Abstract
The data that is stored or transmitted in digital form is susceptible to be attacked. Digital images are particularly vulnerable to unauthorized access and illicit alterations. As a result, image credibility verification approaches are constantly gaining popularity due to their importance in a variety of social concerns, including the government, military, forensics, and electronic commerce, among others. Even a minor attack could have disastrous consequences. Therefore, protecting images from tampering has become increasingly crucial. Many approaches have been developed in the literature to ensure the authenticity and integrity of digital images. These methodologies can be grouped into active and passive approaches for image authentication and tampering detection. Active image authentication has a general solution based on watermarking, signature and hybrid techniques. Passive authentication, on the other hand, relies on the image’s inherent natural characteristics to provide implicit authentication. Digital image forensic tools have been utilized for identifying the signs of digital tampering. We have found from the literature of the past three decades that image credibility verification approaches have achieved promising results. However, accurate image tamper localization remains an unsolved problem and a fairly difficult task too, if it is performed carefully with expertise. This motivated us to present a comprehensive review of image authentication techniques, which enables not only image tamper detection but also localize the manipulated region. We also discussed the future work.
Similar content being viewed by others
Data availability
Not Applicable.
References
Abbas SQ, Ahmed F, Živić N, Ur-Rehman O (2016) Perceptual image hashing using SVD based noise resistant local binary pattern. In: 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, pp. 401–407
Abdalla Y, Iqbal MT, Shehata M (2019) Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network. Information 10(9):286
Abdelhakim A, Saleh HI, Abdelhakim M (2019) Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering. Multimed Tools Appl 78(22):32523–32563
Abidin ABZ, Majid HBA, Samah ABA, Hashim HB (2019) Copy-move image forgery detection using deep learning methods: a review. In: 2019 6th international conference on research and innovation in information systems (ICRIIS), pp. 1–6
Adams J, Parulski K, Spaulding K (1998) Color processing in digital cameras. IEEE Micro 18(6):20–30
Ahmed F, Siyal MY (2007) A secure and robust wavelet-based hashing scheme for image authentication. In: International conference on multimedia modeling. Springer, Berlin, Heidelberg, pp. 51–62
Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90(5):1456–1470
Ahmed B, Gulliver TA, alZahir S (2020) Image splicing detection using mask-RCNN. Signal Image Video Process 14(5):1035–1042
Al-Azrak F. M. , Sedik A, Dessowky MI, El Banby GM, Khalaf AA, Elkorany AS, El-Samie FEA (2020) An efficient method for image forgery detection based on trigonometric transforms and deep learning. Multimed Tools Appl 79(25):18221–18243
Alkawaz MH, Sulong G, Saba T, Rehman A (2018) Detection of copy-move image forgery based on discrete cosine transform. Neural Comput Appl 30(1):183–192
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process Image Commun 28(6):659–669
Anbu T, Joe MM, Murugeswari G (2020) A comprehensive survey of detecting tampered images and localization of the tampered region. Multimedia Tools and Applications, pp. 1–39
Armas Vega EA, Sandoval Orozco AL, García Villalba LJ, Hernandez-Castro J (2018) Digital images authentication technique based on DWT, DCT and local binary patterns. Sensors 18(10):3372
Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci 49(3):281–307
Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU-Int J Electron Commun 79:207–218
Babu B, Pillai KA (2015) Robust hashing for image authentication using Zernike moments, gabor wavelets and histogram features. Int J Sci Technol Manag 04(01)
Barad ZJ, Goswami MM (2020) Image forgery detection using deep learning: A survey. In: 2020 6th international conference on advanced computing and communication systems (ICACCS), pp. 571–576.
Bashar M, Noda K, Ohnishi N, Mori K (2010) Exploring duplicated regions in natural images. IEEE Trans Image Process:1–40
Battiato S, Farinella GM, Messina E, Puglisi G (2012) Robust image alignment for tampering detection. IEEE Trans Inf Forensics Secur 7(4):1105–1117
Battiato S, Farinella G. M, Messina E, Puglisi G (201) Understanding geometric manipulations of images through BOVW-based hashing. In: IEEE International Conference on Multimedia and Expo, pp. 1–6.
