Skip to main content
Log in

Visualizing the truth: a survey of multimedia forensic analysis

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia forensics is an essential field of research that deals with the authenticity and integrity of multimedia content in the digital world. With the increasing use of digital platforms and social media, the risk of manipulated and misleading digital content has significantly increased, making it crucial to verify and analyze the authenticity of multimedia content presented as evidence. Multimedia manipulation can affect various forms of media, such as audio, video, and images, and poses significant challenges for investigators, including different formats, time complexity, and a vast amount of data. This paper provides an overview of current techniques for multimedia manipulation detection, focusing on image, video, and audio analysis. The paper presents an in-depth analysis of various techniques used in multimedia forensics, including source device identification, tampering detection, and authentication. Furthermore, the paper discusses the limitations of current techniques and highlights future research directions in the field. The review concludes that multimedia forensics is a challenging and constantly evolving field that requires ongoing research to address emerging threats to multimedia content authenticity. The proposed techniques have shown promising results in detecting and analyzing multimedia manipulation, but more research is needed to enhance their accuracy and applicability in real-world scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Poisel R, Tjoa S (2011) Forensics investigations of multimedia data: A review of the state-of-the-art. In: 2011 sixth international conference on IT security incident management and IT forensics, pp 48–61. https://doi.org/10.1109/IMF.2011.14

  2. Stamm MC, Wu M, Liu KJR (2013) Information forensics: An overview of the first decade. IEEE Access 1:167–200. https://doi.org/10.1109/ACCESS.2013.2260814

    Article  Google Scholar 

  3. Lin WS, Zhao HV, Liu KJR (2009) Behavior forensics with side information for multimedia fingerprinting social networks. IEEE Trans Inf Forensics Secur 4(4):911–927. https://doi.org/10.1109/TIFS.2009.2033224

    Article  Google Scholar 

  4. Sencar HT, Verdoliva L, Memon N (2022) Multimedia forensics

  5. Nabi ST, Kumar M, Singh P, Aggarwal N, Kumar K (2022) A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions. Multimedia Syst 28(3):939–992

    Google Scholar 

  6. Ding F, Zhu G, Li Y, Zhang X, Atrey PK, Lyu S (2022) Anti-forensics for face swapping videos via adversarial training. IEEE Trans Multimedia 24:3429–3441. https://doi.org/10.1109/TMM.2021.3098422

    Article  Google Scholar 

  7. Gill NK, Garg R, Doegar EA (2017) A review paper on digital image forgery detection techniques. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT), pp 1–7. IEEE

  8. Fang H, Jia Z, Zhou H, Ma Z, Zhang W (2022) Encoded feature enhancement in watermarking network for distortion in real scenes. IEEE Trans Multimedia 1–1. https://doi.org/10.1109/TMM.2022.3149641

  9. Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Int. J. Eng. Innov. Technol. (IJEIT) 2(9):165–175

    Google Scholar 

  10. Wang X, Lin Y, Shen Y, Niu P (2023) Udtcwt-phfms domain statistical image watermarking using vector bw-type r distribution. IEEE Trans Circuits Syst Video Technol 1–1. https://doi.org/10.1109/TCSVT.2023.3252042

  11. Dhanya R, Selvi RK (2017) A state of the art review on copy move forgery detection techniques. In: 2017 IEEE International conference on circuits and systems (ICCS), pp 58–65. IEEE

  12. Kaur R, Kaur A (2012) Digital signature. In: 2012 international conference on computing sciences, pp 295–301. https://doi.org/10.1109/ICCS.2012.25

  13. Meena KB, Tyagi V (2019) Image forgery detection: survey and future directions, pp 163–194. Springer, Singapore. https://doi.org/10.1007/978-981-13-6351-1_14

  14. Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: A survey. Digit Investig 10(3):226–245

    Google Scholar 

  15. Armas Vega EA, Gonzalez Fernandez E, Sandoval Orozco AL, Garcia Villalba LJ (2020) Passive image forgery detection based on the demosaicing algorithm and jpeg compression. IEEE Access 8:11815–11823

    Google Scholar 

  16. Wahab AWA, Bagiwa MA, Idris MYI, Khan S, Razak Z, Ariffin MRK (2014) Passive video forgery detection techniques: A survey. In: 2014 10th International conference on information assurance and security, pp 29–34. https://doi.org/10.1109/ISIAS.2014.7064616

