjects/AuthenticationWatermarking/Blind (2004)

  34. Shi, Y.Q., Chen, C., Chen, W.: A natural image model approach to splicing detection. In: Proceedings of 9th Workshop Multimedia Security, pp. 51–62 (2007)

    Google Scholar 

  35. Dong, J., Wang, W., Tan, T., Shi, Y.Q.: Run-length and edge statistics based approach for image splicing detection. IWDW Int. Work. Digit. Watermarking. 5450 LNCS, 76–87 (2009)

    Google Scholar 

  36. Wang, W., Dong, J., Tan, T.: Effective image splicing detection based on image chroma. In: IEEE International Conference on Image Process, pp. 1257–1260 (2009)

    Google Scholar 

  37. Kakar, P., Member, S., Sudha, N., Member, S., Ser, W., Member, S.: Exposing digital image forgeries by detecting discrepancies in motion blur. IEEE Trans. Multimed. 13, 443–452 (2011)

    Google Scholar 

  38. Rao, M.P., Rajagopalan, A.N., Member, S.: Harnessing motion blur to unveil splicing. IEEE Trans. Inf. Forensics Secur. 9, 583–595 (2014)

    Google Scholar 

  39. El-Alfy, E.S., Qureshi, M.A.: Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal. Appl. 18, 713–723 (2015)

    Google Scholar 

  40. Bahrami, K., Member, S., Kot, A.C., Li, L., Li, H., Member, S.: Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans. Inf. Forensics Secur. 6013, 1–10 (2015)

    Google Scholar 

  41. Zhao, X., Wang, S., Li, S., Li, J.: Passive image-splicing detection by a 2-D noncausal Markov model. IEEE Trans. Circuits Syst. Video Technol. 25, 185–199 (2015)

    Google Scholar 

  42. Pun, C.M., Liu, B., Yuan, X.C.: Multi-scale noise estimation for image splicing forgery detection. J. Vis. Commun. Image Represent. 38, 195–206 (2016)

    Google Scholar 

  43. Park, T.H., Han, J.G., Moon, Y.H., Eom, I.K.: Image splicing detection based on inter-scale 2D joint characteristic function moments in wavelet domain. EURASIP J. Image Video Process 30 (2016)

    Google Scholar 

  44. Zhang, Q., Lu, W.: Joint image splicing detection in DCT and contourlet transform domain. J. Vis. Commun. Image Represent. (2016)

    Google Scholar 

  45. Shen, X., Shi, Z., Chen, H.: Splicing image forgery detection using textural features based on the grey level co-occurrence matrices. IET Image Process. 11, 44–53 (2017)

    Google Scholar 

  46. Farid, H.: How to Detect Faked Photos (2017)

    Google Scholar 

  47. Chen, W., Shi, Y.Q., Su, W.: Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. In: Security Steganography and Watermarking Multimedia Contents IX, vol. 6505, pp. 1–8 (2007)

    Google Scholar 

  48. He, Z., Sun, W., Lu, W., Lu, H.: Digital image splicing detection based on approximate run length. Pattern Recognit. Lett. 32, 1591–1597 (2011)

    Google Scholar 

  49. He, Z., Lu, W., Sun, W., Huang, J.: Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit. 45, 4292–4299 (2012)

    Google Scholar 

  50. Xu, B., Liu, G., Dai, Y.: Detecting image splicing using merged features in chroma space. Sci. World J. (2014)

    Google Scholar 

  51. Han, J.G., Park, T.H., Moon, W.H., Eom, I.K.: Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion. J. Electron. Imaging. (2016)

    Google Scholar 

  52. Rao, Y., Ni, J.: A deep learning approach to detection of splicing and copy-move forgeries in images. In: 8th IEEE International Workshop Information Forensics Security WIFS (2016)

    Google Scholar 

  53. Silva, E., Carvalho, T., Ferreira, A., Rocha, A.: Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. J. Vis. Commun. Image Represent. 29, 16–32 (2015)

    Google Scholar 

  54. Lee, J.C., Chang, C.P., Chen, W.K.: Detection of copy-move image forgery using histogram of orientated gradients. Inf. Sci. (Ny) 321, 250–262 (2015)

    Google Scholar 

  55. Ardizzone, E., Bruno, A., Mazzola, G.: Copy-move forgery detection by matching triangles of keypoints. IEEE Trans. Inf. Forensics Secur. 10, 2084–2094 (2015)

    Google Scholar 

  56. Cozzolino, D., Poggi, G., Verdoliva, L.: Efficient dense-field copy-move forgery detection. IEEE Trans. Inf. Forensics Secur. 10, 2284–2297 (2015)

    Google Scholar 

  57. Li, J., Li, X., Yang, B., Sun, X.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. (2015)

    Google Scholar 

  58. Pun, C., Member, S., Yuan, X., Bi, X.: Oversegmentation and feature point matching. IEEE Trans. Inf. Forensics Secur. 10, 1705–1716 (2015)

