Skip to main content
Log in

Image forgery detection: comprehensive review of digital forensics approaches

  • Survey Article
  • Published:
Journal of Computational Social Science Aims and scope Submit manuscript

Abstract

Image is a powerful way to share information in the digital world. The sources of images are everywhere, magazines, newspapers, healthcare, entertainment, education, social media and electronic media. With the advancement of image editing software and cheap camera-enabled mobile devices, image manipulation is very easy without any prior knowledge or expertise. So, image authenticity has questioned. Some people use the forged image for fun, but some people may have bad intentions. The manipulated image may use by political parties to spread their false propaganda. Fake images use by people to spread rumours and stoking someone. In addition to harming individuals, fake images can damage the credibility of media outlets and undermine the public trust in them. The need for reliable and efficient image forgery detection methods to combat misinformation, propaganda, hoaxes, and other malicious uses of manipulated images. These are some known issues on digital images. The researcher, scientist, and image forensic experts are working on the development of fake image detection and identification tools. Presently digital image forgery detection is a trending field of research. The main aim of this paper is to provide the exhaustive review on digital image forgery detection tools and techniques. It also discusses various machine learning techniques, such as supervised, unsupervised, and deep learning approaches, that can be employed for image forgery detection it demonstrate the challenges of the current state of the work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

There is no data associated in the manuscript.

Notes

  1. https://clippingthephotos.com/history-of-photo-manipulation/.

  2. https://en.wikipedia.org/wiki/File:Woman_1.jpg.

  3. https://en.wikipedia.org/wiki/File:GAN_deepfake_white_girl.jpg.

  4. https://ourcodeworld.com/articles/read/984/how-to-swap-the-faces-between-two-pictures-using-faceswap-with-python-3-in-ubuntu-18-04.

  5. https://media.springernature.com/lw685/springer-static/image/chp%3A10.1007%2F978-981-15-7533-4_25/MediaObjects/495117_1_En_25_Fig1_HTML.jpg.

References

  1. Qureshi, M. A., & Deriche, M. (2015). A bibliography of pixel-based blind image forgery detection techniques. Signal Processing: Image Communication, 39, 46–74.

    Google Scholar 

  2. Al-Qershi, O. M., & Khoo, B. E. (2013). Passive detection of copy-move forgery in digital images: State-of-the-art. Forensic Science International, 231(1–3), 284–295.

    Article  Google Scholar 

  3. Farid, H. (2009). Seeing is not believing. IEEE Spectrum, 46(8), 44–51.

    Article  Google Scholar 

  4. Yang, P., Baracchi, D., Ni, R., Zhao, Y., Argenti, F., & Piva, A. (2020). A survey of deep learning-based source image forensics. Journal of Imaging, 6(3), 9.

    Article  Google Scholar 

  5. Farid, H. (2009). Image forgery detection. IEEE Signal Processing Magazine, 26(2), 16–25.

    Article  Google Scholar 

  6. Popescu, A. C., & Farid, H. (2004, May). Statistical tools for digital forensics. In International workshop on information hiding (pp. 128–147). Springer.

  7. Mahmood, T., Mehmood, Z., Shah, M., & Saba, T. (2018). A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. Journal of Visual Communication and Image Representation, 53, 202–214.

    Article  Google Scholar 

  8. Farid, H. (2008). Digital image forensics. Scientific American, 298(6), 66–71.

    Article  Google Scholar 

  9. Rocha, A., Scheirer, W., Boult, T., & Goldenstein, S. (2011). Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Computing Surveys (CSUR), 43(4), 1–42.

    Article  Google Scholar 

  10. Wang, C., Zhang, Z., Li, Q., & Zhou, X. (2019). An image copy-move forgery detection method based on SURF and PCET. IEEE Access, 7, 170032–170047.

    Article  Google Scholar 

  11. Huang, Y., Lu, W., Sun, W., & Long, D. (2011). Improved DCT-based detection of copy-move forgery in images. Forensic Science International, 206(1–3), 178–184.

    Article  Google Scholar 

  12. Muhammad, G., Hussain, M., & Bebis, G. (2012). Passive copy-move image forgery detection using undecimated dyadic wavelet transform. Digital Investigation, 9(1), 49–57.

    Article  Google Scholar 

  13. Popescu, A. C., & Farid, H. (2005). Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53(10), 3948–3959.

    Article  Google Scholar 

  14. Pavlović, A., Glišović, N., Gavrovska, A., & Reljin, I. (2019). Copy-move forgery detection based on multifractals. Multimedia Tools and Applications, 78(15), 20655–20678.

    Article  Google Scholar 

  15. Dehnie, S., Sencar, T., & Memon, N. (2006, October). Digital image forensics for identifying computer generated and digital camera images. In 2006 international conference on image processing (pp. 2313–2316). IEEE.

  16. Gou, H., Swaminathan, A., & Wu, M. (2007, September). Noise features for image tampering detection and steganalysis. In 2007 IEEE international conference on image processing (Vol. 6, pp. VI-97). IEEE.