Bayram S, Sencar H, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: IEEE International Conference on Image Processing, Vol. 3, pp. III-69
Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans Inf Forensics Secur 7(3):1003–1017
Bilal M, Habib HA, Mehmood Z, Saba T, Rashid M (2020) Single and multiple copy–move forgery detection and localization in digital images based on the sparsely encoded distinctive features and DBSCAN clustering. Arab J Sci Eng 45(4):2975–2992
Bolourian Haghighi B, Taherinia AH, Monsefi R (2020) An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network. Cognit Comput 12(4):863–890
Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning. In: 2017 IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp. 1881-1889
Byun SW, Son HS, Lee SP (2019) Fast and robust watermarking method based on DCT specific location. IEEE Access 7:100706–100718
Cao Y, Gao T, Fan L, Yang Q (2012) A robust detection algorithm for copy-move forgery in digital images. Forensic Sci Int 214(1–3):33–43
Celik M. U, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Transaction Image Processing 11(6):585–595
Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15(4):1042–1049
Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446
Chen YL, Hsu CT (2011) Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inf Forensics Secur 6(2):396–406
Chen T, Wang J, Zhou Y (2001) Combined digital signature and digital watermark scheme for image authentication. In: International Conferences on Info-Tech and Info-NetProceedings, Cat No 01EX479, Vol. 5, pp. 78–82
Chen W, Shi YQ, Su W (2007) Image splicing detection using 2D phase congruency and statistical moments of characteristic function. In: Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505, p. 65050R.
Chen H, Shen X, Lv Y (2010) Blind identification method for authenticity of infinite light source images. In: 2010 Fifth International Conference on Frontier of Computer Science and Technology. pp. 131–135
Chennamma HR, Rangarajan L (2011) Image splicing detection using inherent lens radial distortion. Int J Comput Sci Issues 7(6) 2010:149–158 ISSN.arXiv preprint arXiv:1105.4712
Cheung YM, Wu HT (2007) A sequential quantization strategy for data embedding and integrity verification. IEEE Trans Circuits Syst Video Technol 17(8):1007–1016
Ciptasari RW, Rhee KH, Sakurai K (2013) Exploiting reference images for image splicing verification. Digit Investig 10(3):246–258
Dadkhah S, Abd Manaf A, Sadeghi S (2014) Efficient image authentication and tamper localization algorithm using active watermarking. In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp 115–148
Davarzani R, Mozaffari S, Yaghmaie.K. (2015) Image authentication using LBP-based perceptual image hashing. Journal of AI and Data Mining 3(1):21–30
De Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inf Forensics Secur 8(7):1182–1194
Ding W, Xie Y, Wang Y (2019) Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value. Multimed Tools Appl 78(5):5305–5328
Dirik AE, Sencar HT, Memon N (2007) Source camera identification based on sensor dust characteristics. In: 2007 IEEE Workshop on Signal Processing Applications for Public Security and Forensics, pp. 1–6
Doegar A, Dutta M, Kumar G (2020) Image forgery detection using Google net and random Forest machine learning algorithm. J Univ Shanghai Sci Technol:1271–1278
Fan W, Wang K, Cayre F, Xiong Z (2012) 3D lighting-based image forgery detection using shape-from-shading. In: 2012 Proceedings of the 20th European Signal Processing Conference, pp. 1777–1781
Fang Z, Wang S, Zhang X (2010) Image splicing detection using color edge inconsistency. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 923–926
Farid H (2006) Digital image ballistics from JPEG quantization. Computer Science Technical Report TR2006–583. https://digitalcommons. (2006). dartmouth.edu/cs_tr/291
Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16–25
Farinella GM, Giuffrida MV, Digiacomo V, Battiato S (2015) On blind source camera identification. In: International Conference on Advanced Concepts for Intelligent Vision Systems, pp. 464–473
Fridrich J (1998) Image watermarking for tamper detection. In: Proceedings 1998 International Conference on Image Processing, Cat. No. 98CB36269, Vol. 2, pp. 404–408
