Skip to main content
Log in

A comprehensive survey on image authentication for tamper detection with localization

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The data that is stored or transmitted in digital form is susceptible to be attacked. Digital images are particularly vulnerable to unauthorized access and illicit alterations. As a result, image credibility verification approaches are constantly gaining popularity due to their importance in a variety of social concerns, including the government, military, forensics, and electronic commerce, among others. Even a minor attack could have disastrous consequences. Therefore, protecting images from tampering has become increasingly crucial. Many approaches have been developed in the literature to ensure the authenticity and integrity of digital images. These methodologies can be grouped into active and passive approaches for image authentication and tampering detection. Active image authentication has a general solution based on watermarking, signature and hybrid techniques. Passive authentication, on the other hand, relies on the image’s inherent natural characteristics to provide implicit authentication. Digital image forensic tools have been utilized for identifying the signs of digital tampering. We have found from the literature of the past three decades that image credibility verification approaches have achieved promising results. However, accurate image tamper localization remains an unsolved problem and a fairly difficult task too, if it is performed carefully with expertise. This motivated us to present a comprehensive review of image authentication techniques, which enables not only image tamper detection but also localize the manipulated region. We also discussed the future work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

Not Applicable.

References

  1. Abbas SQ, Ahmed F, Živić N, Ur-Rehman O (2016) Perceptual image hashing using SVD based noise resistant local binary pattern. In: 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, pp. 401–407

  2. Abdalla Y, Iqbal MT, Shehata M (2019) Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network. Information 10(9):286

    Article  Google Scholar 

  3. Abdelhakim A, Saleh HI, Abdelhakim M (2019) Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multimed Tools Appl 78(22):32523–32563

    Article  Google Scholar 

  4. Abidin ABZ, Majid HBA, Samah ABA, Hashim HB (2019) Copy-move image forgery detection using deep learning methods: a review. In: 2019 6th international conference on research and innovation in information systems (ICRIIS), pp. 1–6

  5. Adams J, Parulski K, Spaulding K (1998) Color processing in digital cameras. IEEE Micro 18(6):20–30

    Article  Google Scholar 

  6. Ahmed F, Siyal MY (2007) A secure and robust wavelet-based hashing scheme for image authentication. In: International conference on multimedia modeling. Springer, Berlin, Heidelberg, pp. 51–62

  7. Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90(5):1456–1470

    Article  MATH  Google Scholar 

  8. Ahmed B, Gulliver TA, alZahir S (2020) Image splicing detection using mask-RCNN. Signal Image Video Process 14(5):1035–1042

  9. Al-Azrak F. M. , Sedik A, Dessowky MI, El Banby GM, Khalaf AA, Elkorany AS, El-Samie FEA (2020) An efficient method for image forgery detection based on trigonometric transforms and deep learning. Multimed Tools Appl 79(25):18221–18243

    Article  Google Scholar 

  10. Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Appl 30(1):183–192

    Article  Google Scholar 

  11. Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28(6):659–669

    Article  Google Scholar 

  12. Anbu T, Joe MM, Murugeswari G (2020) A comprehensive survey of detecting tampered images and localization of the tampered region. Multimedia Tools and Applications, pp. 1–39

  13. Armas Vega EA, Sandoval Orozco AL, García Villalba LJ, Hernandez-Castro J (2018) Digital images authentication technique based on DWT, DCT and local binary patterns. Sensors 18(10):3372

    Article  Google Scholar 

  14. Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci 49(3):281–307

    Article  Google Scholar 

  15. Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU-Int J Electron Commun 79:207–218

    Article  Google Scholar 

  16. Babu B, Pillai KA (2015) Robust hashing for image authentication using Zernike moments, gabor wavelets and histogram features. Int J Sci Technol Manag 04(01)

  17. Barad ZJ, Goswami MM (2020) Image forgery detection using deep learning: A survey. In: 2020 6th international conference on advanced computing and communication systems (ICACCS), pp. 571–576.

  18. Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process:1–40

  19. Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105–1117

    Article  Google Scholar 

  20. Battiato S, Farinella G. M, Messina E, Puglisi G (201) Understanding geometric manipulations of images through BOVW-based hashing. In: IEEE International Conference on Multimedia and Expo, pp. 1–6.