  17. Luo, W., Huang, J., & Qiu, G. (2010). JPEG error analysis and its applications to digital image forensics. IEEE Transactions on Information Forensics and Security, 5(3), 480–491.

    Article  Google Scholar 

  18. Stamm, M. C., & Liu, K. R. (2011). Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 6(3), 1050–1065.

    Article  Google Scholar 

  19. Verdoliva, L., Cozzolino, D., & Poggi, G. (2014, December). A feature-based approach for image tampering detection and localization. In 2014 IEEE international workshop on information forensics and security (WIFS) (pp. 149–154). IEEE.

  20. Liu, B., & Pun, C. M. (2020). Exposing splicing forgery in realistic scenes using deep fusion network. Information Sciences, 526, 133–150.

    Article  Google Scholar 

  21. Al-Azrak, F. M., Sedik, A., Dessowky, M. I., El Banby, G. M., Khalaf, A. A., & Elkorany, A. S. (2020). An efficient method for image forgery detection based on trigonometric transforms and deep learning. Multimedia Tools and Applications, 79(25), 18221–18243.

    Article  Google Scholar 

  22. Lynch, G., Shih, F. Y., & Liao, H. Y. M. (2013). An efficient expanding block algorithm for image copy-move forgery detection. Information Sciences, 239, 253–265.

    Article  Google Scholar 

  23. Kafali, E., Vretos, N., Semertzidis, T., & Daras, P. (2021, January). RobusterNet: Improving copy-move forgery detection with Volterra-based convolutions. In 2020 25th international conference on pattern recognition (ICPR) (pp. 1160–1165). IEEE.

  24. Li, G., Wu, Q., Tu, D., & Sun, S. (2007, July). A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In 2007 IEEE international conference on multimedia and expo (pp. 1750–1753). IEEE.

  25. Yang, J., Liang, Z., Gan, Y., & Zhong, J. (2021). A novel copy-move forgery detection algorithm via two-stage filtering. Digital Signal Processing, 113, 103032.

    Article  Google Scholar 

  26. Lukáš, J., Fridrich, J., & Goljan, M. (2006, February). Detecting digital image forgeries using sensor pattern noise. In Security, steganography, and watermarking of multimedia contents VIII (Vol. 6072, pp. 362–372). SPIE.

  27. Do, N. T., Na, I. S., & Kim, S. H. (2018). Forensics face detection from GANs using convolutional neural network. ISITC, 2018, 376–379.

    Google Scholar 

  28. Dang, L. M., Hassan, S. I., Im, S., & Moon, H. (2019). Face image manipulation detection based on a convolutional neural network. Expert Systems with Applications, 129, 156–168.

    Article  Google Scholar 

  29. Rao, Y., Ni, J., & Xie, H. (2021). Multi-semantic CRF-based attention model for image forgery detection and localization. Signal Processing, 183, 108051.

    Article  Google Scholar 

  30. Hussain, M., Muhammad, G., Saleh, S. Q., Mirza, A. M., & Bebis, G. (2013, July). Image forgery detection using multi-resolution Weber local descriptors. In Eurocon 2013 (pp. 1570–1577). IEEE.

  31. Al-Zahir, S., & Hammad, R. (2020). Image forgery detection using image similarity. Multimedia Tools and Applications, 79(39), 28643–28659.

    Article  Google Scholar 

  32. Vijayalakshmi, K. N. V. S. K., Sasikala, J., & Shanmuganathan, C. (2024). Copy-paste forgery detection using deep learning with error level analysis. Multimedia Tools and Applications, 83(2), 3425–3449.

    Article  Google Scholar 

  33. Arivazhagan, S., Russel, N. S., & Saranyaa, M. (2024). CNN-based approach for robust detection of copy-move forgery in images. Inteligencia Artificial, 27(73), 80–91.

    Article  Google Scholar 

  34. Ferreira, W. D., Ferreira, C. B., da Cruz Júnior, G., & Soares, F. (2020). A review of digital image forensics. Computers and Electrical Engineering, 85, 106685.

    Article  Google Scholar 

  35. Khalaf, R. S., & Varol, A. (2019, June). Digital forensics: Focusing on image forensics. In 2019 7th international symposium on digital forensics and security (ISDFS) (pp. 1–5). IEEE.

  36. Zheng, J., Liu, Y., Ren, J., Zhu, T., Yan, Y., & Yang, H. (2016). Fusion of block and key points-based approaches for effective copy-move image forgery detection. Multidimensional Systems and Signal Processing, 27(4), 989–1005.

    Article  Google Scholar 

  37. Tariq, S., Lee, S., Kim, H., Shin, Y., & Woo, S. S. (2018, January). Detecting both machine and human created fake face images in the wild. In Proceedings of the 2nd international workshop on multimedia privacy and security (pp. 81–87).

  38. Gui, J., Sun, Z., Wen, Y., Tao, D., & Ye, J. (2021). A review on generative adversarial networks: Algorithms, theory, and applications. IEEE Transactions on Knowledge and Data Engineering, 2021, 1.