Fridrich J (1999) Robust bit extraction from images. In: Proceedings IEEE International Conference on Multimedia Computing and Systems Vol. 2, pp. 536–540
Fridrich AJ, Soukal BD, Lukáš AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of Digital Forensic Research Workshop
Fu D, Shi YQ, Su W (2006) Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In: International workshop on digital watermarking, pp. 177–187
Fu D, Shi YQ, Su W (2007) A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505, p. 65051L
Ghorbani M, Firouzmand M, Faraahi A (2011) DWT-DCT (QCD) based copy-move image forgery detection. In: 2011 18th International Conference on Systems, Signals and Image Processing, IEEE, pp 1–4
Gill NK, Garg R, Doegar EA (2017) A review paper on digital image forgery detection techniques. In: 2017 8th international conference on computing, communication and networking technologies (ICCCNT), pp. 1–7
Gong D, Goh OS, Kumar YJ, Ye Z, Chi W (2020) Deepfake forensics, an ai-synthesized detection with deep convolutional generative adversarial networks. Int J 9(3):2861–2870
Gopi ES, Lakshmanan N, Gokul T, Kumara Ganesh S (2006) Digital image forgery detection using artificial neural network and auto regressive coefficients. In: 2006 Canadian Conference on Electrical and Computer Engineering, pp. 194–197
Guo XC, Hatzinakos D (2007) Content based image hashing via wavelet and radon transform. In: Pacific-rim conference on multimedia. Springer, Berlin, Heidelberg, pp. 755–764
Guorui F, Jian W (2020) Image forgery detection based on the convolutional neural network. In: proceedings of the 2020 12th international conference on machine learning and computing, pp. 266–270
Gupta M, Kishore RR (2021) A survey of watermarking technique using deep neural network architecture. In: 2021 international conference on computing, communication, and intelligent systems (ICCCIS), pp. 630–635
He Z, Sun W, Lu W, Lu H (2011) Digital image splicing detection based on approximate run length. Pattern Recogn Lett 32(12):1591–1597
He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn 45(12):4292–4299
Hosseini S, Mahdavi M (2021) Image content dependent semi-fragile watermarking with localized tamper detection. arXiv preprint arXiv:2106.14150
Huang H, Guo W, Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm. In: 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE, Vol 2, pp 272–276
Huang Y, Lu W, Sun W, Long D (2011) Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int 206(1–3):178–184
Islam MM, Karmakar G, Kamruzzaman J, Murshed M, Kahandawa G, Parvin N (2018) Detecting splicing and copy-move attacks in color images. In: 2018 Digital Image Computing: Techniques and Applications. pp. 1–7
Johnson MK, Farid H (2005) Exposing digital forgeries by detecting inconsistencies in lighting. In: Proceedings of the 7th workshop on Multimedia and security, pp 1–10
Johnson MK, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur 2(3):450–461
Johnson MK, Farid H (2007) Exposing digital forgeries through specular highlights on the eye. In: International Workshop on Information Hiding, pp. 311–325
Johnson MK, Farid H (2007) Detecting photographic composites of people. In: International Workshop on Digital Watermarking, pp. 19–33
Kakar P, Sudha N (2012) Exposing postprocessed copy–paste forgeries through transform-invariant features. IEEE Trans Inf Forensics Secur 7(3):1018–1028
Kamili A, Hurrah NN, Parah SA, Bhat GM, Muhammad K (2020) DWFCAT: dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans Ind Inf 17(7):5108–5117
Kang X, Wei S (2008) Identifying tampered regions using singular value decomposition in digital image forensics. In: 2008 International conference on computer science and software engineering, IEEE, Vol 3, pp 926–930
Kee E, Farid H (2010) Exposing digital forgeries from 3-D lighting environments. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1–6
Kharrazi M, Sencar HT, Memon N (2004) Blind source camera identification. In: 2004 International Conference on Image Processing, Vol. 1, pp. 709–712
Kharrazi M, Sencar H, Memon N (2005) Blind source camera identification. In: IEEE International Conference on Image Processing, pp. 69–72
Kim C, Yang CN (2021) Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches. Appl Sci 11(3):1146
Kirchner M (2008) Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: Proceedings of the 10th ACM workshop on Multimedia and security, pp. 11–20