  21. Bayram S, Sencar H, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: IEEE International Conference on Image Processing, Vol. 3, pp. III-69

  22. Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensics Secur 7(3):1003–1017

    Article  Google Scholar 

  23. Bilal M, Habib HA, Mehmood Z, Saba T, Rashid M (2020) Single and multiple copy–move forgery detection and localization in digital images based on the sparsely encoded distinctive features and DBSCAN clustering. Arab J Sci Eng 45(4):2975–2992

    Article  Google Scholar 

  24. Bolourian Haghighi B, Taherinia AH, Monsefi R (2020) An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network. Cognit Comput 12(4):863–890

  25. Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp. 1881-1889

  26. Byun SW, Son HS, Lee SP (2019) Fast and robust watermarking method based on DCT specific location. IEEE Access 7:100706–100718

    Article  Google Scholar 

  27. Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1–3):33–43

    Article  Google Scholar 

  28. Celik M. U, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Transaction Image Processing 11(6):585–595

  29. Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15(4):1042–1049

    Article  Google Scholar 

  30. Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446

    Article  Google Scholar 

  31. Chen YL, Hsu CT (2011) Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inf Forensics Secur 6(2):396–406

    Article  Google Scholar 

  32. Chen T, Wang J, Zhou Y (2001) Combined digital signature and digital watermark scheme for image authentication. In: International Conferences on Info-Tech and Info-NetProceedings, Cat No 01EX479, Vol. 5, pp. 78–82

  33. Chen W, Shi YQ, Su W (2007) Image splicing detection using 2D phase congruency and statistical moments of characteristic function. In: Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505, p. 65050R.

  34. Chen H, Shen X, Lv Y (2010) Blind identification method for authenticity of infinite light source images. In: 2010 Fifth International Conference on Frontier of Computer Science and Technology. pp. 131–135

  35. Chennamma HR, Rangarajan L (2011) Image splicing detection using inherent lens radial distortion. Int J Comput Sci Issues 7(6) 2010:149–158 ISSN.arXiv preprint arXiv:1105.4712

  36. Cheung YM, Wu HT (2007) A sequential quantization strategy for data embedding and integrity verification. IEEE Trans Circuits Syst Video Technol 17(8):1007–1016

    Article  Google Scholar 

  37. Ciptasari RW, Rhee KH, Sakurai K (2013) Exploiting reference images for image splicing verification. Digit Investig 10(3):246–258

    Article  Google Scholar 

  38. Dadkhah S, Abd Manaf A, Sadeghi S (2014) Efficient image authentication and tamper localization algorithm using active watermarking. In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp 115–148

    Chapter  Google Scholar 

  39. Davarzani R, Mozaffari S, Yaghmaie.K. (2015) Image authentication using LBP-based perceptual image hashing. Journal of AI and Data Mining 3(1):21–30

    Google Scholar 

  40. De Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inf Forensics Secur 8(7):1182–1194

    Article  Google Scholar 

  41. Ding W, Xie Y, Wang Y (2019) Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value. Multimed Tools Appl 78(5):5305–5328

    Article  Google Scholar 

  42. Dirik AE, Sencar HT, Memon N (2007) Source camera identification based on sensor dust characteristics. In: 2007 IEEE Workshop on Signal Processing Applications for Public Security and Forensics, pp. 1–6

  43. Doegar A, Dutta M, Kumar G (2020) Image forgery detection using Google net and random Forest machine learning algorithm. J Univ Shanghai Sci Technol:1271–1278

  44. Fan W, Wang K, Cayre F, Xiong Z (2012) 3D lighting-based image forgery detection using shape-from-shading. In: 2012 Proceedings of the 20th European Signal Processing Conference, pp. 1777–1781

  45. Fang Z, Wang S, Zhang X (2010) Image splicing detection using color edge inconsistency. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 923–926

  46. Farid H (2006) Digital image ballistics from JPEG quantization. Computer Science Technical Report TR2006–583. https://digitalcommons. (2006). dartmouth.edu/cs_tr/291

  47. Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16–25

    Article  Google Scholar 

  48. Farinella GM, Giuffrida MV, Digiacomo V, Battiato S (2015) On blind source camera identification. In: International Conference on Advanced Concepts for Intelligent Vision Systems, pp. 464–473

