Abstract
Image manipulation is as old as photography itself, and powerful media editing tools have been around for a long time. Using such conventional signal processing methods, it is possible to modify images and videos obtaining very realistic results. This chapter is devoted to describe the most effective strategies to detect the widespread manipulations that rely on traditional approaches and do not require a deep learning strategy. In particular, we will focus on manipulations like adding, replicating, or removing objects and present the major lines of research in multimedia forensics before the deep learning era and the rise of deepfakes. The most popular approaches look for artifacts related to the incamera processing chain (camerabased clues) or the outcamera processing history (editingbased clues). We will focus on methods that rely on the extraction of a camera fingerprint and need some prior information on pristine data, for example, through a collection of images taken from the camera of interest. Then we will shift to blind methods that do not require any prior knowledge and reveal inconsistencies with respect to some welldefined hypotheses. We will also briefly review the most interesting features of machine learning based methods and finally present the major challenges in this area.
You have full access to this open access chapter, Download chapter PDF
Similar content being viewed by others
1 Introduction
Digital image manipulation has a long history, and nowadays several powerful editing tools exist that allow creating realistic results that can easily fool visual scrutiny. Very common operations are adding, replicating, or removing objects, as in the examples of Fig. 3.1. A new object can be inserted by copying it from a different image (splicing), or from the same image (copymove). Instead, an existing object can be deleted by extending the background to cover it (inpainting). Some suitable postprocessing, like resizing, rotation, and color adjustment, can also be applied to better fit the object to the scene, both to improve the visual appearance and to guarantee coherent perspective and scale.
In the last few years, there has been intense research toward the design of methods for reliable image integrity verification [63]. Some tools discover physical inconsistencies [39, 41], regarding, for example, shadows or illumination or perspective, which may also be noticed by an attentive observer. In most cases, however, wellcrafted forgeries leave no visible traces and appear semantically correct. Nonetheless, digital manipulations typically modify the underlying statistics of the original source, leaving a trail of traces which, although invisible to the eye, can be exploited by pixellevel analysis tools. In fact, each image is characterized by a number of features which depend on the different phases of its history, from the very same acquisition process to the internal camera processing (e.g., demosaicing and compression), to all external processing and editing operations (see Fig. 3.2). Therefore, by studying possible deviations of such features from their expected behavior, one can establish with good confidence whether image integrity has been violated.
Based on this general principle, a certain number of approaches have been proposed. For example, the acquisition process leaves on each image a “camera fingerprint”, the photoresponse nonuniformity noise (PRNU), unique for each specific device. Armed with this fingerprint, one can reliably discover and localize various types of attacks. It is also possible to use modelspecific rather than devicespecific features, related to manufacturing choices (like the color filter array) and incamera processing (like the demosaicing algorithm) peculiar of each brand and model. As for external processing, the lion’s share is taken by methods exploiting the properties of JPEG compression. Indeed, after a forgery is performed, the image is very often saved again in a JPEG compressed format. Therefore, by studying anomalies in DCT coefficients due, for example, to double quantization, or JPEG grid misalignments, integrity violation can be detected and localized. Finally, a very common form of forgery involves copymoving image regions to duplicate or hide objects. The presence of identical regions in the image represents by itself a distinctive feature indicating manipulation, which may be discovered efficiently by several approaches, even in the presence of rotation, resizing, and other geometric distortions. Turning to videos, very simple manipulations consist in deleting or replicating entire frames. Of course, also in this case it is possible to insert or hide objects using more sophisticated editing tools [52].
This chapter will present an overview of some of the most effective tools for image forgery detection and localization that have been proposed before the rise of deep learning. In particular, we will focus on passive methods that look at the image content and disregard the associated metadata information. The most popular approaches look for artifacts related to the incamera processing chain (camerabased clues) or the outcamera processing history (editingbased clues). These approaches often follow a modelbased paradigm typically relying on statistical analyses or are based on handcrafted features and apply more classical machine learning tools. Each method relies on its own set of hypotheses, which may or may not hold for a specific manipulation, thereby limiting its applicability to a subset of cases. For example, the camera PRNU can be reliably estimated only if the camera itself is available or a large number of images taken from it. Likewise, methods thought for copymove discovery are obviously ineffective in the presence of a splicing. Some of them are much more general, since they are based on detecting anomalies in the noise residuals.
A defining property of the approaches proposed so far is the prior knowledge they rely upon, which impacts their suitability for realworld applications. First, we will describe PRNUbased methods that require a collection of images taken from the camera of interest. Then we will present blind methods, where no prior knowledge is required. Finally, we will give a short review of machine learningbased methods which rely on a suitable training set comprising both pristine and manipulated data.
2 PRNUBased Approach
Manufacturing imperfections in the silicon wafer used for the imaging sensor generate a unique sensor pattern, called photo response nonuniformity (PRNU) noise. It is specific to each individual camera, stable in time, and independent of the scene. All images acquired by a given camera bear traces of its PRNU pattern, hence it can be considered as a sort of camera fingerprint and used for source attribution tasks, as well as for image forgery detection. If a region of the image is tampered with, the corresponding PRNU pattern is removed, which allows one to detect the manipulation.
PRNUbased forgery detection was first proposed in [49], and it is based on two main steps: (i) the PRNU pattern is estimated offline from a large number of images taken from the camera, and (ii) the target image PRNU is estimated at test time, by means of a denoising filter, and compared with the reference (see Fig. 3.3). This approach relies on some important prior knowledge, since it assumes the availability of a certain number of images taken from the device itself. On the other hand, it is an extremely powerful approach, since it can detect every type of attack: whenever an anomaly arises due to the absence of the camera fingerprint, manipulation can be detected.
Beyond this standard methodology, there are several alternatives proposed in the literature. It is possible to model the strong spatial dependencies present in an image through a Markov Random Field so as to make joint rather than isolated decisions [16], or to rely on discriminative random fields [12] and multiscale analysis [43]. It is worth noting that the PRNUbased approach can be also extended to blind scenarios, where no prior information about the camera is known provided a suitable clustering procedure identifies the images which share the same PRNU [20, 21]. It is even possible to recover some information about PRNU by estimating it from a single image or a group of frames in a video [51, 53, 60].
In the following, we will describe the basic approach proposed in [14]. Let y be a digital image, defined on a rectangular lattice \(\Omega \), with \(y_i\) the value at site \(i \in \Omega \), observed at the camera output, either as a single color band or the composition of multiple color bands. Let us assume in a simplified model [37] that y can be written as^{Footnote 1}
where x is the ideal noisefree image, k the camera PRNU, and \(\theta \) an additive noise term which accounts for all types of disturbances. The PRNU k is the signal of interest, very weak w.r.t. both additive noise \(\theta \) and the ideal image x. In this context also, the image x plays the role of unwanted disturbance, since our goal is to decide whether or not the image PRNU comes from the camera under test so as to detect possible forgeries. To increase the signaltonoise ratio, we can subtract from y an estimate of the ideal image \(\widehat{x}= f(y)\) obtained through denoising, in order to compute the socalled noise residual
where, for convenience, k multiplies the observed image y rather than the unknown original x, and the small difference term \((xy)k\) has been included, together with the denoising error \((x\widehat{x})\) and other disturbances in a single noise term n.
In the following, we describe in more detail the image integrity verification procedure proposed in [14] which comprises the following basic steps:

estimation of the camera PRNU (offline);

computation of image noise residual and of derived statistics;

slidingwindow pixelwise forgery detection test.
2.1 PRNU Estimation
As a preliminary step, the true camera PRNU pattern should be reliably estimated. This requires that either the target camera, or a large number of photos taken by it, is available. Note that the PRNU is a deterministic signal, as opposed to the other image components, and it can be easily estimated starting from the noise residuals. In addition, one can take care of using mostly uniform images (e.g., offfocus pictures of a cloudy sky) to further improve accuracy or to use fewer images to obtain the same performance. In these conditions, the maximum likelihood estimate of the PRNU from M given images is computed in [14] as
where the weights \(y_m\) account for the fact that dark areas of the image present an attenuated PRNU and hence should contribute less to the overall estimate. Of course, this is only an estimate, however, for the sake of simplicity, we will neglect the estimation error and will assume to know the camera PRNU perfectly, that is \(\widehat{k}=k\).
2.2 Noise Residual Computation
In the second step of the algorithm, we compute the noise residual r and suppress most of the scene content by subtracting a denoised version of the image itself:
where f denotes a denoising algorithm. Even in the best case, with perfect denoising, \(\hat{x}=x\), the remaining noise term is likely to dominate r which, therefore, will be only weakly correlated with the camera PRNU. In the presence of textured areas, however, denoising is typically less accurate and some signal components leak into the residual contributing to reducing the operative SNR, to the point of making detection virtually impossible. Especially in these areas, the effectiveness of the denoising algorithm becomes crucial for the overall performance.
2.3 Forgery Detection Test
Assuming \(z=yk\), the detection problem can be formulated as a binary hypothesis test between hypothesis \(H_0\) and \(H_1\). Under hypothesis \(H_0\) the camera PRNU is absent, hence the pixel has been tampered, while under hypothesis \(H_1\), PRNU is present, hence the pixel is genuine:
Notice that, since we focus on the detection of forgeries, denoted by the absence of the PRNU, the role of two hypotheses is inverted w.r.t. what is usual. The true and estimated pixel classes will be denoted by \(u_i\) and \(\widehat{u}_i\), both defined in \(\{0,1\}\), while the detection test is based on the normalized correlation index between \(r_{_{W_i}}\) and \(z_{_{W_i}}\), the restrictions of r and z, respectively, to a window \(W_i\) centered on the target pixel:
where \(\odot \) denotes inner product, and the usual definitions hold for mean, norm, and inner product
Pixel labeling is obtained by comparing the decision statistic with a threshold \(\gamma _1\)
To ensure the desired false acceptance rate (FAR), which is a small probability that a tampered pixel is identified as genuine, the threshold is set using the NeymanPearson approach. The pdf of \(\rho \) under hypothesis \(H_0\) is estimated by computing the correlation between the camera PRNU and a large amount of noise residuals coming from other cameras, and using standard density fitting techniques. To obtain reliable estimates, rather large square blocks should be used; a dimension of 128\( \times \) 128 pixels represents a good compromise [14].
Once the desired FAR is fixed, the objective is to minimize the false rejection rate (FRR), which is the probability that a genuine pixel is declared tampered. This is not an easy task, since under hypothesis \(H_1\), the decision statistic is influenced by the image content. In fact, even in the absence of forgery, the correlation might happen to be very low when the image is dark (since y multiplies the PRNU), saturated (because of intensity clipping), or in very textured areas where denoising typically does not perform well and some image content leaks into the noise residual. One possible solution to this problem is to include a “predictor” [14], which based on local images features, such as texture, flatness, and intensity, computes the expected value \(\widehat{\rho }_i\) of the correlation index under hypothesis \(H_1\). When \(\widehat{\rho }_i\) is too low, indicating that, even for a genuine pixel, one could not expect a correlation index much larger than 0, the pixel is labeled as genuine, the less risky decision, irrespective of the value of \(\rho _i\). Therefore, the test becomes
The second threshold \(\gamma _2\) is chosen heuristically by the user and separates, in practice, reliable regions from problematic ones. It is worth underlining that the refined decision test (3.9) can only reduce the false rejection rate but does not increase (actually it might reduce) the probability of detecting an actual forgery. In addition, the choice of the threshold itself is not obvious and can significantly impact the performance. Note also that the final binary map needs some postprocessing operations to remove random errors and better define the shape of the forgery. This is typically done by means of morphological filtering.
2.4 Estimation Through Guided Filtering
As already highlighted in the previous section, a major issue with PRNUbased analysis is the impossibility to perfectly denoise the image. As a consequence, the noise residual contains traces of the image content that increase the false acceptance rates. To address this problem, it is possible to improve the denoising algorithm as done in [15], where waveletbased denoising has been replaced by a nonlocal approach. Another possibility is to rely on the use of guided filtering [17], a strategy that turns out to be especially helpful when small forgeries are present.
In order to better understand this approach, we will elaborate some more on Eq. (3.6) and introduce some simplifications. First of all, we neglect the means (which are typically negligible) and, considering that the terms at the denominator serve only to normalize the correlation, focus on the scalar product on the numerator. Remember that \(z=yk\) is the camera PRNU multiplied pointwise by the input image and, likewise, \(r=hy+n\) is the noise residual, with h the observed PRNU which might or might not coincide with k. Therefore, if we divide all terms pointwise by y, we obtain the quantity
By defining a new noise field \(\eta =nk/y\), and introducing generic weights \(\omega _{ij}\), Eq. (3.10) becomes
This can be interpreted as the linear filtering of the image hk affected by the additive noise \(\eta \). In Eq. (3.10), the weights are all equal to one \(1/W_i\), hence, a simple boxcar filtering is carried out.
Assuming that the whole analysis window is homogeneous, either genuine (\(h=k\)) or forged (\(h \ne k\)) and, for the sake of simplicity, that y is constant over the window, so that \(E[\eta _i]=\sigma ^2_\eta \), we can characterize the random variable \(\tau \) as
where \(\left\langle k^2 \right\rangle \) is the power of the camera PRNU estimated over \(W_i\). In this condition, using uniform weights \(\omega _{ij}=1/W_i\) is indeed optimal, as it minimizes the variance of the estimate, and maximizes the probability of deciding correctly. However, if some of the predictor pixels are not homogeneous with the target, that is, forged instead of genuine or vice versa, the estimate will suffer a systematic bias, namely the means will not be 0 or \(\left\langle k^2 \right\rangle \) anymore, but some intermediate values, heavily affecting the decision performance. In this case, the uniform weights are no more optimal, in general, and one should instead reduce the influence of heterogeneous pixels by associating a small or even null weight with them. This is exactly the problem of smallsize forgeries. By using a large analysis window with fixed weights, we happen to include pixels of different nature, and the decision variable becomes strongly biased and basically useless, even in favorable (bright, smooth, and unsaturated) areas of the image. If we could find and include in the estimation only predictors homogeneous with the target, all biases would disappear, at the cost of an increased estimation variance.
The bias/variance tradeoff is indeed wellknown in the denoising literature. This problem has received a great deal of attention, recently, in the context of nonlocal filtering, where predictor pixels are weighted based on their expected similarity with the target. The similarity, in its turn, is typically computed by comparing patches of pixels centered on the target and the predictor pixels, respectively. This approach cannot work with our noiselike input image, rz, as it lacks the structures necessary to compute a meaningful similarity measure. However, we can take advantage of the original observed image y, using it as a “pilot” to compute similarities, and applying the resulting weights in the actual filtering of the rz field. This basic idea is implemented in [17] by means of guided filtering, a recently proposed technique which implements nonlocal filtering concepts by leveraging heavily on the use of a pilot image associated with the target image [34].
In Fig. 3.4, we show the detection performance, measured in terms of probability of detection \(P_D\) versus probability of false alarm (\(P_{FA}\)), obtained when a square forgery is placed at the center of the image. The performance obtained with the plain boxcar filter (left) and guided filtering (right) is almost the same when large forgeries are considered (128 \(\times \) 128 pixels). However, guided filtering becomes more and more preferable as the forgeries become smaller, up to the limiting case of 48 \(\times \) 48 pixels. This is also clear from the examples shown in Fig. 3.5, where the correlation field shows the ability of guided filtering to detect even very small forgeries, which are completely lost using boxcar filtering.
3 Blind Methods
Blind approaches do rely exclusively on the media asset under analysis and reveal inconsistencies with respect to some welldefined hypotheses. In particular, they look for a number of specific artifacts originated by incamera or outcamera processing (Fig. 3.2). For example, the demosaicing algorithm is typically different for different camera models. Therefore, when a manipulation involves the composition of parts of images acquired from different models, demosaicingrelated spatial anomalies arise. Likewise, the outcamera editing process may introduce a specific correlation or disrupt fingerprintlike cameraspecific patterns. Of course, most of these traces are very subtle and cannot be perceived at a visual inspection. However, once properly emphasized, they represent a precious source of information to establish digital integrity.
For example, most digital cameras use a color filter array (CFA), with a periodic pattern, so that each individual sensor element records light only in a certain range of wavelengths (i.e., red, green, and blue). The missing color information is then interpolated from surrounding pixels, an operation known as demosaicing. This process introduces a subtle periodic correlation pattern in all acquired images. Whenever a manipulation occurs, this periodic pattern is perturbed. In addition, since CFA configuration and interpolation algorithms are specific to each camera model [8, 11], when a region is spliced in a photo taken by another camera model, its periodic pattern will appear anomalous. One of the first methods to exploit these artifacts was proposed by Popescu and Farid [57] back in 2005, based on a simple linear model to capture periodic correlations. Of course, periodic signals produce strong peaks in the Fourier domain. The problem can be also recast in a Bayesian framework, as proposed in [29], obtaining a probability map in output which allows for finegrained localization of image tampering.
In the following, we will describe blind approaches that rely on noise patterns, compression, and editing artifacts.
3.1 Noise Patterns
Instead of focusing on a specific camera artifact, a more general approach is to highlight noise artifacts introduced by the whole acquisition process, irrespective of their specific origin. The analysis of local noise level may help reveal splicings, as shown in [50, 56], because different cameras are characterized by different intrinsic noise.
To define expressive features that are able to capture traces left locally by incamera processing, in [23] the highpass noise residual of the image is used and then cooccurrencebased features are extracted to capture local correlations. These features, known as rich models, are inspired by the work done in steganalysis [30], which pursue a very similar goal, i.e., detecting hidden artifacts in the signal. These features have been used successfully in a supervised learning setting for the detection task of the first IEEE IFSTC Image Forensics Challenge [19, 20]. To form the noise residual image, r, only a linear highpass filter of the third order has been considered of all the models proposed in [30]. In formulas
where x and r are the original image and the noise residual, respectively, and i, j indicate spatial coordinates. The next step is to compute residual cooccurrences along the vertical and horizontal directions. First of all, residuals are quantized, using a very small number of bins to obtain a limited feature length and then truncated as
with q the quantization step and T the truncation value. Cooccurrences are computed on four pixels in a row, that is,
where I(A) is the indicator function of event A, equal to 1 if A holds and 0 otherwise. The homologous columnwise cooccurrences are pooled with the above based on symmetry considerations. A block diagram is presented in Fig. 3.6.
Different from [30], the normalized histograms are passed through a squareroot nonlinearity, to obtain a final feature with unitary L2 norm. In fact, in various contexts, such as texture classification and image categorization, histogram comparison is performed by measures such as \(\chi ^2\) or Hellinger that are found to work better than the Euclidean distance. After square rooting, the Euclidean distance between features is equivalent to the Hellinger distance between the original histograms. We consider two different scenarios for image forgery localization, supervised and unsupervised. In both cases, we will follow an anomaly detection rule, building a model for the hostcamera features based on a fraction of the image under analysis.

Supervised scenario. In this case, the user is required to select a bounding box, which will be subject to the analysis, while the rest of the image is used as a training set. In Fig. 3.7, we show some examples where some specific areas of the images are selected and then analyzed. The analysis is carried out in slidingwindow modality, using blocks of size \(W\times W\), from which the normalized histogram of cooccurrences, \(\mathbf {h}\), is extracted. The N blocks taken from the training area are used to estimate in advance mean \(\boldsymbol{\mu }\) and covariance \(\boldsymbol{\Sigma }\) of the feature vector:
$$\begin{aligned} \boldsymbol{\mu }=&\frac{1}{N} \sum _{n=1}^N \mathbf {h}_n \end{aligned}$$(3.16)$$\begin{aligned} \boldsymbol{\Sigma }=&\frac{1}{N} \sum _{n=1}^N (\mathbf {h}_n\boldsymbol{\mu })(\mathbf {h}_n\boldsymbol{\mu })^T \end{aligned}$$(3.17)Then, for each block of the test area, the associated feature \(\mathbf {h}'\) is extracted, and its Mahalanobis distance w.r.t. the reference feature \(\boldsymbol{\mu }\) is computed
$$\begin{aligned} D(\mathbf {h}',\boldsymbol{\mu };\boldsymbol{\Sigma }) = (\mathbf {h}'\boldsymbol{\mu })^T \boldsymbol{\Sigma }^{1} (\mathbf {h}'\boldsymbol{\mu }) \end{aligned}$$(3.18)Large distances indicate blocks that deviate significantly from the model. In the output map provided to the user, each block is given a color associated with the computed distance. Note that the user may repeat the process several times with different bounding boxes, implying that a meaningful analysis can be conducted even in the absence of any initial guess on the presence and location of a forgery.

Unsupervised scenario. In this case, after the feature extraction phase, carried out on the whole image with unit stride, we rely on an automatic algorithm to jointly compute the model parameters and the twoclass image segmentation and resort to a simple expectationmaximization (EM) clustering.
As input, we need the mixture model of the data, namely the number of classes, their probabilities, \(\pi _0, \pi _1, \ldots \), and the probability model of each class. For us, the number of classes is always fixed to two, corresponding to the genuine area of the image (hypothesis \(H_0\)) and the tampered area (hypothesis \(H_1\)). We will consider two cases for the class models:

1.
both classes are modeled as multivariate Gaussian
$$\begin{aligned} p(\mathbf {h}) = \pi _0 \mathcal {N}(\mathbf {h}\boldsymbol{\mu }_0,\boldsymbol{\Sigma }_0) + \pi _1 \mathcal {N}(\mathbf {h}\boldsymbol{\mu }_1,\boldsymbol{\Sigma }_1) \end{aligned}$$ 
2.
class \(H_0\) is modeled as Gaussian, while class \(H_1\) is modeled as Uniform over the feature domain \(\Omega \),
$$\begin{aligned} p(\mathbf {h}) = \pi _0 \mathcal {N}(\mathbf {h}\boldsymbol{\mu }_0,\boldsymbol{\Sigma }_0) + \pi _1 \alpha _{1} I(\Omega ) \end{aligned}$$
We note explicitly that the Gaussian model is only a handy simplification, lacking more precise information on the feature distribution. The first model is conceived for the case when the forged area is relatively large w.r.t. the whole image. Therefore, the two classes have the same dignity, and can be expected to emerge easily through the EM clustering. The blockwise decision statistic is the ratio between the two Mahalanobis distances.
When the forged region is very small, instead, the intraclass variability, mostly due to image content (e.g., flat vs. textured areas) may become dominant w.r.t. interclass differences, leading to wrong results. Therefore, we consider the GaussianUniform model, which can be expected to deal better with these situations, and in fact has been often considered to account for the presence of outliers, e.g., [58]. Note that, in this case, the decision test reduces to comparing the Mahalanobis distance from the Gaussian model with a threshold \(\lambda \) as already done in [64]. Typically, forgeries are quite small with respect to the dimension of the image and often the latter model gives more satisfying results (some examples are shown in Fig. 3.8). This idea has been extended to videos in [54] where the noise residuals of consecutive frames are analyzed and suitable features are extracted to discover traces of both intraframe and interframe manipulations.

1.
3.2 Compression Artifacts
Exploiting compression artifacts is a very powerful tool in image forensics. Most images are compressed using JPEG coding standard and whenever an image is edited, it will be subjected to a new compression step. An early popular approach is to exploit the socalled block artifact grid (BAG). In fact, because of the blockwise JPEG processing, discontinuities appear along the block boundaries of compressed images, giving rise to a distinctive and easily detected gridlike pattern [26]. In the presence of splicing or copymove manipulations, the BAGs of inserted object and host image typically mismatch, enabling detection [45, 47].
Another common and very effective approach relies on double compression traces. In fact, when a JPEGcompressed image undergoes a local manipulation and is compressed again, double compression artifacts appear all over the image except in the forged region [48]. These artifacts change depending on whether the two compressions are spatially aligned or not [10, 13]. Other methods [32, 44, 55] look for anomalies in the statistical distribution of the original DCT coefficients assumed to comply with the Benford law. More specifically, this empirical law states that the probability distribution of the first digits of DCT coefficients is logarithmic:
If the image is modified, for example, double compressed, it will not follow anymore such distribution. In Fig. 3.9, we show an example of DCT coefficient histogram for a single compressed image and a double compressed one, together with the distribution of the first 14 AC coefficients of the DCT block.
Another approach relies on the socalled JPEG ghosts [27] that arise in the manipulated area when two JPEG compressions use the same quality factor (QF). To highlight ghosts, the target image is compressed at all QFs and analyzed. This approach is also at the basis of the socalled Error Level Analysis (ELA), widely used by practitioners for its simplicity. A further direction is to exploit the modelspecific implementations of the JPEG standard, including customized quantization tables and postprocessing steps [40]. For example, in [1] modelspecific JPEG features have been defined, called JPEG dimples. These artifacts are caused by the specific procedure used when converting real to integer values, e.g., ceil, floor, and rounding operator, and represent a very discriminant clue for images saved in JPEG format.
Exploiting compression artifacts for detecting video manipulation is also possible, but it is much more difficult because of the complexity of the video coding algorithm. Traces of MPEG double compression were first highlighted in the seminal paper by Wang and Farid for detecting frame removal [65]. In fact, the desynchronization caused by removing a group of frames introduces spikes in the Fourier transform of the motion vectors. A successive work by [62] tried to improve the double compression estimation especially in the more challenging scenario when the strength of the second compression increases and proposed a distinctive footprint, based on the variation of the macroblock prediction types in the reencoded Pframes.
3.3 Editing Artifacts
When an image is manipulated, for example, by adding an object, it typically needs several postprocessing steps to fit the new context well. These include geometric transformations, like rotation and scaling, contrast adjustment, and blurring, to smooth the objectbackground boundaries. Therefore, many papers focus on detecting these basic operations as a proxy for possible forgeries. Some methods [42, 56] try to detect traces of resampling, always necessary in the presence of rotation or resizing by exploiting periodic artifacts. Other approaches focus on anomalies on the boundaries of objects when a composition is performed [25] or on blurringrelated inconsistencies [3].
A very common manipulation consists in copymoving image regions to duplicate or hide objects. Of course, the presence of identical regions is a strong hint of forgery, but clones are often modified to disguise traces, and nearidentical natural objects also exist, which complicate the forensic analysis. Studies on copymove detection date back to 2003, with the seminal work of Fridrich et al. [31]. Since then, a large amount of the literature has grown on this topic. Effective and efficient solutions are now available which allow for copymove detection even in the presence of rotation, resizing, and other geometric distortions [18]. The common pipeline for copymoves methods is based on three main steps (see Fig. 3.10):

feature extraction: a suitable feature is computed for each pixel of interest, expressing the image behavior in its neighborhood;

matching: the best matching of each pixel is computed, based on the associated feature;

postprocessing: the offset field, linking pixels with their nearest neighbors, is filtered and processed in order to reduce false alarms.
Some methods [2, 61] extract image keypoints and characterize them by means of suitable local descriptors, such as ScaleInvariant Feature Transform (SIFT), Speeded Up Robust Feature (SURF), Local Binary Pattern (LBP), and other variants of these local features. They are very efficient, but work only for additive forgeries, and not on occlusive ones that typically involve smooth regions. This performance gap is shown in the extensive evaluation carried out in [18] and motivates the importance to work on a blockbased approach that analyzes the whole image. Of course, in this case the major problem is complexity, since all pixels undergo the three phases of feature extraction, matching, and postprocessing. First of all, it is important to use features that are robust to some common forms of distortion in order to deal for example with rotated and/or rescaled duplications. Circular harmonic transforms, such as Zernike moments and polar sine and cosine transforms, are wellsuited to provide rotation invariance [22, 59]. As for scaleinvariance, research has mostly focused on variations of the FourierMellin transform, based on a logpolar sampling.
Besides feature selection, the literature has devoted much attention to the matching step. In fact, an exhaustive search of the best matching (nearest neighbor) feature is prohibitive due to its huge complexity. A significant speedup can be obtained by adopting some approximate nearestneighbor search strategy, like kdtrees or localitysensitive hashing. Nonetheless, computing the nearestneighbor field (NNF) is too slow for the large images generated by today’s cameras. A much better result can be obtained, however, by exploiting the strong regularity exhibited by the NNFs of natural images, where similar offsets are often associated with neighboring pixels, as done in PatchMatch [5], a fast randomized algorithm which finds dense approximate nearest neighbor matches between image patches. The basic algorithm described above finds only a single nearestneighbor, and does not deal with scale changes and rotations, hence in [22] it has been proposed to add firstorder predictors to the zeroorder predictors used in PatchMatch, so as to deal effectively also with linear object deformations. In Fig. 3.11, we show some results of this approach that can effectively deal both with additive manipulations and occlusive ones, typically carried out using inpainting methods.
Extensions to videos have been also proposed both for detection and localization [9, 24], the main issue being complexity, handled in [24] through a multiscale processing and parallel implementation of a 3D version of the modified version of PatchMatch [22].
4 LearningBased Methods with Handcrafted Features
These methods are based on machine learning and need large datasets of pristine and manipulated images. An important step is the definition of suitable features that help to discriminate between pristine and manipulated images, then a classifier is trained on a large number of examples of both types. The choice of the features depends on which type of traces one wants to discover. For example, some features have been devised to detect specific artifacts, especially those generated by double JPEG compression [14, 35, 38].
However, more precious are the universal features, based on suitable image statistics, which allow detecting many types of manipulations. Major efforts have been devoted to finding good statistical models for natural images in order to select the features that guarantee the highest discriminative power. In order to single out statistical fluctuations caused by manipulation operations, it is important to first remove the semantic image content, to be regarded as noise [7]. The pioneering work of Farid and Lyu [28], back in 2003, proved the potential of statisticsbased features extracted from the highpass bands of the Wavelet domain. These features capture subtle variations in the image microtextures and prove effective in many application fields beyond image forensics. Other approaches work on residuals in the DCT domain [36] or in the spatial domain [46, 66]. Particularly effective, again, are the features extracted from the highpass filtered version of the image and that are on the cooccurrence of selected neighbors [30] (see Fig. 3.6).
As an alternative to the twoclass problem, it is also possible to learn only from pristine images and then look for possible anomalies. Since cameras of the same model share proprietary design choices for both hardware and software, they will leave similar marks on the acquired images. Therefore, in [64] it was proposed to extract local descriptors from samemodel noise residuals to build a reference statistical model. Then, at test time, the same descriptors are extracted in slidingwindow modality from the target noise residual and compared with the reference. Strong deviations from the reference statistics suggest the presence of a manipulation.
5 Conclusions
Multimedia forensics has been an active research area for a long time and many approaches have been proposed to detect classic manipulations. PRNUbased methods represent very powerful tools, however, they need a certain amount of data coming from the camera in order to reliably estimate the sensor fingerprint. In addition, it is important to note that the internal pipeline of new cameras is changing, with more sophisticated software and hardware. For example, the introduction of new coding schemes and new shooting modes makes the classic sensor noise estimation less reliable [4] and calls for new ways of detecting the camera traces.
A major appeal of blind methods is that they do not require further data besides those under test. However, methods based on very specific details depend heavily on their statistical model, and mostly fail when the hypotheses do not hold. This happens, for example, when these images are posted on social networks and undergo a global resizing and compression. The final effect is to disrupt some specific clues and impairing sharply the performance of most methods, as shown in [63]. Copymove detectors, instead, are more reliable, even in the presence of postprocessing, but can only detect cloning and some types of inpainting. On the contrary, methods based on noise patterns are quite general, and robust to postprocessing, as they often do not depend on explicit statistical models but look for anomalies in the noise residual. Interestingly, many recent deep learningbased methods rely on these basic concepts [63]. For example, some of them include a constrained first layer that performs highpass filtering of the image, in order to suppress the scene content and allow to work on residuals.
As for machine learningbased methods, they can achieve very good detection results: in the 2013 challenge the accuracy was around 94% [19]. However, performance depends heavily on the alignment between training set and test data. It is very high when training and test sets share the same cameras, same types of manipulation, same processing pipeline, like when a single dataset is split in training and test or crossvalidation is used. As soon as unrelated datasets are used, the performance drops sometimes to random guesses. Lack of robustness limits the applicability of learningbased approaches to very specific scenarios.
Moreover, a skilled attacker, aware of the principles on which forensic tools work, may enact some counterforensic measure on purpose to evade detectors [6, 33]. Therefore, the integration of multiple tools, all designed to detect the same type of attack but under different approaches, may be expected to improve performance, and especially robustness with respect to both casual and malicious disturbances. In support of this hypothesis, it is worth mentioning that the winners of the First IEEE Image Forensics Challenge resorted to the fusion of multiple tools both for the detection and the localization tasks [19, 20] and similar approaches are routinely used also for deep learningbased solutions. More in general, most of the key concepts and problems encountered in the context of AIbased forensics were already present and investigated in classical multimedia forensics, which therefore represents a necessary starting point for new advances.
Notes
 1.
All the operations are intended pixelwise.
References
Agarwal S, Farid H (2017) Photo forensics from JPEG dimples. In: IEEE international workshop on information forensics and security (WIFS), pp 1–6
Amerini I, Ballan L, Caldelli R, Bimbo AD, Serra G (2011) A SIFTbased forensic method for copymove attack detection and transformation recovery. IEEE Trans Inform Forensics Secur 6(3):1099–1110
Bahrami K, Kot A, Li L, Li H (2015) Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inform Forensics Secur 10(5):999–1009
Baracchi D, Iuliani M, Nencini A, Piva A (2020) Facing image source attribution on iPhone X. In: International workshop on digital forensics and watermarking (IWDW), pp 196–207
Barnes C, Shechtman E, Finkelstein A, Goldman DB (2009) PatchMatch: a randomized correspondence algorithm for structural image editing. ACM Trans Graph 28(3)
Barni M, Stamm M, Tondi B (2018) Adversarial multimedia forensics: overview and challenges ahead. In: European signal processing conference (Eusipco), pp 962–966
Bayram S, Avcibaş I, Sankur B, Memon N (2006) Image manipulation detection. J Electron Imaging 15(4):1–17
Bayram S, Sencar H, Memon N, Avcibas I (2005) Source camera identification based on CFA interpolation. In: IEEE international conference on image processing (ICIP), pp III–69
Bestagini P, Milani S, Tagliasacchi M, Tubaro S (2013) Local tampering detection in video sequences. In: IEEE international workshop on multimedia signal processing (MMSP), pp 488–493
Bianchi T, Piva A (2012) Image forgery localization via blockgrained analysis of JPEG artifacts. IEEE Trans Inform Forensics Secur 7(3):1003–1017
Cao H, Kot A (2009) Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans Inform Forensics Secur 4(5):899–910
Chakraborty S, Kirchner M (2017) PRNUbased forgery detection with discriminative random fields. In: International symposium on electronic imaging: media watermarking, security, and forensics
Chen YL, Hsu CT (2011) Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Trans Inform Forensics Secur 6(2):396–406
Chen M, Fridrich J, Goljan M, Lukàš J (2008) Determining image origin and integrity using sensor noise. IEEE Trans Inform Forensics Secur 3(4):74–90
Chierchia G, Parrilli S, Poggi G, Sansone C, Verdoliva L (2010) On the influence of denoising in PRNU based forgery detection. In: ACM workshop on multimedia in forensics, security and intelligence, pp 117–122
Chierchia G, Poggi G, Sansone C, Verdoliva L (2014) A BayesianMRF approach for PRNUbased image forgery detection. IEEE Trans Inform Forensics Secur 9(4):554–567
Chierchia G, Cozzolino D, Poggi G, Sansone C, Verdoliva L (2014) Guided filtering for PRNUbased localization of smallsize image forgeries. In: IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 6231–6235
Christlein V, Riess C, Jordan J, Angelopoulou E (2012) An evaluation of popular copymove forgery detection approaches. IEEE Transactions on Information Forensics and Security 7(6):1841–1854
Cozzolino D, Gragnaniello D, Verdoliva L (2014a) Image forgery detection through residualbased local descriptors and blockmatching. In: IEEE international conference on image processing (ICIP), pp 5297–5301
Cozzolino D, Gragnaniello D, Verdoliva L (2014b) Image forgery localization through the fusion of camerabased, featurebased and pixelbased techniques. In: IEEE international conference on image processing (ICIP), pp 5302–5306
Cozzolino D, Marra F, Poggi G, Sansone C, Verdoliva L (2017) PRNUbased forgery localization in a blind scenario. In: International conference on image analysis and processing (ICIAP), pp 569–579
Cozzolino D, Poggi G, Verdoliva L (2015) Efficient densefield copymove forgery detection. IEEE Trans Inform Forensics Secur 10(11):2284–2297
Cozzolino D, Poggi G, Verdoliva L (2015) Splicebuster: a new blind image splicing detector. In: IEEE international workshop on information forensics and security (WIFS), pp 1–6 (2015)
D’Amiano L, Cozzolino D, Poggi G, Verdoliva L (2019) A PatchMatchbased densefield algorithm for video copymove detection and localization. IEEE Trans Circ Syst Video Technol 29(3):669–682
Dong J, Wang W, Tan T, Shi Y (2006) Runlength and edge statistics based approach for image splicing detection. In: International workshop on digital watermarking, pp 177–187
Fan Z, de Queiroz R (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235
Farid H (2009) Exposing digital forgeries from JPEG Ghosts. IEEE Trans Inform Forensics Secur 4(1):154–160
Farid H, Lyu S (2003) Higherorder wavelet statistics and their application to digital forensics. In: IEEE workshop on statistical analysis in computer vision, pp 1–8
Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via finegrained analysis of CFA artifacts. IEEE Trans Inform Forensics Secur 7(5):1566–1577
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7:868–882
Fridrich J, Soukal D, Lukáš J (2003) Detection of copymove forgery in digital images. In: Proceedings of the 3rd digital forensic research workshop
Fu D, Shi Y, Su W (2007) A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In: Proceedings of SPIE, security, steganography, and watermarking of multimedia contents IX, 65051L
Gloe T, Kirchner M, Winkler A, Böhme R (2007) Can we trust digital image forensics? In: ACM international conference on multimedia, pp 78–86
He K, Sun J, Tang X (2013) Guided image filtering. IEEE Trans Pattern Anal Mach Intell 35(6):1387–1409
He J, Lin Z, Wang L, Tang X (2006) Detecting doctored JPEG images via DCT coefficient analysis. In: European conference on computer vision (ECCV), pp 425–435
He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn 45:4292–4299
Healey G, Kondepudy R (1994) Radiometric CCD camera calibration and noise estimation. IEEE Trans Pattern Anal Mach Intell 16(3):267–276
Jiang X, He P, Sun T, Xie F, Wang S (2018) Detection of double compression with the same coding parameters based on quality degradation mechanism analysis. IEEE Trans Inform Forensics Secur 13(1):170–185
Johnson M, Farid H (2007) Exposing digital forgeries in complex lighting environments. IEEE Trans Inform Forensics Secur 2(3):450–461
Kee E, Johnson M, Farid H (2011) Digital image authentication from JPEG headers. IEEE Trans Inform Forensics Secur 6(3):1066–1075
Kee E, O’Brien J, Farid H (2013) Exposing photo manipulation with inconsistent shadows. ACM Trans Graph 32(3):28–58
Kirchner M (2008) Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. In: 10th ACM workshop on multimedia and security, pp 11–20
Korus P, Huang J (2017) Multiscale analysis strategies in PRNUbased tampering localization. IEEE Trans Inf Forensics Secur 12(4):809–824
Li B, Shi Y, Huang J (2008) Detecting doubly compressed JPEG images by using mode based first digit features. In: IEEE workshop on multimedia signal processing (MMSP), pp 730–735
Li W, Yuan Y, Yu N (2009) Passive detection of doctored JPEG image via block artifact grid extraction. Signal Processing 89(9):1821–1829
Li H, Luo W, Qiu X, Huang J (2018) Identification of various image operations using residualbased features. IEEE Trans Circ Syst Video Technol 28(1):31–45
Lin Z, He J, Tang X, Tang CK (2009) Fast, automatic and finegrained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42(11):2492–2501
Lukáš J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of the 3rd digital forensic research workshop
Lukàš J, Fridrich J, Goljan M (2006) Detecting digital image forgeries using sensor pattern noise. In: Proceedings of SPIE, pp 362–372
Lyu S, Pan X, Zhang X (2014) Exposing region splicing forgeries with blind local noise estimation. Int J Comput Vis 110(2):202–221
Mandelli S, Bestagini P, Tubaro S, Cozzolino D, Verdoliva L (2017) Blind detection and localization of video temporal splicing exploiting sensorbased footprints. In: European signal processing conference (EUSIPCO), pp 1362–1366
Milani S, Fontani M, Bestagini P, Barni M, Piva A, Tagliasacchi M, Tubaro S (2012) An overview on video forensics. APSIPA Trans Signal Inform Process 1
Mondaini N, Caldelli R, Piva A, Barni M, Cappellini V (2017) Detection of malevolent changes in digital video for forensic applications. In: SPIE Security, steganography, and watermarking of multimedia contents IX, pp 300–311
Mullan P, Cozzolino D, Verdoliva L, Riess C (2017) Residualbased forensic comparison of video sequences. In: IEEE international conference on image processing (ICIP), pp 1507–1511
Pasquini C, Boato G, PèrezGonzàlez F (2017) Statistical detection of JPEG traces in digital images in uncompressed formats. IEEE Trans Inform Forensics Secur 12(12):2890–2905
Popescu A, Farid H (2004) Statistical tools for digital forensics. In: International workshop on information hiding, pp 128–147
Popescu A, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959
Popescu A, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767
Ryu SJ, Kirchner M, Lee MJ, Lee HK (2013) Rotation invariant localization of duplicated image regions based on Zernike moments. IEEE Trans Inform Forensics Secur 8(8):1355–1370
Scherhag U, Debiasi L, Rathgeb C, Busch C, Uhl A (2019) Detection of face morphing attacks based on PRNU analysis. IEEE Trans Biometr Behav Identity Sci 1(4):302–317
Silva E, Carvalho T, Ferreira A, Rocha A (2015) Going deeper into copymove forgery detection: Exploring image telltales via multiscale analysis and voting processes. J Visual Commun Image Represent 29:16–32
VázquezPadín D, Fontani M, Bianchi T, Comesana P, Piva A, Barni M (2012) Detection of video double encoding with GOP size estimation. In: IEEE international workshop on information forensics and security (WIFS), pp 151–156
Verdoliva L (2020) Media forensics and deepfakes: an overview. IEEE J Sel Top Signal Process 14(5):910–932
Verdoliva L, Cozzolino D, Poggi G (2014) A featurebased approach for image tampering detection and localization. In: IEEE international workshop on information forensics and security (WIFS), pp 149–154
Wang W, Farid H (2006) Exposing digital forgeries in video by detecting double MPEG compression. In: Workshop on multimedia and security, pp 37–47
Zhao X, Wang S, Li S, Li J, Yuan Q (2013) Image splicing detection based on noncausal Markov model. In: IEEE international conference on image processing (ICIP), pp 4462–4466
Acknowledgements
This material is based on research sponsored by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under agreement number FA87502021004. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of DARPA and AFRL or the U.S. Government. This work is also supported by the PREMIER project, funded by the Italian Ministry of Education, University, and Research within the PRIN 2017 program and by a Google gift.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2022 The Author(s)
About this chapter
Cite this chapter
Cozzolino, D., Verdoliva, L. (2022). Multimedia Forensics Before the Deep Learning Era. In: Rathgeb, C., Tolosana, R., VeraRodriguez, R., Busch, C. (eds) Handbook of Digital Face Manipulation and Detection. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/9783030876647_3
Download citation
DOI: https://doi.org/10.1007/9783030876647_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 9783030876630
Online ISBN: 9783030876647
eBook Packages: Computer ScienceComputer Science (R0)