Kundur D, Hatzinakos D (1998) Towards a telltale watermarking technique for tamper-proofing. In: Proceedings 1998 International Conference on Image Processing, Cat No 98CB36269, Vol. 2, pp. 409–413
Langille A, Gong M (2006) An efficient match-based duplication detection algorithm. In: The 3rd Canadian Conference on Computer and Robot Vision, CRV'06, pp. 64–64
Laouamer L, AlShaikh M, Nana L, Pascu AC (2015) Robust watermarking scheme and tamper detection based on threshold versus intensity. J Innov Digital Ecosyst 2(1–2):1–12
Li H, Huang J (2019) Localization of deep inpainting using high-pass fully convolutional network. In proceedings of the IEEE/CVF international conference on computer vision, pp. 8301–8310
Li G, Wu Q, Tu D, Sun S (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In: 2007 IEEE international conference on multimedia and expo, pp. 1750–1753
Li B, Shi YQ, Huang J (2008) Detecting doubly compressed JPEG images by using mode based first digit features. In: 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735
Li X, Jing T, Li X (2010) Image splicing detection based on moment features and Hilbert-Huang Transform. In: 2010 IEEE international conference on information theory and information security, pp. 1127–1130
Lin CY, Chang SF (2000) Semi-fragile watermarking for authenticating JPEG visual content. In Security and Watermarking of Multimedia Contents II, International Society for Optics and Photonics, Vol. 3971, pp. 140–151
Lin SD, Wu T (2011) An integrated technique for splicing and copy-move forgery image detection. In: 2011 4th International Congress on Image and Signal Processing, Vol. 2, pp. 1086–1090
Lin HY, Liao HY, Lu CS, Lin JC (2005) Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans Multimed 7(6):997–1006
Lin HJ, Wang CW, Kao YT (2009) Fast copy-move forgery detection. WSEAS Trans Signal Process 5(5):188–197
Lin HJ, Wang CW, Kao YT, Chen S (2009) An efficient method for copy-move forgery detection. In WSEAS international conference. Proceedings. Mathematics and computers in science and engineering (No. 8). World Scientific and Engineering Academy and Society
Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recogn 42(11):2492–2501
Liu B, Pun CM (2018) Deep fusion network for splicing forgery localization. In proceedings of the European conference on computer vision (ECCV) workshops, pp. 0-0
Liu Q, Sung AH (2009) A new approach for JPEG resize and image splicing detection. In: Proceedings of the First ACM workshop on Multimedia in forensics, pp. 43–48
Liu G, Wang J, Lian S, Wang Z (2011) A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl 34(5):1557–1565
Liu Q, Cao X, Deng C, Guo X (2011) Identifying image composites through shadow matte consistency. IEEE Trans Inf Forensics Secur 6(3):1111–1122
Liu X, Liang J, Wang ZY, Tsai YT, Lin CC, Chen CC (2020) Content-based image copy detection using convolutional neural network. Electronics 9(12):2029
Long Y, Huang Y (2006) Image based source camera identification using demosaicking. In: 2006 IEEE Workshop on Multimedia Signal Processing, pp. 419–424
Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31–39
Lourembam A, Kumar KMVM, Singh TR (2021) A robust image copy detection method using machine learning. Malaya J Mat:23–30
Lu CS, Liao HY (2001) Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10(10):1579–1592
Lu W, Wu M (2010) Multimedia forensic hash based on visual words. In: 2010 IEEE International Conference on Image Processing, pp. 989–992
Lu W, Varna AL, Wu M (2010) Forensic hash for multimedia information. In: Media Forensics and Security II. International Society for Optics and Photonics. Vol. 7541, p. 75410Y
Lukáš J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed JPEG images. In: Proc. Digital forensic research workshop, pp. 5–8
Luo. W, Huang. J, Qiu. G (2006) Robust detection of region-duplication forgery in digital image. In: 18th International Conference on Pattern Recognition, Vol. 4, pp. 746–749
Lv X, Wang ZJ (2012) Perceptual image hashing based on shape contexts and local feature points. IEEE Trans Inf Forensics Secur 7(3):1081–1093
Lv Y, Shen X, Chen H (2011) An improved image blind identification based on inconsistency in light source direction. J Supercomput 58(1):50–67
Lynch G, Shih FY, Liao HYM (2013) An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci 239:253–265