  17. Huang H-Y, Ciou A-J (2019) Copy-move forgery detection for image forensics using the superpixel segmentation and the helmert transformation. EURASIP J Image Video Process 2019(1):1–16

    Google Scholar 

  18. Li Q, Wang C, Zhou X, Qin Z (2022) Image copy-move forgery detection and localization based on super-bpd segmentation and dcnn. Sci Rep 12(1):1–12

    Google Scholar 

  19. Daniya T, Thirukrishna J, Kumar BS, Kumar MV (2021) Icsa-ecnn based image forgery detection in face images. In: 2021 International conference on computer communication and informatics (ICCCI), IEEE pp 1–4

  20. Le-Tien T, Huynh-Kha LP-C-H, Tran-Hong A (2016) Block based technique for detecting copy-move digital image forgeries: Wavelet transform and zernike moments. In: The second international conference on electrical and electronic engineering, telecommunication engineering, and mechatronics (EEETEM2016), p 26

  21. Hajialilu SF, Azghani M, Kazemi N (2020) Image copy-move forgery detection using sparse recovery and keypoint matching. IET Image Proc 14(12):2799–2807

    Google Scholar 

  22. Dixit R, Naskar R, Mishra S (2017) Blur-invariant copy-move forgery detection technique with improved detection accuracy utilising swt-svd. IET Image Proc 11(5):301–309

    Google Scholar 

  23. Dixit A, Bag S (2020) Composite attacks-based copy-move image forgery detection using akaze and fast with automatic contrast thresholding. IET Image Proc 14(17):4528–4542

    Google Scholar 

  24. Hu Y-C, Lin Y-H, Lo C-C, Wu C-M (2019) Implementation of block-based hierarchical prediction for developing an error-propagation-free reversible data hiding scheme. Symmetry 11(9):1146

    Google Scholar 

  25. Prakash CS, Om H, Maheshkar S, Maheshkar V (2018) Keypoint-based passive method for image manipulation detection. Cogent Eng 5(1):1523346

    Google Scholar 

  26. Diwan A, Sharma R, Roy AK, Mitra SK (2021) Keypoint based comprehensive copy-move forgery detection. IET Image Proc 15(6):1298–1309

    Google Scholar 

  27. Kumar N, Meenpal T (2022) Salient keypoint-based copy–move image forgery detection. Australian J Forensic Sci 1–24

  28. Muzaffer G, Karaagacli ES, Ulutas G (2017) Recent keypoint based copy move forgery detection techniques. In: 2017 International artificial intelligence and data processing symposium (IDAP), IEEE pp 1–7

  29. Siddiqi MH, Asghar K, Draz U, Ali A, Alruwaili M, Alhwaiti Y, Alanazi S, Kamruzzaman M (2021) Image splicing-based forgery detection using discrete wavelet transform and edge weighted local binary patterns. Security & Communication Networks

  30. Wang X, Wang Y, Lei J, Li B, Wang Q, Xue J (2022) Coarse-to-fine-grained method for image splicing region detection. Pattern Recogn 122:108347

    Google Scholar 

  31. Revi KR, Wilscy M (2017) Scale invariant feature transform based copy-move forgery detection techniques on electronic images–a survey. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), IEEE pp 2315–2318

  32. Meena KB, Tyagi V (2021) A deep learning based method for image splicing detection. In: Journal of physics: conference series, vol 1714, p 012038. IOP Publishing

  33. Kadam K, Ahirrao S, Kotecha K, Sahu S (2021) Detection and localization of multiple image splicing using mobilenet v1. IEEE Access 9:162499–162519

    Google Scholar 

  34. Liu Y, Zhao X (2020) Constrained image splicing detection and localization with attention-aware encoder-decoder and atrous convolution. IEEE Access 8:6729–6741

    Google Scholar 

  35. Rao Y, Ni J, Zhao H (2020) Deep learning local descriptor for image splicing detection and localization. IEEE access 8:25611–25625

    Google Scholar 

  36. Rhee KH (2020) Detection of spliced image forensics using texture analysis of median filter residual. IEEE Access 8:103374–103384

    Google Scholar 

  37. Zhang Y, Zhu G, Wu L, Kwong S, Zhang H, Zhou Y (2021) Multi-task se-network for image splicing localization. IEEE Trans Circ Syst Video Technol