  49. Fridrich J (1998) Image watermarking for tamper detection. In: Proceedings 1998 International Conference on Image Processing, Cat. No. 98CB36269, Vol. 2, pp. 404–408

  50. Fridrich J (1999) Robust bit extraction from images. In: Proceedings IEEE International Conference on Multimedia Computing and Systems Vol. 2, pp. 536–540

  51. Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop

  52. Fu D, Shi YQ, Su W (2006) Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: International workshop on digital watermarking, pp. 177–187

  53. Fu D, Shi YQ, Su W (2007) A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505, p. 65051L

  54. Ghorbani M, Firouzmand M, Faraahi A (2011) DWT-DCT (QCD) based copy-move image forgery detection. In: 2011 18th International Conference on Systems, Signals and Image Processing, IEEE, pp 1–4

  55. Gill NK, Garg R, Doegar EA (2017) A review paper on digital image forgery detection techniques. In: 2017 8th international conference on computing, communication and networking technologies (ICCCNT), pp. 1–7

  56. Gong D, Goh OS, Kumar YJ, Ye Z, Chi W (2020) Deepfake forensics, an ai-synthesized detection with deep convolutional generative adversarial networks. Int J 9(3):2861–2870

    Google Scholar 

  57. Gopi ES, Lakshmanan N, Gokul T, Kumara Ganesh S (2006) Digital image forgery detection using artificial neural network and auto regressive coefficients. In: 2006 Canadian Conference on Electrical and Computer Engineering, pp. 194–197

  58. Guo XC, Hatzinakos D (2007) Content based image hashing via wavelet and radon transform. In: Pacific-rim conference on multimedia. Springer, Berlin, Heidelberg, pp. 755–764

  59. Guorui F, Jian W (2020) Image forgery detection based on the convolutional neural network. In: proceedings of the 2020 12th international conference on machine learning and computing, pp. 266–270

  60. Gupta M, Kishore RR (2021) A survey of watermarking technique using deep neural network architecture. In: 2021 international conference on computing, communication, and intelligent systems (ICCCIS), pp. 630–635

  61. He Z, Sun W, Lu W, Lu H (2011) Digital image splicing detection based on approximate run length. Pattern Recogn Lett 32(12):1591–1597

    Article  Google Scholar 

  62. He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn 45(12):4292–4299

    Article  Google Scholar 

  63. Hosseini S, Mahdavi M (2021) Image content dependent semi-fragile watermarking with localized tamper detection. arXiv preprint arXiv:2106.14150

  64. Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE, Vol 2, pp 272–276

  65. Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184

    Article  Google Scholar 

  66. Islam MM, Karmakar G, Kamruzzaman J, Murshed M, Kahandawa G, Parvin N (2018) Detecting splicing and copy-move attacks in color images. In: 2018 Digital Image Computing: Techniques and Applications. pp. 1–7

  67. Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on Multimedia and security, pp 1–10

  68. Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450–461

    Article  Google Scholar 

  69. Johnson MK, Farid H (2007) Exposing digital forgeries through specular highlights on the eye. In: International Workshop on Information Hiding, pp. 311–325

  70. Johnson MK, Farid H (2007) Detecting photographic composites of people. In: International Workshop on Digital Watermarking, pp. 19–33

  71. Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028

    Article  Google Scholar 

  72. Kamili A, Hurrah NN, Parah SA, Bhat GM, Muhammad K (2020) DWFCAT: dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans Ind Inf 17(7):5108–5117

    Article  Google Scholar 

  73. Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: 2008 International conference on computer science and software engineering, IEEE, Vol 3, pp 926–930

  74. Kee E, Farid H (2010) Exposing digital forgeries from 3-D lighting environments. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1–6

  75. Kharrazi M, Sencar HT, Memon N (2004) Blind source camera identification. In: 2004 International Conference on Image Processing, Vol. 1, pp. 709–712

  76. Kharrazi M, Sencar H, Memon N (2005) Blind source camera identification. In: IEEE International Conference on Image Processing, pp. 69–72

  77. Kim C, Yang CN (2021) Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches. Appl Sci 11(3):1146

    Article  Google Scholar 

  78. Kirchner M (2008) Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of the 10th ACM workshop on Multimedia and security, pp. 11–20