Mahdian B, Saic S (2008) Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensics Secur 3(3):529–538
Mazaheri G, Mithun NC, Bappy JH, Roy-Chowdhury AK (2019). A skip connection architecture for localization of image manipulations. In CVPR Workshops, pp 119–129
Mohammed TM, Bunk J, Nataraj L, Bappy JH, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK, Peterson LA (2018) Boosting image forgery detection using resampling features and copy-move analysis. Electronic Imaging 2018(7):118–111
Molina-Garcia J, Garcia-Salgado BP, Ponomaryov V, Reyes-Reyes R, Sadovnychiy S, Cruz-Ramos C (2020) An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process Image Commun 81:115725
Muhammad G, Hussain M, Bebis G (2012) Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit Investig 9(1):49–57
Muzaffer G, Ulutas G (2019) A new deep learning-based method to detection of copy-move forgery in digital images. In: 2019 scientific meeting on Electrical-Electronics & Biomedical Engineering and computer science (EBBT), pp. 1-4
Myna AN, Venkateshmurthy MG, Patil CG (2007) Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In: International Conference on Computational Intelligence and Multimedia Applications, Vol. 3, pp. 371–377.
Ng TT (2009) Camera response function signature for digital forensics-part II: signature extraction. In: 2009 First IEEE International Workshop on Information Forensics and Security, pp. 161–165
Ng TT, Chang SF (2004) A model for image splicing. In 2004 International Conference on Image Processing, Vol. 2, pp. 1169–1172
Ng TT, Tsui MP (2009) Camera response function signature for digital forensics-part I: theory and data selection
Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher order statistics. In: 2004 IEEE international symposium on circuits and systems, Cat. No. 04CH37512, Vol. 5, pp. V-V
Ng TT, Chang SF, Hsu J, Xie L, Tsui MP (2005) Physics-motivated features for distinguishing photographic images and computer graphics. In: Proceedings of the 13th annual ACM international conference on Multimedia, pp. 239–248
Nguyen TT, Nguyen CM, Nguyen DT, Nguyen DT, Nahavandi S (2019) Deep learning for deepfakes creation and detection: A survey. arXiv preprint arXiv:1909.11573
O'Ruanaidh JJ, Pun T (1997) Rotation, scale and translation invariant digital image watermarking In: Proceedings of International Conference on Image Processing, Vol. 1, pp. 536–539
Pal P, Jana B, Bhaumik J (2021) An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code. Wirel Pers Commun 121(1):939–961
Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867
Paquet AH, Ward RK (2002) Wavelet-based digital watermarking for image authentication. In IEEE CCECE2002Canadian Conference on Electrical and Computer Engineering, Conference Proceedings, Cat No 02CH37373, Vol. 2, pp. 879–884
Pevny T, Fridrich J (2008) Detection of double-compression in JPEG images for applications in steganography. IEEE Trans Inf Forensics Secur 3(2):247–258
Pickett JP (2000) The American heritage dictionary, 4th edn. Boston, Massachusetts, Houghton Mifflin Company
Popescu AC, Farid H (2004) Exposing digital forgeries by detecting duplicated image regions. Computer Science Technical Report TR2004–515. 8-1-2004. https://digitalcommons.dartmouth.edu/cs_tr/254
Popescu A. C, Farid H (2004) Statistical tools for digital forensics. In: International workshop on information hiding, pp. 128–147
Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767
Prasad S, Ramakrishnan KR (2006) On resampling detection and its application to detect image tampering. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 1325–1328
Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46(1):367–373
Pun CM, Yan CP, Yuan XC (2018) Robust image hashing using progressive feature selection for tampering detection. Multimed Tools Appl 77(10):11609–11633
Qu Z, Qiu G, Huang J (2009) Detect digital image splicing with visual cues. In: International workshop on information hiding, pp. 247–261
Ranjbar S, Zargari F, Ghanbari M (2013) A highly robust two-stage contourlet-based digital image watermarking method. Signal Process Image Commun 28(10):1526–1536
Rao Y, Ni J (2016) A deep learning approach to detection of splicing and copy-move forgeries in images. In: 2016 IEEE international workshop on information forensics and security (WIFS) pp. 1-6