  38. Soni B, Das PK, Thounaojam DM (2017) Cmfd: a detailed review of block based and key feature based techniques in image copy-move forgery detection. IET Image Proc 12(2):167–178

    Google Scholar 

  39. Shailaja Rani PB, Kumar A (2019) Digital image forgery detection techniques: A comprehensive review. In: 2019 3rd International conference on electronics, communication and aerospace technology (ICECA), pp 959–963. https://doi.org/10.1109/ICECA.2019.8822064

  40. Soni B, Das PK, Meitei Thounaojam D (2018) Improved block-based technique using surf and fast keypoints matching for copy-move attack detection. In: 2018 5th International conference on signal processing and integrated networks (SPIN), pp 197–202. https://doi.org/10.1109/SPIN.2018.8474093

  41. Goel N, Kaur S, Bala R (2021) Dual branch convolutional neural network for copy move forgery detection. IET Image Proc 15(3):656–665

    Google Scholar 

  42. Antony N, Devassy BR (2018) Implementation of image/video copy-move forgery detection using brute-force matching. In: 2018 2nd International conference on trends in electronics and informatics (ICOEI), pp 1085–1090. IEEE

  43. Yildirim EO, Ulutaş, G (2018) Image splicing detection with dwt domain extended markov features. In: 2018 26th Signal processing and communications applications conference (SIU), pp 1–4. https://doi.org/10.1109/SIU.2018.8404325

  44. Bi X, Zhang Z, Liu Y, Xiao B, Li W (2021) Multi-task wavelet corrected network for image splicing forgery detection and localization. In: 2021 IEEE International conference on multimedia and expo (ICME), pp 1–6. https://doi.org/10.1109/ICME51207.2021.9428466

  45. Pham NT, Lee J-W, Kwon G-R, Park C-S (2019) Hybrid image-retrieval method for image-splicing validation. Symmetry 11(1):83

    Google Scholar 

  46. Priyadharsini S, Devi KK (2023) Effective image splicing detection using deep neural network. Int J Wavelets Multiresolut Inf Process 21(02):2250051

    Google Scholar 

  47. Jaiprakash SP, Desai MB, Prakash CS, Mistry VH, Radadiya KL (2020) Low dimensional dct and dwt feature based model for detection of image splicing and copy-move forgery. Multimedia Tools and Applications 79:29977–30005

    Google Scholar 

  48. Fang S, Stamm MC (2022) Attacking image splicing detection and localization algorithms using synthetic traces. arXiv preprint arXiv:2211.12314

  49. Su L, Li C, Lai Y, Yang J (2017) A fast forgery detection algorithm based on exponential-fourier moments for video region duplication. IEEE Trans Multimedia 20(4):825–840

    Google Scholar 

  50. Su L, Luo H, Wang S (2019) A novel forgery detection algorithm for video foreground removal. IEEE access 7:109719–109728

    Google Scholar 

  51. D’Amiano L, Cozzolino D, Poggi G, Verdoliva L (2018) A patchmatch-based dense-field algorithm for video copy-move detection and localization. IEEE Trans Circuits Syst Video Technol 29(3):669–682

    Google Scholar 

  52. Huang CC, Lee CE, Thing VL (2020) A novel video forgery detection model based on triangular polarity feature classification. Int J Digital Crime Forensics (IJDCF) 12(1):14–34

    Google Scholar 

  53. Chen S, Tan S, Li B, Huang J (2015) Automatic detection of object-based forgery in advanced video. IEEE Trans Circuits Syst Video Technol 26(11):2138–2151

    Google Scholar 

  54. Saddique M, Asghar K, Bajwa UI, Hussain M, Aboalsamh HA, Habib Z (2020) Classification of authentic and tampered video using motion residual and parasitic layers. IEEE Access 8:56782–56797

    Google Scholar 

  55. Jia S, Xu Z, Wang H, Feng C, Wang T (2018) Coarse-to-fine copy-move forgery detection for video forensics. IEEE Access 6:25323–25335

    Google Scholar 

  56. Nam S-H, Ahn W, Yu I-J, Kwon M-J, Son M, Lee H-K (2020) Deep convolutional neural network for identifying seam-carving forgery. IEEE Trans Circuits Syst Video Technol 31(8):3308–3326

    Google Scholar 

  57. Fernández EG, Orozco ALS, Villalba LJG (2021) Digital video manipulation detection technique based on compression algorithms. IEEE Trans Intell Transp Syst 23(3):2596–2605

    Google Scholar 

  58. Raveendra M, Nagireddy K (2019) Dnn based moth search optimization for video forgery detection. Int J Eng Adv Technol 9(1):1190–1199

    Google Scholar 

  59. Luo Y-X, Chen J-L (2022) Dual attention network approaches to face forgery video detection. IEEE Access 10:110754–110760

    Google Scholar 

  60. Verde S, Cannas ED, Bestagini P, Milani S, Calvagno G, Tubaro S (2021) Focal: A forgery localization framework based on video coding self-consistency. IEEE Open J Signal Process 2:217–229

    Google Scholar 

  61. Huang Y, Li X, Wang W, Jiang T, Zhang Q (2021) Forgery attack detection in surveillance video streams using wi-fi channel state information. IEEE Trans Wirel Commun

  62. Wang Y, Peng C, Liu D, Wang N, Gao X (2022) Forgerynir: Deep face forgery and detection in near-infrared scenario. IEEE Trans Inf Forensics Secur 17:500–515

    Google Scholar 

  63. Yu P, Fei J, Xia Z, Zhou Z, Weng J (2022) Improving generalization by commonality learning in face forgery detection. IEEE Trans Inf Forensics Secur 17:547–558

    Google Scholar 

  64. Jia G, Zheng M, Hu C, Ma X, Xu Y, Liu L, Deng Y, He R (2021) Inconsistency-aware wavelet dual-branch network for face forgery detection. IEEE Trans Biometrics Behavior Identity Sci 3(3):308–319

    Google Scholar 

  65. Miao C, Chu Q, Li W, Li S, Tan Z, Zhuang W, Yu N (2021) Learning forgery region-aware and id-independent features for face manipulation detection. IEEE Trans Biometrics Behavior Identity Sci 4(1):71–84

    Google Scholar 

  66. Feng C, Xu Z, Jia S, Zhang W, Xu Y (2016) Motion-adaptive frame deletion detection for digital video forensics. IEEE Trans Circuits Syst Video Technol 27(12):2543–2554

    Google Scholar 

  67. Yang J, Xiao S, Li A, Lu W, Gao X, Li Y (2021) Msta-net: forgery detection by generating manipulation trace based on multi-scale self-texture attention. IEEE Trans Circ Syst Video Technol

  68. Kumar V, Kansal V, Gaur M 2023 Multiple forgery detection in video using convolution neural network

  69. Chen M, Liao X, Wu M (2022) Pulseedit: editing physiological signals in facial videos for privacy protection. IEEE Trans Inf Forensics Secur 17:457–471

    Google Scholar 

  70. Chintha A, Thai B, Sohrawardi SJ, Bhatt K, Hickerson A, Wright M, Ptucha R (2020) Recurrent convolutional structures for audio spoof and video deepfake detection. IEEE J Selected Topics Signal Process 14(5):1024–1037

    Google Scholar 

  71. NJ J, Nithila E, AD X (2022) Region duplication tampering detection and localization in digital video using haar wavelet transform

  72. Aloraini M, Sharifzadeh M, Schonfeld D (2020) Sequential and patch analyses for object removal video forgery detection and localization. IEEE Trans Circuits Syst Video Technol 31(3):917–930

    Google Scholar 

  73. Chen J, Liao X, Wang W, Qian Z, Qin Z, Wang Y (2022) Snis: A signal noise separation-based network for post-processed image forgery detection. IEEE Trans Circ Syst Video Technol

  74. Yang Q, Yu D, Zhang Z, Yao Y, Chen L (2020) Spatiotemporal trident networks: detection and localization of object removal tampering in video passive forensics. IEEE Trans Circuits Syst Video Technol 31(10):4131–4144

    Google Scholar 

  75. Tang L, Ye Q, Zheng H, Hu H, Han Z, Law N-F (2022) Stateful-ccsh: An efficient authentication scheme for high-resolution video surveillance system. IEEE Internet of Things Journal

  76. Liu Y, Xia C, Zhu X, Xu S (2021) Two-stage copy-move forgery detection with self deep matching and proposal superglue. IEEE Trans Image Process 31:541–555