  79. Kundur D, Hatzinakos D (1998) Towards a telltale watermarking technique for tamper-proofing. In: Proceedings 1998 International Conference on Image Processing, Cat No 98CB36269, Vol. 2, pp. 409–413

  80. Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: The 3rd Canadian Conference on Computer and Robot Vision, CRV'06, pp. 64–64

  81. Laouamer L, AlShaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digital Ecosyst 2(1–2):1–12

    Article  Google Scholar 

  82. Li H, Huang J (2019) Localization of deep inpainting using high-pass fully convolutional network. In proceedings of the IEEE/CVF international conference on computer vision, pp. 8301–8310

  83. Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: 2007 IEEE international conference on multimedia and expo, pp. 1750–1753

  84. Li B, Shi YQ, Huang J (2008) Detecting doubly compressed JPEG images by using mode based first digit features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735

  85. Li X, Jing T, Li X (2010) Image splicing detection based on moment features and Hilbert-Huang Transform. In: 2010 IEEE international conference on information theory and information security, pp. 1127–1130

  86. Lin CY, Chang SF (2000) Semi-fragile watermarking for authenticating JPEG visual content. In Security and Watermarking of Multimedia Contents II, International Society for Optics and Photonics, Vol. 3971, pp. 140–151

  87. Lin SD, Wu T (2011) An integrated technique for splicing and copy-move forgery image detection. In: 2011 4th International Congress on Image and Signal Processing, Vol. 2, pp. 1086–1090

  88. Lin HY, Liao HY, Lu CS, Lin JC (2005) Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans Multimed 7(6):997–1006

    Article  Google Scholar 

  89. Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Signal Process 5(5):188–197

    Google Scholar 

  90. Lin HJ, Wang CW, Kao YT, Chen S (2009) An efficient method for copy-move forgery detection. In WSEAS international conference. Proceedings. Mathematics and computers in science and engineering (No. 8). World Scientific and Engineering Academy and Society

  91. Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn 42(11):2492–2501

    Article  MATH  Google Scholar 

  92. Liu B, Pun CM (2018) Deep fusion network for splicing forgery localization. In proceedings of the European conference on computer vision (ECCV) workshops, pp. 0-0

  93. Liu Q, Sung AH (2009) A new approach for JPEG resize and image splicing detection. In: Proceedings of the First ACM workshop on Multimedia in forensics, pp. 43–48

  94. Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565

  95. Liu Q, Cao X, Deng C, Guo X (2011) Identifying image composites through shadow matte consistency. IEEE Trans Inf Forensics Secur 6(3):1111–1122

    Article  Google Scholar 

  96. Liu X, Liang J, Wang ZY, Tsai YT, Lin CC, Chen CC (2020) Content-based image copy detection using convolutional neural network. Electronics 9(12):2029

    Article  Google Scholar 

  97. Long Y, Huang Y (2006) Image based source camera identification using demosaicking. In: 2006 IEEE Workshop on Multimedia Signal Processing, pp. 419–424

  98. Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31–39

    Article  Google Scholar 

  99. Lourembam A, Kumar KMVM, Singh TR (2021) A robust image copy detection method using machine learning. Malaya J Mat:23–30

  100. Lu CS, Liao HY (2001) Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10(10):1579–1592

    Article  MATH  Google Scholar 

  101. Lu W, Wu M (2010) Multimedia forensic hash based on visual words. In: 2010 IEEE International Conference on Image Processing, pp. 989–992

  102. Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. In: Media Forensics and Security II. International Society for Optics and Photonics. Vol. 7541, p. 75410Y

  103. Lukáš J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed JPEG images. In: Proc. Digital forensic research workshop, pp. 5–8

  104. Luo. W, Huang. J, Qiu. G (2006) Robust detection of region-duplication forgery in digital image. In: 18th International Conference on Pattern Recognition, Vol. 4, pp. 746–749

  105. Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093

    Article  Google Scholar 

  106. Lv Y, Shen X, Chen H (2011) An improved image blind identification based on inconsistency in light source direction. J Supercomput 58(1):50–67