Rao MP, Rajagopalan AN, Seetharaman G (2014) Harnessing motion blur to unveil splicing. IEEE Trans Inf Forensics Secur 9(4):583–595
Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. In: 2007 IEEE International Conference on Image Processing. Vol. 6, pp. VI-117
Roy S, Sun Q (2007) Robust hash for detecting and localizing image tampering. In: IEEE International Conference on Image Processing, Vol. 6, pp. VI-117
Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Applic 21(2):291–306
Sameer VU, Sugumaran S, Naskar R (2018) K-unknown models detection through clustering in blind source camera identification. IET Image Process 12(7):1204–1213
Sameer VU, Dali I, Naskar R (2018) A deep learning based digital forensic solution to blind source identification of Facebook images. In: International Conference on Information Systems Security, pp. 291–303
San Choi K, Lam EY, Wong KK (2006) Source camera identification using footprints from lens aberration. In: Digital Photography II, Vol. 6069, p. 60690J
Sekeh MA, Maarof MA, Rohani MF, Motiei M (2011) Sequential straightforward clustering for local image block matching. World Acad Sci Eng Technol 50:774–778
Sekeh MA, Maarof MA, Rohani MF, Mahdian B (2013) Efficient image duplicated region detection model using sequential block clustering. Digit Investig 10(1):73–84
Shao H, Yu T, Xu M, Cui W (2012) Image region duplication detection based on circular window expansion and phase correlation. Forensic Sci Int 222(1–3):71–82
Shin J, Kim D, Ruland C (2014) Content based image authentication using HOG feature descriptor. In: IEEE International Conference on Image Processing. pp. 5292–5296
Singh OP, Singh AK, Srivastava G, Kumar N (2021) Image watermarking using soft computing techniques: A comprehensive survey. Multimed Tools Appl 80(20):30367–30398
Sumalatha L, Krishna VV, Babu AV (2012) Image content authentication based on wavelet edge features. Int J Comput Appl 49(23):24–29
Sutthiwan P, Shi YQ, Su W, Ng TT (2010) Rake transform and edge statistics for image forgery detection. In: 2010 IEEE International Conference on Multimedia and Expo, pp. 1463–1468
Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491–2504
Tang S, Li JT, Zhang YD (2005) Compact and robust image hashing. In: International Conference on Computational Science and Its Application. Springer, Berlin, Heidelberg, pp. 547–556
Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Select Topics Signal Process 14(5):910–932
Vinolin V, Sucharitha M (2021) Hierarchical categorization and review of recent techniques on image forgery detection. Comput J 64(11):1692–1704
Wang J, Li Y (2019) Splicing image and its localization: a survey. Journal of Information Hiding and Privacy Protection 1(2):77–86
Wang W, Dong J, Tan T (2009) Effective image splicing detection based on image chroma. In: 2009 16th IEEE international conference on image processing, IEEE, pp 1257–1260
Wang X, Zheng N, Xue J, Liu Z (2012) A novel image signature method for content authentication. Comput J 55(6):686–701
Wang X, Xue J, Zheng Z, Liu Z, Li N (2012) Image forensic signature for content authenticity analysis. J Vis Commun Image Represent 23(5):782–797
Wang W, Dong J, Tan T (2014) Exploring DCT coefficient quantization effects for local tampering detection. IEEE Trans Inf Forensics Secur 9(10):1653–1666
Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE Trans Inf Forensics Secur 10(7):1336–1349
Wang X, Wang H, Niu S, Zhang J (2019) Detection and localization of image forgeries using improved mask regional convolutional neural network. Math Biosci Eng 16(5):4581–4593
Wang X, Zhou X, Zhang Q, Xu B, Xue J (2020) Image alignment based perceptual image hash for content authentication. Signal Process Image Commun 80:115642
Weng L, Braeckman G, Dooms A, Preneel B, Schelkens P (2012) Robust image content authentication with tamper location. In: 2012 IEEE international conference on multimedia and expo, pp. 380–385
Wolfgang RB, Delp EJ (1996) A watermark for digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, Vol. 3, pp. 219–222
Wolfgang RB, Delp EJ III (1999) Fragile watermarking using the VW2D watermark. In: Security and Watermarking of Multimedia Contents, vol 3657, pp 204–213
Wong PW (1998) A watermark for image integrity and ownership verification. In: PICS pp 374–379.
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601
Wu X, Fang Z (2011) Image splicing detection using illuminantcolor inconsistency. In: 2011 Third International Conference on Multimedia Information Networking and Security, pp. 600–603
Wu M, Liu B (1998) Watermarking for image authentication. In: Proceedings 1998 International Conference on Image Processing Cat No 98CB36269, Vol. 2, pp. 437–441
Wu HC, Fan WL, Tsai CS, Ying JJC (2021) An image authentication and recovery system based on discrete wavelet transform and convolutional neural networks. Multimed Tools Appl 1-25
Yan CP, Pun CM, Yuan XC (2016) Quaternion-based image hashing for adaptive tampering localization. IEEE Trans Inf Forensics Secur 11(12):2664–2677
Yan CP, Pun CM, Yuan XC (2016) Multi-scale image hashing using adaptive local feature extraction for robust tampering detection. Signal Process 121:1–16
Yeo BL, Yeung MM (1999) Watermarking 3D objects for verification. IEEE Comput Graph Appl 19(1):36–45
Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of international conference on image processing. Vol. 2, pp. 680–683
Yeung MM, Mintzer F (1997) f watermarking technique for image verification. In: Proceedings of international conference on image processing, Vol. 2, pp. 680–683
Ying Q, Qian Z, Zhou H, Xu H, Zhang X, Li S (2021) From image to imuge: immunized image generation. In: Proceedings of the 29th ACM international conference on multimedia, pp. 3565-3573
Zhang J, Feng Z, Su Y (2008) A new approach for detecting copy-move forgery in digital images. In: 2008 11th IEEE Singapore International Conference on Communication Systems, pp. 362–366
Zhang Z, Kang J, Ren Y (2008) An effective algorithm of image splicing detection. In: 2008 international conference on computer science and software engineering, Vol. 1, pp. 1035–1039
Zhang W, Cao X, Qu Y, Hou Y, Zhao H, Zhang C (2010) Detecting and extracting the photo composites using planar homography and graph cut. IEEE Trans Inf Forensics Secur 5(3):544–555
Zhang H, Wang C, Zhou X (2017) Fragile watermarking based on LBP for blind tamper detection in images. J Inf Process Syst 13(2):385–399
Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):27
Zhao X, Bateman P, Ho ATS (2011) Image authentication using active watermarking and passive forensics techniques. In: Multimedia Analysis, Processing and Communications. Springer, Berlin, pp 139–183
Zhao J, Guo J (2013) Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int 233(1–3):158–166
Zhao Y, Wang S, Feng G, Tang Z (2010) A robust image hashing method based on Zernike moments. J Comput Inf Syst 6(3):717–725
Zhao X, Li J, Li S, Wang S (2010) Detecting digital image splicing in chroma spaces. In: International workshop on digital watermarking, pp. 12–22
Zhao Y, Wang S, Zhang X, Yao H (2012) Robust hashing for image authentication using Zernike moments and local features. IEEE Trans Inf Forensics Secur 8(1):55–63
Code availability
Not Availability.
Funding
Not Applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest/competing interests
Not Applicable.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chennamma, H.R., Madhushree, B. A comprehensive survey on image authentication for tamper detection with localization. Multimed Tools Appl 82, 1873–1904 (2023). https://doi.org/10.1007/s11042-022-13312-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13312-1