    Google Scholar 

  77. Jean H, Giguet E, Charrier C (2022) Video forgery detection by bitstream analysis. In: Colour and visual computing symposium 2022 (CVCS 2022)

  78. Johnston P, Elyan E, Jayne C (2020) Video tampering localisation using features learned from authentic content. Neural Comput Appl 32(16):12243–12257

    Google Scholar 

  79. He P, Li H, Wang H, Wang S, Jiang X, Zhang R (2020) Frame-wise detection of double hevc compression by learning deep spatio-temporal representations in compression domain. IEEE Trans Multimedia 23:3179–3192

    Google Scholar 

  80. Singh RD, Aggarwal N (2018) Video content authentication techniques: a comprehensive survey. Multimedia Syst 24:211–240

    Google Scholar 

  81. Shelke NA, Kasana SS (2022) Multiple forgery detection and localization technique for digital video using pct and nbap. Multimedia Tools and Applications 81(16):22731–22759

    Google Scholar 

  82. Wu Y, Jiang X, Sun T, Wang W (2014) Exposing video inter-frame forgery based on velocity field consistency. In: 2014 IEEE International conference on acoustics, speech and signal processing (ICASSP), pp 2674–2678. IEEE

  83. Chao J, Jiang X, Sun T (2013) A novel video inter-frame forgery model detection scheme based on optical flow consistency. In: The international workshop on digital forensics and watermarking 2012: 11th international workshop, IWDW 2012, Shanghai, China, October 31–November 3, 2012, Revised Selected Papers, pp 267–281. Springer

  84. Bakas J, Naskar R (2018) A digital forensic technique for inter–frame video forgery detection based on 3d cnn. In: Information systems security: 14th international conference, ICISS 2018, Bangalore, India, December 17–19, 2018, Proceedings 14, pp 304–317. Springer

  85. Joshi V, Jain S (2015) Tampering detection in digital video-a review of temporal fingerprints based techniques. In: 2015 2nd International conference on computing for sustainable global development (INDIACom), pp 1121–1124. IEEE

  86. Amanipour V, Ghaemmaghami S (2017) Video-tampering detection and content reconstruction via self-embedding. IEEE Trans Instrum Meas 67(3):505–515

    Google Scholar 

  87. Javed AR, Jalil Z, Zehra W, Gadekallu TR, Suh DY, Piran MJ (2021) A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions. Eng Appl Artif Intell 106:104456

    Google Scholar 

  88. Sowmya K, Chennamma H, Rangarajan L (2018) Video authentication using spatio temporal relationship for tampering detection. J Inform Security Appl 41:159–169

    Google Scholar 

  89. Lin C-S, Tsay J-J (2014) A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit Investig 11(2):120–140

    Google Scholar 

  90. Verdoliva DCGPL (2019) Extracting camera-based fingerprints for video forensics. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (CVPR) Workshops

  91. Ali Z, Imran M, Alsulaiman M (2017) An automatic digital audio authentication/forensics system. IEEE Access 5:2994–3007

    Google Scholar 

  92. Zhao H, Chen Y, Wang R, Malik H (2017) Audio splicing detection and localization using environmental signature. Multimedia Tools and Applications 76(12):13897–13927

    Google Scholar 

  93. Imran M, Ali Z, Bakhsh ST, Akram S (2017) Blind detection of copy-move forgery in digital audio forensics. IEEE Access 5:12843–12855

    Google Scholar 

  94. Dua S, Kumar SS, Albagory Y, Ramalingam R, Dumka A, Singh R, Rashid M, Gehlot A, Alshamrani SS, AlGhamdi AS (2022) Developing a speech recognition system for recognizing tonal speech signals using a convolutional neural network. Appl Sci 12(12):6223

    Google Scholar 

  95. Ali Z, Talha M (2018) Innovative method for unsupervised voice activity detection and classification of audio segments. Ieee Access 6:15494–15504

    Google Scholar 

Download references

Funding

No funding receive

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anjali Diwan.

Ethics declarations

Ethical approval

This study does not contain any studies with human or animal subjects performed by any of the authors.

Competing interests

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Diwan, A., Sonkar, U. Visualizing the truth: a survey of multimedia forensic analysis. Multimed Tools Appl 83, 47979–48006 (2024). https://doi.org/10.1007/s11042-023-17475-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17475-3

Keywords

Navigation