    Google Scholar 

  59. Gürbüz, E., Ulutaş, G., Ulutaş, M.: Rotation invariant copy move forgery detection method. In: Proceedings of 9th International Conference on Electrical and Electronics Engineering, pp. 202–206 (2015)

    Google Scholar 

  60. Zhao, F., Zhang, R., Guo, H., Zhang, Y.: Effective digital image copy-move location algorithm robust to geometric transformations. In: IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC) (2015)

    Google Scholar 

  61. Wenchang, S.H.I., Fei, Z., Bo, Q.I.N., Bin, L.: Improving image copy-move forgery detection with particle swarm optimization techniques. China Commun. 139–149 (2016)

    Google Scholar 

  62. Zandi, M., Mahmoudi-Aznaveh, A., Talebpour, A.: Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans. Inf. Forensics Secur. 11, 2499–2512 (2016)

    Google Scholar 

  63. Ferreira, A., Felipussi, S.C., Alfaro, C., Fonseca, P., Vargas-Munoz, J.E., Dos Santos, J.A., Rocha, A.: Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans. Image Process. 25, 4729–4742 (2016)

    MathSciNet  MATH  Google Scholar 

  64. Zhu, Y., Shen, X., Chen, H.: Copy-move forgery detection based on scaled ORB. Multimed. Tools Appl. 75, 3221–3233 (2016)

    Google Scholar 

  65. Bi, X., Pun, C.M., Yuan, X.C.: Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf. Sci. (Ny) 345, 226–242 (2016)

    Google Scholar 

  66. Wang, X., Li, S., Liu, Y.: A new keypoint-based copy-move forgery detection for small smooth regions. Multimed. Tools Appl. (2016)

    Google Scholar 

  67. Tralic, D., Grgic, S., Sun, X., Rosin, P.L.: Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed. Tools Appl. 16881–16903 (2016)

    Google Scholar 

  68. Yang, B., Sun, X., Guo, H., Xia, Z., Chen, X.: A copy-move forgery detection method based on CMFD-SIFT. Multimed. Tools Appl. (2017)

    Google Scholar 

  69. Lee, J.C.: Copy-move image forgery detection based on Gabor magnitude. J. Vis. Commun. Image Represent. 31, 320–334 (2015)

    Google Scholar 

  70. Bi, X.L., Pun, C.M., Yuan, X.C.: Multi-scale feature extraction and adaptive matching for copy-move forgery detection. Multimed. Tools Appl. 1–23 (2016)

    Google Scholar 

  71. Ustubioglu, B., Ulutas, G., Ulutas, M., Nabiyev, V.V.: A new copy move forgery detection technique with automatic threshold determination. AEU Int. J. Electron. Commun. 70, 1076–1087 (2016)

    Google Scholar 

  72. Zheng, J., Liu, Y., Ren, J., Zhu, T., Yan, Y., Yang, H.: Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimens. Syst. Signal Process. 27, 989–1005 (2016)

    MathSciNet  MATH  Google Scholar 

  73. Huang, D., Huang , C., Hu, W.: Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed. Tools Appl. 76(1), 1509–1530 (2017)

    Google Scholar 

  74. Popescu, A.C., Farid, H.: Exposing Digital Forgeries by Detecting Traces of Resampling Resampling Detecting Resampling Experiment Results (2005)

    Google Scholar 

  75. Dempster, A., Laird, N., Rubin, D.: Maximum lilelihood from in- complete data via the EM algorithm. J. Roy. Stat. Soc. 99, 1–38 (1977)

    Google Scholar 

  76. Kirchner, M.: Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of 10th ACM Workshop Multimedia Security—MM&Sec’11 (2008)

    Google Scholar 

  77. Mahdian, B., Saic, S.: Blind authentication using periodic properties of interpolation. IEEE Trans. Inf. Forensics Secur. 3, 529–538 (2008)

    Google Scholar 

  78. Li, S.P., Han, Z., Chen, Y.Z., Fu, B., Lu, C., Yao, X.: Resampling forgery detection in JPEG-compressed images. In: Proceedings of 2010 3rd International Congress on Image Signal Process CISP 2010, vol. 3, pp. 1166–1170 (2010)

    Google Scholar 

  79. Lien, C.-C., Shih, C.-L., Chou, C.-H.: Fast Forgery detection with the intrinsic resampling properties. J. Inf. Secur. 1, 11–22 (2010)

    Google Scholar 

  80. Qian, R., Li, W., Yu, N., Hao, Z.: Image forensics with rotation-tolerant resampling detection. In: IEEE International Conference on Multimedia Expo Workshops ICMEW, pp. 61–66 (2012)

    Google Scholar 

  81. Birajdar, G.K., Mankar, V.H.: Blind method for rescaling detection and rescale factor estimation in digital images using periodic properties of interpolation. AEU Int. J. Electron. Commun. 68, 644–652 (2014)

    Google Scholar 

  82. David, V., Fernando, P.: A Random Matrix Approach to the Forensic Analysis of Upscaled Images. IEEE Trans. Inf. Forensics, XX (2017)