    Google Scholar 

  39. Tang, G., Sun, L., Mao, X., Guo, S., Zhang, H., & Wang, X. (2021). Detection of GAN-synthesized image based on discrete wavelet transform. Security and Communication Networks, 2021, 1.

    Google Scholar 

  40. Liao, Q., Li, Y., Wang, X., Kong, B., Zhu, B., Lyu, S., & Wu, X. (2021, September). Imperceptible adversarial examples for fake image detection. In 2021 IEEE international conference on image processing (ICIP) (pp. 3912–3916). IEEE.

  41. Guarnera, L., Giudice, O., Nastasi, C., & Battiato, S. (2020, September). Preliminary forensics analysis of deepfake images. In 2020 AEIT international annual conference (AEIT) (pp. 1–6). IEEE.

  42. Wolter, M., Blanke, F., Hoyt, C. T., & Garcke, J. (2021). Wavelet-packet powered deepfake image detection.

  43. Kiruthika, S., & Masilamani, V. (2023). Image quality assessment based fake face detection. Multimedia Tools and Applications, 82, 8691–8708.

    Article  Google Scholar 

  44. Guarnera, L., Giudice, O., & Battiato, S. (2020). Deepfake detection by analyzing convolutional traces. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops (pp. 666–667).

  45. Zhang, Y., Zheng, L., & Thing, V. L. (2017, August). Automated face swapping and its detection. In 2017 IEEE 2nd international conference on signal and image processing (ICSIP) (pp. 15–19). IEEE.

  46. Volkova, S. S., & Bogdanov, A. S. (2021). A deep learning approach to face swap detection. International Journal of Open Information Technologies, 9(10), 16–20.

    Google Scholar 

  47. Huang, B., Wang, Z., Yang, J., Ai, J., Zou, Q., Wang, Q., & Ye, D. (2023). Implicit identity driven deepfake face swapping detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 4490–4499).

  48. Jiang, J., Wang, B., Li, B., & Hu, W. (2021, August). Practical face swapping detection based on identity spatial constraints. In 2021 IEEE international joint conference on biometrics (IJCB) (pp. 1–8). IEEE.

  49. Mahajan, S., Chen, L. J., & Tsai, T. C. (2017, March). Swapitup: A face swap application for privacy protection. In 2017 IEEE 31st international conference on advanced information networking and applications (AINA) (pp. 46–50). IEEE.

  50. Guan, W., Wang, W., Dong, J., Peng, B., & Tan, T. (2022, August). Robust face-swap detection based on 3D facial shape information. In CAAI international conference on artificial intelligence (pp. 404–415). Cham: Springer Nature Switzerland.

  51. Li, L., Bao, J., Yang, H., Chen, D., & Wen, F. (2020). Advancing high fidelity identity swapping for forgery detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 5074–5083).

  52. Zhu, Y., Li, Q., Wang, J., Xu, C. Z., & Sun, Z. (2021). One shot face swapping on megapixels. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 4834–4844).

  53. Kwon, P., You, J., Nam, G., Park, S., & Chae, G. (2021). Kodf: A large-scale korean deepfake detection dataset. In Proceedings of the IEEE/CVF international conference on computer vision (pp. 10744–10753).

  54. Li, Y., Yang, X., Sun, P., Qi, H., & Lyu, S. (2020). Celeb-df: A large-scale challenging dataset for deepfake forensics. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 3207–3216).

  55. Dolhansky, B., Bitton, J., Pflaum, B., Lu, J., Howes, R., Wang, M., & Ferrer, C. C. (2020). The deepfake detection challenge (DFDC) dataset. Preprint arXiv:2006.07397.

  56. Jiang, L., Li, R., Wu, W., Qian, C., & Loy, C. C. (2020). Deeperforensics-1.0: A large-scale dataset for real-world face forgery detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 2889–2898).

  57. Huang, J., Wang, X., Du, B., Du, P., & Xu, C. (2021). DeepFake MNIST+: a DeepFake facial animation dataset. In Proceedings of the IEEE/CVF international conference on computer vision (pp. 1973–1982).

  58. Nadimpalli, A. V., & Rattani, A. (2022). GBDF: Gender balanced deepfake dataset towards fair deepfake detection. Preprint arXiv:2207.10246.

  59. Wang, B., Wang, Y., Hou, J., Li, Y., & Guo, Y. (2022). Open-Set source camera identification based on envelope of data clustering optimization (EDCO). Computers and Security, 113, 102571.

    Article  Google Scholar 

  60. Iuliani, M., Fontani, M., & Piva, A. (2021). A leak in PRNU based source identification—Questioning fingerprint uniqueness. IEEE Access, 9, 52455–52463.

    Article  Google Scholar 

  61. Berthet, A., Tescari, F., Galdi, C., & Dugelay, J. L. (2021, September). Two-stream convolutional neural network for image source social network identification. In 2021 international conference on cyberworlds (CW) (pp. 229–237). IEEE.

  62. Karunakar, A. K., & Li, C. T. (2021). Identification of source social network of digital images using deep neural network. Pattern Recognition Letters, 150, 17–25.

    Article  Google Scholar 

  63. Rani, A., Jain, A., & Kumar, M. (2021). Identification of copy-move and splicing based forgeries using advanced SURF and revised template matching. Multimedia Tools and Applications, 80(16), 23877–23898.

    Article  Google Scholar 

  64. Walia, S., & Kumar, K. (2019). Digital image forgery detection: A systematic scrutiny. Australian Journal of Forensic Sciences, 51(5), 488–526.

    Article  Google Scholar 

  65. Ding, F., Shi, Y., Zhu, G., & Shi, Y. Q. (2019). Smoothing identification for digital image forensics. Multimedia Tools and Applications, 78(7), 8225–8245.

    Article  Google Scholar 

  66. Qureshi, M. A., & Deriche, M. (2014, February). A review on copy move image forgery detection techniques. In 2014 IEEE 11th international multi-conference on systems, signals & devices (SSD14) (pp. 1–5). IEEE.

  67. Niu, P., Wang, C., Chen, W., Yang, H., & Wang, X. (2021). Fast and effective keypoint-based image copy-move forgery detection using complex-valued moment invariants. Journal of Visual Communication and Image Representation, 77, 1.

    Article  Google Scholar 

  68. Al-Azrak, F. M., Elsharkawy, Z. F., Elkorany, A. S., El Banby, G. M., Dessowky, M. I., El-Samie, A., & Fathi, E. (2020). Copy-move forgery detection based on discrete and SURF transforms. Wireless Personal Communications, 110(1), 503–530.

    Article  Google Scholar 

  69. Fatima, B., Ghafoor, A., Ali, S. S., & Riaz, M. M. (2022). FAST, BRIEF and SIFT based image copy-move forgery detection technique. Multimedia Tools and Applications, 2022, 1–15.

    Google Scholar 

  70. Tralic, D., Zupancic, I., Grgic, S., & Grgic, M. (2013, September). CoMoFoD—New database for copy-move forgery detection. In Proceedings ELMAR-2013 (pp. 49–54). IEEE

  71. Armas Vega, E. A., González Fernández, E., Sandoval Orozco, A. L., & García Villalba, L. J. (2021). Copy-move forgery detection technique based on discrete cosine transform blocks features. Neural Computing and Applications, 33(10), 4713–4727.

    Article  Google Scholar 

  72. Hajihashemi, V., & Gharahbagh, A. A. (2017, September). A fast, block based, copy-move forgery detection approach using image gradient and modified K-means. In The international symposium on intelligent systems technologies and applications (pp. 298–307). Springer, Cham.

  73. Parveen, A., Khan, Z. H., & Ahmad, S. N. (2019). Block-based copy-move image forgery detection using DCT. Iran Journal of Computer Science, 2(2), 89–99.

    Article  Google Scholar 

  74. Zhong, J., Gan, Y., Young, J., Huang, L., & Lin, P. (2017). A new block-based method for copy move forgery detection under image geometric transforms. Multimedia Tools and Applications, 76(13), 14887–14903.

    Article  Google Scholar 

  75. Wang, X. Y., Jiao, L. X., Wang, X. B., Yang, H. Y., & Niu, P. P. (2018). A new keypoint-based copy-move forgery detection for color image. Applied Intelligence, 48(10), 3630–3652.

    Article  Google Scholar 

  76. Yang, F., Li, J., Lu, W., & Weng, J. (2017). Copy-move forgery detection based on hybrid features. Engineering Applications of Artificial Intelligence, 59, 73–83.

    Article  Google Scholar 

  77. Abdalla, Y., Iqbal, M. T., & Shehata, M. (2019). Copy-move forgery detection and localization using a generative adversarial network and convolutional neural-network. Information, 10(9), 286.

    Article  Google Scholar 

  78. Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019). Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081–30096.

    Article  Google Scholar 

  79. Huang, H. Y., & Ciou, A. J. (2019). Copy-move forgery detection for image forensics using the superpixel segmentation and the Helmert transformation. EURASIP Journal on Image and Video Processing, 2019(1), 1–16.

    Article  Google Scholar 

  80. Wu, Y., Abd-Almageed, W., & Natarajan, P. (2017, October). Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection. In Proceedings of the 25th ACM international conference on multimedia (pp. 1480–1502).

  81. Alahmadi, A. A., Hussain, M., Aboalsamh, H., Muhammad, G., & Bebis, G. (2013, December). Splicing image forgery detection based on DCT and Local Binary Pattern. In 2013 IEEE global conference on signal and information processing (pp. 253–256). IEEE.

  82. Kaur, N., Jindal, N., & Singh, K. (2020). A passive approach for the detection of splicing forgery in digital images. Multimedia Tools and Applications, 79(43), 32037–32063.

    Article  Google Scholar 

  83. Yang, B., Sun, X., Chen, X., Zhang, J., & Li, X. (2015). Exposing photographic splicing by detecting the inconsistencies in shadows. The Computer Journal, 58(4), 588–600.

    Article  Google Scholar 

  84. Shen, X., Shi, Z., & Chen, H. (2017). Splicing image forgery detection using textural features based on the grey level co-occurrence matrices. IET Image Processing, 11(1), 44–53.

    Article  Google Scholar 

  85. Li, C., Ma, Q., Xiao, L., Li, M., & Zhang, A. (2017). Image splicing detection based on Markov features in QDCT domain. Neurocomputing, 228, 29–36.

    Article  Google Scholar 

  86. Pomari, T., Ruppert, G., Rezende, E., Rocha, A., & Carvalho, T. (2018, October). Image splicing detection through illumination inconsistencies and deep learning. In 2018 25th IEEE international conference on image processing (ICIP) (pp. 3788–3792). IEEE.

  87. Xiao, B., Wei, Y., Bi, X., Li, W., & Ma, J. (2020). Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering. Information Sciences, 511, 172–191.

    Article  Google Scholar 

  88. Nath, S., & Naskar, R. (2021). Automated image splicing detection using deep CNN-learned features and ANN-based classifier. Signal, Image and Video Processing, 15(7), 1601–1608.

    Article  Google Scholar 

  89. Elaskily, M. A., Aslan, H. K., Elshakankiry, O. A., Faragallah, O. S., Abd El-Samie, F. E., & Dessouky, M. M. (2017, November). Comparative study of copy-move forgery detection techniques. In 2017 Intl Conf on advanced control circuits systems (ACCS) systems & 2017 Intl Conf on new paradigms in electronics & information technology (PEIT) (pp. 193–203). IEEE.

  90. Roy, A., Dixit, R., Naskar, R., & Chakraborty, R. S. (2020). Digital image forensics: Theory and implementation. London: Springer.

    Book  Google Scholar 

  91. Lin, X., Wei, X., & Li, C. T. (2014, February). Two improved forensic methods of detecting contrast enhancement in digital images. In Media watermarking, security, and forensics 2014 (Vol. 9028, pp. 326–335). SPIE.

  92. Sun, J. Y., Kim, S. W., Lee, S. W., & Ko, S. J. (2018). A novel contrast enhancement forensics based on convolutional neural networks. Signal Processing: Image Communication, 63, 149–160.

    Google Scholar 

  93. Cao, G., Zhao, Y., Ni, R., Tian, H., & Yu, L. (2014). Attacking contrast enhancement forensics in digital images. Science China Information Sciences, 57(5), 1–13.

    Article  Google Scholar 

  94. Cao, G., Zhao, Y., Ni, R., & Li, X. (2014). Contrast enhancement-based forensics in digital images. IEEE Transactions on Information Forensics and Security, 9(3), 515–525.

    Article  Google Scholar 

  95. Bharati, A., Vatsa, M., Singh, R., Bowyer, K. W., & Tong, X. (2017, October). Demography-based facial retouching detection using subclass supervised sparse autoencoder. In 2017 IEEE international joint conference on biometrics (IJCB) (pp. 474–482). IEEE.

  96. Scherhag, U., Debiasi, L., Rathgeb, C., Busch, C., & Uhl, A. (2019). Detection of face morphing attacks based on PRNU analysis. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1(4), 302–317.

    Article  Google Scholar 

  97. Tembe, A. U., & Thombre, S. S. (2017, February). Survey of copy-paste forgery detection in digital image forensic. In 2017 international conference on innovative mechanisms for industry applications (ICIMIA) (pp. 248–252). IEEE.

  98. Scherhag, U., Raghavendra, R., Raja, K. B., Gomez-Barrero, M., Rathgeb, C., & Busch, C. (2017, April). On the vulnerability of face recognition systems towards morphed face attacks. In 2017 5th international workshop on biometrics and forensics (IWBF) (pp. 1–6). IEEE.

  99. Kraetzer, C., Makrushin, A., Neubert, T., Hildebrandt, M., & Dittmann, J. (2017, June). Modeling attacks on photo-ID documents and applying media forensics for the detection of facial morphing. In Proceedings of the 5th ACM workshop on information hiding and multimedia security (pp. 21–32).

  100. Long, M., Zhao, X., Zhang, L. B., & Peng, F. (2022). Detection of face morphing attacks based on patch-level features and lightweight networks. Security and Communication Networks, 2022, 1.

    Google Scholar 

  101. Autherith, S., & Pasquini, C. (2020). Detecting morphing attacks through face geometry features. Journal of Imaging, 6(11), 115.

    Article  Google Scholar 

  102. Seibold, C., Hilsmann, A., & Eisert, P. (2021). Feature focus: Towards explainable and transparent deep face morphing attack detectors. Computers, 10(9), 117.

    Article  Google Scholar 

  103. Makrushin, A., Kraetzer, C., Neubert, T., & Dittmann, J. (2018, June). Generalized Benford’s law for blind detection of morphed face images. In Proceedings of the 6th ACM workshop on information hiding and multimedia security (pp. 49–54).

  104. Awasthi, D., & Srivastava, V. K. (2023). Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF. Multimedia Tools and Applications, 82(11), 16555–16589.

    Article  Google Scholar 

  105. Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255–260.

    Article  Google Scholar 

  106. Wang, X., Wang, H., Niu, S., & Zhang, J. (2019). Detection and localization of image forgeries using improved mask regional convolutional neural network. Mathematical Biosciences and Engineering, 16(5), 4581–4593.

    Article  Google Scholar 

  107. Abdalla, Y., Iqbal, M. T., & Shehata, M. (2019). Convolutional neural network for copy-move forgery detection. Symmetry, 11(10), 1280.

    Article  Google Scholar 

  108. Bayar, B., & Stamm, M. C. (2016, June). A deep learning approach to universal image manipulation detection using a new convolutional layer. In Proceedings of the 4th ACM workshop on information hiding and multimedia security (pp. 5–10).

  109. Krishnaraj, N., Sivakumar, B., Kuppusamy, R., Teekaraman, Y., & Thelkar, A. R. (2022). Design of automated deep learning-based fusion model for copy-move image forgery detection. Computational Intelligence and Neuroscience, 2022, 1.

    Article  Google Scholar 

  110. Koul, S., Kumar, M., Khurana, S. S., Mushtaq, F., & Kumar, K. (2022). An efficient approach for copy-move image forgery detection using convolution neural network. Multimedia Tools and Applications, 81(8), 11259–11277.

    Article  Google Scholar 

  111. Ali, S. S., Ganapathi, I. I., Vu, N. S., Ali, S. D., Saxena, N., & Werghi, N. (2022). Image forgery detection using deep learning by recompressing images. Electronics, 11(3), 403.

    Article  Google Scholar 

  112. Qazi, E. U. H., Zia, T., & Almorjan, A. (2022). Deep learning-based digital image forgery detection system. Applied Sciences, 12(6), 2851.

    Article  Google Scholar 

  113. Kaur, M., Daryani, P., Varshney, M., & Kaushal, R. (2022). Detection of fake images on WhatsApp using socio-temporal features. Social Network Analysis and Mining, 12(1), 1–13.

    Article  Google Scholar 

  114. Rao, A., Rao, C. S., & Cheruku, D. R. (2022). Differentiating digital image forensics and tampering localization by a novel hybrid approach. Multimed Tools Appl, 81, 18693–18713.

    Article  Google Scholar 

  115. Abbas, M. N., Ansari, M. S., Asghar, M. N., Kanwal, N., O'Neill, T., & Lee, B. (2021, January). Lightweight deep learning model for detection of copy-move image forgery with post-processed attacks. In 2021 IEEE 19th world symposium on applied machine intelligence and informatics (SAMI) (pp. 000125–000130). IEEE.

  116. Zhong, J. L., & Pun, C. M. (2019). An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Transactions on Information Forensics and Security, 15, 2134–2146.

    Article  Google Scholar 

  117. Chandani, K., & Arora, M. (2021). Automatic facial forgery detection using deep neural networks. In Advances in interdisciplinary engineering (pp. 205–214). Springer.

  118. Mehraj, S., Mushtaq, S., Parah, S. A., Giri, K. J., & Sheikh, J. A. (2023). A robust watermarking scheme for hybrid attacks on heritage images. Journal of Ambient Intelligence and Humanized Computing, 14(6), 7367–7380.

    Article  Google Scholar 

  119. AlShaikh, M., Alzaqebah, M., & Jawarneh, S. (2023). Robust watermarking based on modified Pigeon algorithm in DCT domain. Multimedia Tools and Applications, 82(2), 3033–3053.

    Article  Google Scholar 

  120. Rakhmawati, L., Tjahyaningtijas, H. P. A., Yustanti, W., & Wiryanto, W. (2023). A block-based image characteristics robust watermarking with optimal embeddable AC coefficient. International Journal of Intelligent Engineering and Systems, 16(4), 1.

    Google Scholar 

  121. Rajput, S. S., Mondal, B., & Warsi, F. Q. (2023). A robust watermarking scheme via optimization-based image reconstruction technique. Multimedia Tools and Applications, 2023, 1–22.

    Google Scholar 

  122. Senol, A., Elbasi, E., Topcu, A. E., & Mostafa, N. (2023). A semi-fragile, inner-outer block-based watermarking method using scrambling and frequency domain algorithms. Electronics, 12(4), 1065.

    Article  Google Scholar 

  123. James, G., Witten, D., Hastie, T., Tibshirani, R., & Taylor, J. (2023). Unsupervised learning. In An introduction to statistical learning: with applications in Python (pp. 503–556). Springer.

  124. Dhivya, S., Sangeetha, J., & Sudhakar, B. J. S. C. (2020). Copy-move forgery detection using SURF feature extraction and SVM supervised learning technique. Soft Computing, 24, 14429–14440.

    Article  Google Scholar 

  125. Suresh, G., & Rao, C. S. (2016). Copy move forgery detection using GLCM based statistical features. International Journal on Cybernetics and Informatics (IJCI), 5(4), 165.

    Article  Google Scholar 

  126. Mangat, S. S., & Kaur, H. (2016, October). Improved copy-move forgery detection in image by feature extraction with KPCA and adaptive method. In 2016 2nd international conference on next generation computing technologies (NGCT) (pp. 694–703). IEEE.

  127. Ranjan, S., Garhwal, P., Bhan, A., Arora, M., & Mehra, A. (2018, May). Framework for image forgery detection and classification using machine learning. In 2018 2nd international conference on trends in electronics and informatics (ICOEI) (pp. 1–9). IEEE.

  128. Hashmir, M. F., & Keskar, A. G. (2013). Image forgery detection and classification using HMM and SVM classifier. In Proceedings of international conference on intelligent unmanned systems (Vol. 9).

  129. Katiyar, A., & Bhavsar, A. (2022). Image forgery detection with interpretability. Preprint arXiv:2202.00908.

  130. Kaushik, M. S., & Kandali, A. B. (2023). Fuzzy based image forgery classification with SWT-DCT-LBP based hybrid features. Wireless Personal Communications, 130(3), 1527–1547.

    Article  Google Scholar 

  131. Sharma, S., & Ghanekar, U. (2019). Spliced image classification and tampered region localization using local directional pattern. International Journal of Image, Graphics and Signal Processing, 11(3), 1.

    Article  Google Scholar 

  132. Alahmadi, A., Hussain, M., Aboalsamh, H., Muhammad, G., Bebis, G., & Mathkour, H. (2017). Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing, 11, 81–88.

    Article  Google Scholar 

  133. Le-Tien, T., Phan-Xuan, H., Nguyen-Chinh, T., & Do-Tieu, T. (2019). Image forgery detection: A low computational-cost and effective data-driven model. International Journal of Machine Learning and Computing, 9(2), 1.

    Article  Google Scholar 

  134. Isaac, M. M., & Wilscy, M. (2015). Image forgery detection based on Gabor wavelets and local phase quantization. Procedia Computer Science, 58, 76–83.

    Article  Google Scholar 

  135. Priyanka, S. G., & Singh, K. (2020). An improved block based copy-move forgery detection technique. Multimedia Tools and Applications, 79, 13011–13035.

    Article  Google Scholar 

  136. Muhammad, G., Al-Hammadi, M. H., Hussain, M., & Bebis, G. (2014). Image forgery detection using steerable pyramid transform and local binary pattern. Machine Vision and Applications, 25, 985–995.

    Article  Google Scholar 

  137. Jia, G., Zheng, M., Hu, C., Ma, X., Xu, Y., Liu, L., & He, R. (2021). Inconsistency-aware wavelet dual-branch network for face forgery detection. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(3), 308–319.

    Article  Google Scholar 

  138. MingRu, K., Zheng, Q., Yan, S. K., & Arunkumar, N. (2019). Medical image classification algorithm based on principal component feature dimensionality reduction. Future Generation Computer Systems, 98, 627–634.

    Article  Google Scholar 

  139. Wu, C. M., Hu, Y. C., Liu, K. Y., & Chuang, J. C. (2014). A novel active image authentication scheme for block truncation coding. International Journal of Signal Processing, Image Processing and Pattern Recognition, 7(5), 13–26.

    Article  Google Scholar 

  140. Wang, W., Dong, J., & Tan, T. (2009). A survey of passive image tampering detection. In Digital watermarking: 8th International workshop, IWDW 2009, Guildford, UK, August 24–26, 2009. Proceedings 8 (pp. 308–322). Springer.

  141. Freire-Obregon, D., Narducci, F., Barra, S., & Castrillon-Santana, M. (2019). Deep learning for source camera identification on mobile devices. Pattern Recognition Letters, 126, 86–91.

    Article  Google Scholar 

  142. Thyagharajan, K. K., & Kalaiarasi, G. (2021). A review on near-duplicate detection of images using computer vision techniques. Archives of Computational Methods in Engineering, 28, 897–916.

    Article  Google Scholar 

  143. Passi, A. (2021). Digital image forensic based on machine learning approach for forgery detection and localization. Journal of Physics: Conference Series, 1950(1), 012035.

    Google Scholar 

  144. Hussien, N. Y., Mahmoud, R. O., & Zayed, H. H. (2020). Deep learning on digital image splicing detection using CFA artifacts. International Journal of Sociotechnology and Knowledge Development (IJSKD), 12(2), 31–44.

    Article  Google Scholar 

  145. Rafique, R., Gantassi, R., Amin, R., Frnda, J., Mustapha, A., & Alshehri, A. H. (2023). Deep fake detection and classification using error-level analysis and deep learning. Scientific Reports, 13(1), 7422.

    Article  Google Scholar 

  146. Rao, Y., & Ni, J. (2016, December). A deep learning approach to detection of splicing and copy-move forgeries in images. In 2016 IEEE international workshop on information forensics and security (WIFS) (pp. 1–6). IEEE.

  147. Kuznetsov, A. (2019). Digital image forgery detection using deep learning approach. Journal of Physics: Conference Series, 1368(3), 032028.

    Google Scholar 

  148. Cozzolino, D., Poggi, G., & Verdoliva, L. (2017, June). Recasting residual-based local descriptors as convolutional neural networks: an application to image forgery detection. In Proceedings of the 5th ACM workshop on information hiding and multimedia security (pp. 159–164).

  149. Elaskily, M. A., Alkinani, M. H., Sedik, A., & Dessouky, M. M. (2021). Deep learning-based algorithm (ConvLSTM) for copy move forgery detection. Journal of Intelligent and Fuzzy Systems, 40(3), 4385–4405.

    Article  Google Scholar 

  150. Shah, Y., Shah, P., Patel, M., Khamkar, C., & Kanani, P. (2020, October). Deep learning model-based multimedia forgery detection. In 2020 4th international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 564–572). IEEE.

  151. Bibi, S., Abbasi, A., Haq, I. U., Baik, S. W., & Ullah, A. (2021). Digital image forgery detection using deep autoencoder and CNN features. Human-centric Computing and Information Sciences, 11, 1–17.

    Google Scholar 

  152. Li, J., Li, X., Yang, B., & Sun, X. (2014). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.

    Google Scholar 

  153. Logothetis, N. K., & Sheinberg, D. L. (1996). Visual object recognition. Annual Review of Neuroscience, 19(1), 577–621.

    Article  Google Scholar 

  154. Lauzon, F. Q. (2012, July). An introduction to deep learning. In 2012 11th international conference on information science, signal processing and their applications (ISSPA) (pp. 1438–1439). IEEE.

  155. Brown, L. G. (1992). A survey of image registration techniques. ACM Computing Surveys (CSUR), 24(4), 325–376.

    Article  Google Scholar 

  156. Bkassiny, M., Li, Y., & Jayaweera, S. K. (2012). A survey on machine-learning techniques in cognitive radios. IEEE Communications Surveys and Tutorials, 15(3), 1136–1159.

    Article  Google Scholar 

  157. Mohamed, A. E. (2017). Comparative study of four supervised machine learning techniques for classification. International Journal of Applied, 7(2), 1–15.

    Google Scholar 

  158. Kotsiantis, S. B., Zaharakis, I., & Pintelas, P. (2007). Supervised machine learning: A review of classification techniques. Emerging Artificial Intelligence Applications in Computer Engineering, 160(1), 3–24.

    Google Scholar 

  159. Tharwat, A. (2020). Classification assessment methods. Applied Computing and Informatics, 17(1), 168–192.

    Article  Google Scholar 

  160. Hossin, M., & Sulaiman, M. N. (2015). A review on evaluation metrics for data classification evaluations. International Journal of Data Mining & Knowledge Management Process, 5(2), 1.

    Article  Google Scholar 

  161. Narkhede, S. (2018). Understanding auc-roc curve. Towards Data Science, 26(1), 220–227.

    Google Scholar 

  162. Henderson, P., & Ferrari, V. (2017). End-to-end training of object class detectors for mean average precision. In Computer vision—ACCV 2016: 13th Asian conference on computer vision, Taipei, Taiwan, November 20–24, 2016, revised selected papers, Part V 13 (pp. 198–213). Springer.

  163. Abd Warif, N. B., Wahab, A. W. A., Idris, M. Y. I., Ramli, R., Salleh, R., Shamshirband, S., & Choo, K. K. R. (2016). Copy-move forgery detection: Survey, challenges and future directions. Journal of Network and Computer Applications, 75, 259–278.

    Article  Google Scholar 

  164. Tyagi, S., & Yadav, D. (2023). A detailed analysis of image and video forgery detection techniques. The Visual Computer, 39(3), 813–833.

    Article  Google Scholar 

  165. Math, S., & Tripathi, R. C. (2010). Digital forgeries: Problems and challenges. International Journal of Computer Applications, 5(12), 9–12.

    Article  Google Scholar 

  166. Mehrjardi, F. Z., Latif, A. M., Zarchi, M. S., & Sheikhpour, R. (2023). A survey on deep learning-based image forgery detection. Pattern Recognition, 2023, 109778.

    Article  Google Scholar 

  167. da Costa, K. A., Papa, J. P., Passos, L. A., Colombo, D., Del Ser, J., Muhammad, K., & de Albuquerque, V. H. C. (2020). A critical literature survey and prospects on tampering and anomaly detection in image data. Applied Soft Computing, 97, 106727.

    Article  Google Scholar 

  168. Bo, X., Junwen, W., Guangjie, L., & Yuewei, D. (2010, November). Image copy-move forgery detection based on SURF. In 2010 international conference on multimedia information networking and security (pp. 889–892). IEEE.

  169. Masood, M., Nawaz, M., Malik, K. M., Javed, A., Irtaza, A., & Malik, H. (2023). Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward. Applied intelligence, 53(4), 3974–4026.

    Article  Google Scholar 

Download references

Funding

There is no any funding for preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajesh Kumar.

Ethics declarations

Conflict of interest

There are no conflict of interest declared by the author.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, S., Kumar, R. Image forgery detection: comprehensive review of digital forensics approaches. J Comput Soc Sc (2024). https://doi.org/10.1007/s42001-024-00265-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42001-024-00265-8

Keywords

Navigation