    Article  Google Scholar 

  107. Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265

    Article  Google Scholar 

  108. Mahdian B, Saic S (2008) Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensics Secur 3(3):529–538

    Article  Google Scholar 

  109. Mazaheri G, Mithun NC, Bappy JH, Roy-Chowdhury AK (2019). A skip connection architecture for localization of image manipulations. In CVPR Workshops, pp 119–129

  110. Mohammed TM, Bunk J, Nataraj L, Bappy JH, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK, Peterson LA (2018) Boosting image forgery detection using resampling features and copy-move analysis. Electronic Imaging 2018(7):118–111

    Google Scholar 

  111. Molina-Garcia J, Garcia-Salgado BP, Ponomaryov V, Reyes-Reyes R, Sadovnychiy S, Cruz-Ramos C (2020) An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process Image Commun 81:115725

  112. Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57

    Article  Google Scholar 

  113. Muzaffer G, Ulutas G (2019) A new deep learning-based method to detection of copy-move forgery in digital images. In: 2019 scientific meeting on Electrical-Electronics & Biomedical Engineering and computer science (EBBT), pp. 1-4

  114. Myna AN, Venkateshmurthy MG, Patil CG (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In: International Conference on Computational Intelligence and Multimedia Applications, Vol. 3, pp. 371–377.

  115. Ng TT (2009) Camera response function signature for digital forensics-part II: signature extraction. In: 2009 First IEEE International Workshop on Information Forensics and Security, pp. 161–165

  116. Ng TT, Chang SF (2004) A model for image splicing. In 2004 International Conference on Image Processing, Vol. 2, pp. 1169–1172

  117. Ng TT, Tsui MP (2009) Camera response function signature for digital forensics-part I: theory and data selection

  118. Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher order statistics. In: 2004 IEEE international symposium on circuits and systems, Cat. No. 04CH37512, Vol. 5, pp. V-V

  119. Ng TT, Chang SF, Hsu J, Xie L, Tsui MP (2005) Physics-motivated features for distinguishing photographic images and computer graphics. In: Proceedings of the 13th annual ACM international conference on Multimedia, pp. 239–248

  120. Nguyen TT, Nguyen CM, Nguyen DT, Nguyen DT, Nahavandi S (2019) Deep learning for deepfakes creation and detection: A survey. arXiv preprint arXiv:1909.11573

  121. O'Ruanaidh JJ, Pun T (1997) Rotation, scale and translation invariant digital image watermarking In: Proceedings of International Conference on Image Processing, Vol. 1, pp. 536–539

  122. Pal P, Jana B, Bhaumik J (2021) An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code. Wirel Pers Commun 121(1):939–961

    Article  Google Scholar 

  123. Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867

    Article  Google Scholar 

  124. Paquet AH, Ward RK (2002) Wavelet-based digital watermarking for image authentication. In IEEE CCECE2002Canadian Conference on Electrical and Computer Engineering, Conference Proceedings, Cat No 02CH37373, Vol. 2, pp. 879–884

  125. Pevny T, Fridrich J (2008) Detection of double-compression in JPEG images for applications in steganography. IEEE Trans Inf Forensics Secur 3(2):247–258

    Article  Google Scholar 

  126. Pickett JP (2000) The American heritage dictionary, 4th edn. Boston, Massachusetts, Houghton Mifflin Company

    Google Scholar 

  127. Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Computer Science Technical Report TR2004–515. 8-1-2004. https://digitalcommons.dartmouth.edu/cs_tr/254

  128. Popescu A. C, Farid H (2004) Statistical tools for digital forensics. In: International workshop on information hiding, pp. 128–147

  129. Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767

    Article  MathSciNet  MATH  Google Scholar 

  130. Prasad S, Ramakrishnan KR (2006) On resampling detection and its application to detect image tampering. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 1325–1328

  131. Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1):367–373

    Article  Google Scholar 

  132. Pun CM, Yan CP, Yuan XC (2018) Robust image hashing using progressive feature selection for tampering detection. Multimed Tools Appl 77(10):11609–11633

    Article  Google Scholar 

  133. Qu Z, Qiu G, Huang J (2009) Detect digital image splicing with visual cues. In: International workshop on information hiding, pp. 247–261

  134. Ranjbar S, Zargari F, Ghanbari M (2013) A highly robust two-stage contourlet-based digital image watermarking method. Signal Process Image Commun 28(10):1526–1536