    Google Scholar 

  83. Wang, R., Ping, X.J.: Detection of resampling based on singular value decomposition. In: Proceedings of Fifth International Conference on Image Graph, pp. 879–884 (2009)

    Google Scholar 

  84. Feng, X., Cox, I.J., Doërr, G.: Normalized energy density-based forensic detection of resampled images. IEEE Trans. Multimed. 14, 536–545 (2012)

    Google Scholar 

  85. Hou, X.D., Zhang, T., Xiong, G., Zhang, Y., Ping, X.: Image resampling detection based on texture classification. Multimed. Tools Appl. 72, 1681–1708 (2013)

    Google Scholar 

  86. Gloe, T., Ohme, R.: The dresden image database for benchmarking digital image forensics. In: ACM Symposium on Applied Computing, pp. 1584–1590

    Google Scholar 

  87. Qiao, T., Zhu, A., Retraint, F.: Exposing image resampling forgery by using linear parametric model. Multimed. Tools Appl. (2017)

    Google Scholar 

  88. Su, Y., Jin, X., Zhang, C., Chen, Y..: Hierarchical image resampling detection based on blind deconvolution q. J. Vis. Commun. Image Represent. 1–11 (2017)

    Google Scholar 

  89. Peng, A., Wu, Y., Kang, X.: Revealing traces of image resampling and resampling antiforensics. Adv. Multimed. (2017)

    Google Scholar 

  90. Bayar, B., Stamm, M.C.: On the robustness of constrained convolutional neural networks to JPEG post-compression for image resampling detection. In: IEEE International Conference on Acoustics Speech Signal Process, pp. 2152–2156 (2017)

    Google Scholar 

  91. Lin, X., Li, C., Hu, Y.: Exposing image forgery through the detection of contrast enhancement. In: International Conference on Image Process, pp. 4467–4471 (2013)

    Google Scholar 

  92. Stamm, M., Ray, K.J.: Blind forensics of contrast enhancement in digital images. In: Proceedings of International Conference on Image Process ICIP, pp. 3112–3115 (2008)

    Google Scholar 

  93. Cao, G., Zhao, Y., Ni, R.: Detection of image sharpening based on histogram aberration and ringing Artifacts. In: IEEE International Conference on Multimedia and Expo, pp. 1026–1029 (2009)

    Google Scholar 

  94. Cao, G., Zhao, Y., Ni, R., Kot, A.C.: Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Process. Lett. 18, 603–606 (2011)

    Google Scholar 

  95. Cao, G., Zhao, Y., Ni, R., Li, X.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9, 515–525 (2014)

    Google Scholar 

  96. Ding, F., Zhu, G., Yang, J., Xie, J., Shi, Y.Q.: Edge perpendicular binary coding for USM sharpening detection. IEEE Signal Process. Lett. 22, 327–331 (2015)

    Google Scholar 

  97. Zhu, N., Deng, C., Gao, X.: Image sharpening detection based on multiresolution overshoot artifact analysis. Multimed. Tools Appl. (2016)

    Google Scholar 

  98. Hsu, Y.F., Chang, S.F.: Detecting image splicing using geometry invariants and camera characteristics consistency. In: International Conference on Multimedia and Expo, pp. 549–552 (2006)

    Google Scholar 

  99. Dong, J., Wang, W.: CASIA tampered image detection evaluation database

    Google Scholar 

  100. Dong, J., Wang, W.: CASIA2 tampered image detection evaluation (TIDE) database

    Google Scholar 

  101. Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD—New database for copy-move forgery detection

    Google Scholar 

  102. Amerini, I., Ballan, L., Caldelli, R., Bimbo, A. Del, Serra, G.: A SIFT-based forensic method for copy—move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 1099–1110 (2011)

    Google Scholar 

  103. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L., Serra, G.: Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Process. Image Commun. 659–669 (2013)

    Google Scholar 

  104. Zandi, M., Mahmoudi-Aznaveh, A., Mansouri, A.: Adaptive matching for copy-move forgery detection. In: IEEE International Workshop on Information Forensics and Security, pp. 119–124 (2014)

    Google Scholar 

  105. Xie, D., Liang, L., Jin, L., Xu, J., Li, M.: A benchmark dataset for facial beauty perception. http://www.hcii-lab.net/data/SCUT-FBP

  106. Bas, P., Filler, T., Pevný, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of Information Hiding, Prague, Czech Repub, pp. 59–70 (2011)

    Google Scholar 

  107. Stich, M., Schaefer, G.: UCID—an uncompressed colour image database. In:Proceedings of SPIE, Storage Retrieval Methods and Application Multimedia, pp. 472–480 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vipin Tyagi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Meena, K.B., Tyagi, V. (2019). Image Forgery Detection: Survey and Future Directions. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds) Data, Engineering and Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-6351-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6351-1_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6350-4

  • Online ISBN: 978-981-13-6351-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics