Abstract
Image forensics is an investigation of digital images to identify manipulations that have been done on them. Nowadays, due to the availability of different low-cost devices for capturing images, digital images are gaining quite a bit of popularity. It occurs frequently that these images are manipulated by mistake or on purpose, resulting in inaccurate information being presented by the image. There is a need to develop techniques to identify forgeries present in digital images used by the media, in court trials, and for maintaining visual records, since digital images are commonly used as evidence through the media, in court, and for maintaining record keeping. A detailed review of various image forgery detection techniques is presented in this article including comparisons between the various methods, pros and cons, and results obtained during the experimentation.
Similar content being viewed by others
References
Aggarwal S, Chand S (2015) Image Forgery Detection using Multi Scale Entropy Filter and Local Phase Quantization. International Journal of Image, Graphics and Signal Processing 8(10):78–85. https://doi.org/10.5815/ijigsp.2015.10.08
Alam S, and Jamil A (2015) Digital Image Authentication and Encryption using Digital Signature 332–336
Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Processing: Image Communication 28(6):659–669. https://doi.org/10.1016/j.image.2013.03.006
Amrutha S, Manuel M (2018) Blur type inconsistency based image tampering detection Proceedings. Int Conf Trends Electron Informat. https://doi.org/10.1109/ICOEI.2017.8300814
Ansari MD, Ghrera SP, Tyagi V (2014) Pixel-based image forgery detection: a review. IETE J Education 55(1):40–46. https://doi.org/10.1080/09747338.2014.921415
Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid LSTM and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300. https://doi.org/10.1109/TIP.2019.2895466
Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695–8718. https://doi.org/10.1007/s11042-015-2786-z
Bianchi, T., Rosa, A. De, and Piva, A. (2011) Improved DCT coefficient analysis for forgery localization in JPEG images 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2444–2447
Boulanger S, Mitchell G, Bouarab K, Marsault É, Cantin A, Frost EH, Déziel E (2009) A compressive-sensing basedwatermarking scheme for sparse image tampering identification. Proc - Int Conf Image Proc 59(12):1265–1268
Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK, Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning. IEEE Comput Soc Conf Comput Vision and Pattern Recognition Workshops. https://doi.org/10.1109/CVPRW.2017.235
Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446. https://doi.org/10.1016/j.patrec.2005.09.006
Chen M, Fridrich J, Goljan M, LukᡠJ (2008) Integrity Using Sensor Noise. IEEE Trans Inf Forensics Secur 3(1):74–90
Chen, Y., and Hsu, C. (2009) Detecting doubly compressed images based on quantization noise model and image restoration. IEEE Internat Workshop Mult Sig Proc 1–6.
Chiang PJ, Khanna N, Mikkilineni AK, Ortiz Segovia MV, Suh S, Allebach JP, Chiu GTC, Delp EJ (2009) Printer and scanner forensics. IEEE Signal Process Mag 26(2):72–83. https://doi.org/10.1109/MSP.2008.931082
Choi KS, Lam EY, Wong KKY (2006) Automatic source camera identification using the intrinsic lens radial distortion. Opt Express 14(24):11551. https://doi.org/10.1364/oe.14.011551
Choi CH, Lee MJ, Lee HK (2010) Scanner identification using spectral noise in the frequency domain. Proc - Int Conf Image Proc, ICIP. https://doi.org/10.1109/ICIP.2010.5652108
Cox, I., ML, M., and JA, B. (2005) Digital Watermarking. Lecture Notes in Computer Science 3744 LNCS
Cozzolino D, Verdoliva L (2018) (2018) Camera-based image forgery localization using convolutional neural networks. Eu Sig Proc Conf 1:1372–1376. https://doi.org/10.23919/EUSIPCO.2018.8553581
Cozzolino D, Verdoliva L (2020) Noiseprint: A CNN-based camera model fingerprint. IEEE Trans Inf Forensics Secur 15(1):144–159. https://doi.org/10.1109/TIFS.2019.2916364
Cozzolino D, Gragnaniello D, Verdoliva L (2014) Image Forgery Localization through the fusion of Camera-based, Feature-based and Pixel-based techniques. IEEE Int Conf Image Proc (ICIP) 2014:5302–5306
De Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, Rocha ADR (2013) Exposing digital image forgeries by illumination color classification. IEEE Trans Inf Forensics Secur 8(7):1182–1194. https://doi.org/10.1109/TIFS.2013.2265677
S Dehnie T Sencar and NM (2006) Digital image forensics for identifying generated and digital camera images. System, 2313–2316.
Diallo B, Urruty T, Bourdon P, Fernandez-Maloigne C (2020) Robust forgery detection for compressed images using CNN supervision. Forensic Sci Int: Rep 2:100112. https://doi.org/10.1016/j.fsir.2020.100112
Dirik AE, Senear HT, Memon N (2008) Digital single lens reflex camera identification from traces of sensor dust. IEEE Trans Inf Forensics Secur 3(3):539–552. https://doi.org/10.1109/TIFS.2008.926987
Dirik AE, Sencar HT, Memon N (2009) Flatbed scanner identification based on dust and scratches over. Comput Eng. https://doi.org/10.1109/ICASSP.2009.4959851
Dirik, A E, and Bayram, S. (2007) New features to identify computer generated images. Computer Engineering 433–436
Dong J, Wang W, Tan T, and Shi YQ (2009) Run-Length and Edge Statistics Based Approach for Image Splicing Detection Berlin Heidelberg
Fang Z, Wang S, Zhang X (2009) Image splicing detection using camera characteristic inconsistency. Int Conf Multimed Inf Net Security, MINES 1:20–24. https://doi.org/10.1109/MINES.2009.208
Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16–25. https://doi.org/10.1109/MSP.2008.931079
Feng X, Gwenael D (2010) JPEG re-compression detection. SPIE Conf Media Foren Security 7541:1–12. https://doi.org/10.1117/12.838888
Ferrara P, Bianchi T, De Rosa A, Piva A (2012) Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf Forensics Secur 7(5):1566–1577. https://doi.org/10.1109/TIFS.2012.2202227
Ferreira WD, Ferreira CBR, da Cruz Júnior G, Soares F (2020) A review of digital image forensics. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2020.106685
Fridrich J (2009) Digital Image Forensics Introducing methods that estimate and detect sensor fingerprint. IEEE Signal Process Mag 26(2):26–37
Fu D, Shi YQ, and Su W (2006) Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions 177–187
Garcia V, Debreuve E, Nielsen F, Barlaud M (2010) K-nearest neighbor search: Fast GPU-based implementations and application to high-dimensional feature matching. Proc - Int Conf Image Proc ICIP. https://doi.org/10.1109/ICIP.2010.5654017
Gou H, Swaminathan A, Wu M (2009) Intrinsic sensor noise features for forensic analysis on scanners and scanned images. IEEE Trans Inf Forensics Secur 4(3):476–491. https://doi.org/10.1109/TIFS.2009.2026458
Guo Z, Zheng H, You C, Xu X, Wu X, Zheng Z, Ju J (2020) Digital forensics of scanned qr code images for printer source identification using bottleneck residual block. Sensors (switzerland) 20(21):1–13. https://doi.org/10.3390/s20216305
Gürbüz E, Ulutas G, Ulutas M (2019) Detection of free-form copy-move forgery on digital images. Security Commun Net. https://doi.org/10.1155/2019/8124521
Hamdy S, El-Messiry H, Roushdy M, Kahlifa E (2010) Quantization Table Estimation in JPEG Images. Internat J Adv Comput Sci Appl. https://doi.org/10.14569/ijacsa.2010.010603
Han, X., and Davis, L. S. (2018). Learning Rich Features for Image Manipulation Detection RPN layer RGB stream input RGB RoI features Bilinear Noise stream input Noise Conv Layers Noise RoI features. Cvpr, 1313–1328
Hsu Y, Chang S (2006) Detecting image splicing using geometry invariants and camera characteristics consistency. IEEE International Conference on Multimedia and Expo 2006:549–552
Hsu YF, Chang SF (2010) Camera response functions for image forensics: An automatic algorithm for splicing detection. IEEE Trans Inf Forensics Secur 5(4):816–825. https://doi.org/10.1109/TIFS.2010.2077628
Hu WC, Chen WH, Huang DY, Yang CY (2012) Novel detection of image forgery for exchanged foreground and background using image watermarking based on alpha matte. Int Conf Genetic Evolut Comput ICGEC 2012:245–248. https://doi.org/10.1109/ICGEC.2012.114
Hu WC, Chen WH, Huang DY, Yang CY (2016) Effective image forgery detection of tampered foreground or background image based on image watermarking and alpha mattes. Multimedia Tools and Applications 75(6):3495–3516. https://doi.org/10.1007/s11042-015-2449-0
Huang H, Guo W, and Zhang Y (2008) Detection of copy-move forgery in digital images using SIFT algorithm https://doi.org/10.1109/PACIIA.2008.240
Huang F, Huang J (2010) Detecting double JPEG compression with the same quantization matrix. IEEE Trans Inf Forensics Secur 5(4):848–856. https://doi.org/10.1039/F19848001757
Iakovidou C, Zampoglou M, Papadopoulos S, Kompatsiaris Y (2018) Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J vis Commun Image Represent 54(1):155–170. https://doi.org/10.1016/j.jvcir.2018.05.011
Isaac MM, Wilscy M (2016) A key point based copy-move forgery detection using HOG features. Proc IEEE Int Conf Circuit, Power Comput Technol ICCPCT. https://doi.org/10.1109/ICCPCT.2016.7530253
James A, Bijolin Edwin E, Anjana MC, Abraham AM, Johnson H (2019) Image Forgery detection on cloud. Int Conf Signal Processing and Communication. https://doi.org/10.1109/ICSPC46172.2019.8976862
Jiang X, Liu Q (2008) Semi-fragile watermarking algorithm for image tampers localization and recovery. J Electron 25(3):343–351. https://doi.org/10.1007/s11767-006-6209-1
Johnson, M. K., and Farid, H. (2007) Exposing Digital Forgeries using Specular Highlights on the Eye 311–325
Johnson MK, Farid H (2006) Exposing digital forgeries through chromatic aberration. Proceedings of the Multimedia and Security Workshop 2006(2):48–55. https://doi.org/10.1145/1161366.1161376
Kashyap A, Parmar RS, Suresh B, Agarwal M, Gupta H (2016) Detection of digital image forgery using wavelet decomposition and outline analysis. Int Conf Signal Proc Commun. https://doi.org/10.1109/ICSPCom.2016.7980573
Kaur H, Jindal N (2020) Image and Video Forensics: A Critical Survey. Wireless Pers Commun 112(2):1281–1302. https://doi.org/10.1007/s11277-020-07102-x
Kee E, Farid H (2010) Exposing digital forgeries from 3-D lighting environments. IEEE Int Workshop Inf Foren Security. https://doi.org/10.1109/WIFS.2010.5711437
Khan S, Ali A (2021) CLIFD A novel image forgery detection technique using digital signatures. J Eng Res (kuwait) 9(1):168–175. https://doi.org/10.36909/JER.V9I1.8379
Khan S, Khan K, Ali F, Kwak KS (2020) Forgery detection and localization of modifications at the pixel level. Symmetry 12(1):1–10. https://doi.org/10.3390/SYM12010137
Khanna N, Delp EJ (2010) Intrinsic signatures for scanned documents forensics: Effect of font shape and size. Nano-Bio Circuit Fabrics and Systems, IEEE International Symposium on Circuits and Systems. https://doi.org/10.1109/ISCAS.2010.5537996
Kim MA, Yoo KS, Lee WH (2011) Digital signature with localization for image authentication. Digest of Technical Papers. https://doi.org/10.1109/ICCE.2011.5722831
Kirchner M (2010) Efficient estimation of CFA pattern configuration in digital camera images. Media Forensics and Security II 7541:754111. https://doi.org/10.1117/12.839102
Koul S, Kumar M, Khurana S, Mushtaq F (2022) An efficient approach for copy-move image forgery detection using convolution neural network. Multimedia Tools and Applications. 81:11259
Kumar G, Bhatia PK (2014) A detailed review of feature extraction in image processing systems. Int Conf Adv Comput Commun Technol, ACCT. https://doi.org/10.1109/ACCT.2014.74
Kumar M, Srivastava S (2019) Image forgery detection based on physics and pixels: a study. Aust J Forensic Sci 51(2):119–134. https://doi.org/10.1080/00450618.2017.1356868
Lee T, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41:3497–3506. https://doi.org/10.1016/j.patcog.2008.05.003
Lee JC, Chang CP, Chen WK (2015) Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci 321:250–262. https://doi.org/10.1016/j.ins.2015.03.009
Li W, Yuan Y, Yu N (2009) Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process 89(9):1821–1829. https://doi.org/10.1016/j.sigpro.2009.03.025
Li H, Luo W, Qiu X, Huang J (2017) Image forgery localization via integrating tampering possibility maps. IEEE Trans Inf Forensics Secur 12(5):1240–1252
Li, G., Wu, Q., and Tu, D. (2007) A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. Multimedia and Expo
Li, Wenxiang, Zhang, T., Zheng, E., and Ping, X. (2010). Identifying photorealistic computer graphics using second-order difference statistics. Proceedings - 2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010, 5(Fskd), 2316–2319 https://doi.org/10.1109/FSKD.2010.5569821
Liang Z, Yang G, Ding X, Li L (2015) An efficient forgery detection algorithm for object removal by exemplar-based image inpainting. J vis Commun Image Represent 30:75–85. https://doi.org/10.1016/j.jvcir.2015.03.004
Lin SD, Wu T (2011) An integrated technique for splicing and copy-move forgery image detection. Proceedings. https://doi.org/10.1109/CISP.2011.6100366
Lin H, Wang C, Kao Y (2009) Fast copy-move forgery detection. WSEAS Transact Sig Proc 5(5):188–197
Lint, Z., Wang, R., Tang, X., and Shum, H.-Y. (2005) Detecting Doctored Images Using Camera Response Normality and Consistency
Liu B, Pun CM, Yuan XC (2014) Digital image forgery detection using JPEG features and local noise discrepancies. Sci World J. https://doi.org/10.1155/2014/230425
Luo, W., Qu, Z., Huang, J., and Qui, G. (2007) A novel method for detecting cropped and recompressed image block
Lv Y, Shen X, Chen H (2011) An improved image blind identification based on inconsistency in light source direction. Journal of Supercomputing 58(1):50–67. https://doi.org/10.1007/s11227-010-0531-y
Lyu S and Farid H (2003) Detecting hidden messages using higher-order 340–354
Mayer O, Stamm MC (2020) Forensic similarity for digital images. IEEE Trans Inf Forensics Secur 15(1):1331–1346. https://doi.org/10.1109/TIFS.2019.2924552
Mehta R, Aggarwal K, Koundal D, Alhudhaif A, Polat K (2021) Markov features based DTCWS algorithm for online image forgery detection using ensemble classifier in the pandemic. Expert Syst Appl 185(July):115630. https://doi.org/10.1016/j.eswa.2021.115630
Moghaddasi Z, Jalab HA, Noor RM (2019) Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients. Neural Comput Appl 31(11):7867–7877. https://doi.org/10.1007/s00521-018-3586-y
Murali S, Chittapur GB, Prabhakara HS (2012) Format based photo forgery image detection. ACM Int Conf Proc Series. https://doi.org/10.1145/2393216.2393292
Mursi MFM, Salama MM, Habeb MH (2017) An improved sift-pca-based copy-move image forgery detection method. Int J Adv Res Comput Sci Electron Eng 6(3):2277–9043
Naampoorthi, V. P., and Sugitha, N. (2016) Digital image forgery -a threaten to digital fornsics 1–6
Ng TT, Chang SF, Tsui MP (2007) Using geometry invariants for camera response function estimation. Proc IEEE Comput Soc Conf Comput Vision Pattern Recognition. https://doi.org/10.1109/CVPR.2007.383000
P, S., and Chadha, R. S. (2014) A survey of digital watermarking techniques and its applications 2013
Pan F, Huang J (2011) Discriminating computer graphics images and natural images using hidden Markov tree model. Lect Notes Comput Sci. https://doi.org/10.1007/978-3-642-18405-5_3
Peng A, Wu Y, Kang X (2017) Revealing traces of image Resampling and Resampling Antiforensics. Advances in Multimedia. https://doi.org/10.1155/2017/7130491
Piva A (2013) An overview on image forensics. ISRN Signal Processing 2013:1–22. https://doi.org/10.1155/2013/496701
Popescu AC, Farid H (2005) Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process 53(10):3948–3959. https://doi.org/10.1109/TSP.2005.855406