    Article  Google Scholar 

  135. Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE international workshop on information forensics and security (WIFS) pp. 1-6

  136. Rao MP, Rajagopalan AN, Seetharaman G (2014) Harnessing motion blur to unveil splicing. IEEE Trans Inf Forensics Secur 9(4):583–595

    Article  Google Scholar 

  137. Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. In: 2007 IEEE International Conference on Image Processing. Vol. 6, pp. VI-117

  138. Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. In: IEEE International Conference on Image Processing, Vol. 6, pp. VI-117

  139. Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Applic 21(2):291–306

    Article  MathSciNet  Google Scholar 

  140. Sameer VU, Sugumaran S, Naskar R (2018) K-unknown models detection through clustering in blind source camera identification. IET Image Process 12(7):1204–1213

    Article  Google Scholar 

  141. Sameer VU, Dali I, Naskar R (2018) A deep learning based digital forensic solution to blind source identification of Facebook images. In: International Conference on Information Systems Security, pp. 291–303

  142. San Choi K, Lam EY, Wong KK (2006) Source camera identification using footprints from lens aberration. In: Digital Photography II, Vol. 6069, p. 60690J

  143. Sekeh MA, Maarof MA, Rohani MF, Motiei M (2011) Sequential straightforward clustering for local image block matching. World Acad Sci Eng Technol 50:774–778

    Google Scholar 

  144. Sekeh MA, Maarof MA, Rohani MF, Mahdian B (2013) Efficient image duplicated region detection model using sequential block clustering. Digit Investig 10(1):73–84

    Article  Google Scholar 

  145. Shao H, Yu T, Xu M, Cui W (2012) Image region duplication detection based on circular window expansion and phase correlation. Forensic Sci Int 222(1–3):71–82

    Article  Google Scholar 

  146. Shin J, Kim D, Ruland C (2014) Content based image authentication using HOG feature descriptor. In: IEEE International Conference on Image Processing. pp. 5292–5296

  147. Singh OP, Singh AK, Srivastava G, Kumar N (2021) Image watermarking using soft computing techniques: A comprehensive survey. Multimed Tools Appl 80(20):30367–30398

    Article  Google Scholar 

  148. Sumalatha L, Krishna VV, Babu AV (2012) Image content authentication based on wavelet edge features. Int J Comput Appl 49(23):24–29

    Google Scholar 

  149. Sutthiwan P, Shi YQ, Su W, Ng TT (2010) Rake transform and edge statistics for image forgery detection. In: 2010 IEEE International Conference on Multimedia and Expo, pp. 1463–1468

  150. Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491–2504

    Article  MathSciNet  MATH  Google Scholar 

  151. Tang S, Li JT, Zhang YD (2005) Compact and robust image hashing. In: International Conference on Computational Science and Its Application. Springer, Berlin, Heidelberg, pp. 547–556

  152. Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Select Topics Signal Process 14(5):910–932

    Article  Google Scholar 

  153. Vinolin V, Sucharitha M (2021) Hierarchical categorization and review of recent techniques on image forgery detection. Comput J 64(11):1692–1704

    Article  Google Scholar 

  154. Wang J, Li Y (2019) Splicing image and its localization: a survey. Journal of Information Hiding and Privacy Protection 1(2):77–86

  155. Wang W, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. In: 2009 16th IEEE international conference on image processing, IEEE, pp 1257–1260

  156. Wang X, Zheng N, Xue J, Liu Z (2012) A novel image signature method for content authentication. Comput J 55(6):686–701

    Article  Google Scholar 

  157. Wang X, Xue J, Zheng Z, Liu Z, Li N (2012) Image forensic signature for content authenticity analysis. J Vis Commun Image Represent 23(5):782–797

    Article  Google Scholar 

  158. Wang W, Dong J, Tan T (2014) Exploring DCT coefficient quantization effects for local tampering detection. IEEE Trans Inf Forensics Secur 9(10):1653–1666

    Article  Google Scholar 

  159. Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans Inf Forensics Secur 10(7):1336–1349

    Article  Google Scholar 

  160. Wang X, Wang H, Niu S, Zhang J (2019) Detection and localization of image forgeries using improved mask regional convolutional neural network. Math Biosci Eng 16(5):4581–4593

    Article  Google Scholar 

  161. Wang X, Zhou X, Zhang Q, Xu B, Xue J (2020) Image alignment based perceptual image hash for content authentication. Signal Process Image Commun 80:115642

    Article  Google Scholar 

  162. Weng L, Braeckman G, Dooms A, Preneel B, Schelkens P (2012) Robust image content authentication with tamper location. In: 2012 IEEE international conference on multimedia and expo, pp. 380–385

  163. Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, Vol. 3, pp. 219–222

  164. Wolfgang RB, Delp EJ III (1999) Fragile watermarking using the VW2D watermark. In: Security and Watermarking of Multimedia Contents, vol 3657, pp 204–213

    Chapter  Google Scholar 

  165. Wong PW (1998) A watermark for image integrity and ownership verification. In: PICS pp 374–379.

  166. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  MATH  Google Scholar 

  167. Wu X, Fang Z (2011) Image splicing detection using illuminantcolor inconsistency. In: 2011 Third International Conference on Multimedia Information Networking and Security, pp. 600–603

  168. Wu M, Liu B (1998) Watermarking for image authentication. In: Proceedings 1998 International Conference on Image Processing Cat No 98CB36269, Vol. 2, pp. 437–441

  169. Wu HC, Fan WL, Tsai CS, Ying JJC (2021) An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multimed Tools Appl 1-25

  170. Yan CP, Pun CM, Yuan XC (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans Inf Forensics Secur 11(12):2664–2677

    Article  Google Scholar 

  171. Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16

    Article  Google Scholar 

  172. Yeo BL, Yeung MM (1999) Watermarking 3D objects for verification. IEEE Comput Graph Appl 19(1):36–45

    Article  Google Scholar 

  173. Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of international conference on image processing. Vol. 2, pp. 680–683

  174. Yeung MM, Mintzer F (1997) f watermarking technique for image verification. In: Proceedings of international conference on image processing, Vol. 2, pp. 680–683

  175. Ying Q, Qian Z, Zhou H, Xu H, Zhang X, Li S (2021) From image to imuge: immunized image generation. In: Proceedings of the 29th ACM international conference on multimedia, pp. 3565-3573

  176. Zhang J, Feng Z, Su Y (2008) A new approach for detecting copy-move forgery in digital images. In: 2008 11th IEEE Singapore International Conference on Communication Systems, pp. 362–366

  177. Zhang Z, Kang J, Ren Y (2008) An effective algorithm of image splicing detection. In: 2008 international conference on computer science and software engineering, Vol. 1, pp. 1035–1039

  178. Zhang W, Cao X, Qu Y, Hou Y, Zhao H, Zhang C (2010) Detecting and extracting the photo composites using planar homography and graph cut. IEEE Trans Inf Forensics Secur 5(3):544–555

    Article  Google Scholar 

  179. Zhang H, Wang C, Zhou X (2017) Fragile watermarking based on LBP for blind tamper detection in images. J Inf Process Syst 13(2):385–399

    Google Scholar 

  180. Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):27

    Article  MathSciNet  MATH  Google Scholar 

  181. Zhao X, Bateman P, Ho ATS (2011) Image authentication using active watermarking and passive forensics techniques. In: Multimedia Analysis, Processing and Communications. Springer, Berlin, pp 139–183

    Chapter  Google Scholar 

  182. Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166

    Article  Google Scholar 

  183. Zhao Y, Wang S, Feng G, Tang Z (2010) A robust image hashing method based on Zernike moments. J Comput Inf Syst 6(3):717–725

    Google Scholar 

  184. Zhao X, Li J, Li S, Wang S (2010) Detecting digital image splicing in chroma spaces. In: International workshop on digital watermarking, pp. 12–22

  185. Zhao Y, Wang S, Zhang X, Yao H (2012) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63

    Article  Google Scholar 

Download references

Code availability

Not Availability.

Funding

Not Applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H R Chennamma.

Ethics declarations

Conflicts of interest/competing interests

Not Applicable.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chennamma, H.R., Madhushree, B. A comprehensive survey on image authentication for tamper detection with localization. Multimed Tools Appl 82, 1873–1904 (2023). https://doi.org/10.1007/s11042-022-13312-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13312-1

Keywords

Navigation