Potdar VM, Song H, Elizabeth C (2005) A survey of digital image watermarking techniques. IEEE Int Conf Industrial Informat 2005:709–716. https://doi.org/10.1109/INDIN.2005.1560462
Rad RM, Wong K (2015) Digital image forgery detection by edge analysis. IEEE Int Conf Consumer Electronics. https://doi.org/10.1109/ICCE-TW.2015.7216848
Rajput V, Ansari IA (2020) Image tamper detection and self-recovery using multiple median watermarking. Multimedia Tools and Applications 79(47–48):35519–35535. https://doi.org/10.1007/s11042-019-07971-w
Riess C, Angelopoulou E (2010) Scene Illumination as an Indicator of Image Manipulation. Information Hiding Berlin, Heidelberg
Salloum R, Ren Y, Jay Kuo CC (2018) Image splicing localization using a multi-task fully convolutional network (MFCN). J vis Commun Image Represent 51:201–209. https://doi.org/10.1016/j.jvcir.2018.01.010
Saravanan C (2010) Color image to grayscale image conversion. Int Conf Comput Eng Appl 2:196–199. https://doi.org/10.1109/ICCEA.2010.192
Shang S, Memon N, Kong X (2014) Detecting documents forged by printing and copying. Eurasip Journal on Advances in Signal Processing 2014(1):1–13. https://doi.org/10.1186/1687-6180-2014-140
Sharma V, Jha S and Kumar Bharti R (2016) Image forgery and it’s detection technique: a review. International Research Journal of Engineering and Technology. www.irjet.net
Shi YQ, Xuan G, Zou D, Gao J, Yang C, Zhang Z, Chai P, Chen W, Chen C (2005) Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. IEEE Int Conf Multimedia and Expo, ICME 2005(2005):269–272. https://doi.org/10.1109/ICME.2005.1521412
Singh A, Singh G, Singh K (2018) A Markov based image forgery detection approach by analyzing CFA artifacts. Multimedia Tools and Applications 77(21):28949–28968. https://doi.org/10.1007/s11042-018-6075-5
Sunil K, Jagan D, Shaktidev M (2014) DCT-PCA based method for copy-move forgery detection. Adv Intell Sys Comput 249:577–583. https://doi.org/10.1007/978-3-319-03095-1_62
Sutthiwan P, Shi YQ and Su W (2010) Rake transform and edge statistics for image forgery detection 1463–1468.
Thajeel SA, Sulong G (2014) A survey of copy-move forgery detection techniques. J Theor Appl Inf Technol 70(1):25–35
Thakur T, Singh K, Yadav A (2018) Blind approach for digital image forgery detection. Int J Comput Appl 179(10):34–42. https://doi.org/10.5120/ijca2018916108
Thangavel P, Kumaran T (2007) Fragile watermark for tamper detection using structural distortion measure. IEEE Internat Symposium Indus Electro. https://doi.org/10.1109/ISIE.2007.4374871
Ting, Z., and Rang-Ding, W. (2009) Copy-move forgery detection based on SVD in digital image. Proceedings of the 2009 2nd International Congress on Image and Signal Processing, https://doi.org/10.1109/CISP.2009.5301325
Tsai MJ, Yuadi I (2018) Digital forensics of microscopic images for printed source identification. Multimedia Tools and Applications 77(7):8729–8758. https://doi.org/10.1007/s11042-017-4771-1
Verma V, Singh D, and Khanna N (2020) Block-level Double JPEG Compression Detection for Image Forgery Localization. 1–5. http://arxiv.org/abs/2003.09393
Vinoth S, Gopi ES (2013) Neural network modeling of color array filter for digital forgery detection using kernel LDA. Procedia Technol 10:498–504. https://doi.org/10.1016/j.protcy.2013.12.388
Wang X, Xue J, Zheng Z, Liu Z, Li N (2012) Image forensic signature for content authenticity analysis. J vis Commun Image Represent 23(5):782–797. https://doi.org/10.1016/j.jvcir.2012.03.005
Wo Y, Han G (2008) Image content authentication technique based on Laplacian Pyramid. Front Electr Electron Eng China 3(2):188–193. https://doi.org/10.1007/s11460-008-0046-y
Wu X, Liang X, Liu H, Huang J, Qiu G (2006) Reversible semi-fragile image authentication using zernike moments and integer wavelet transform. Lect Notes Comput Sci. https://doi.org/10.1007/11787952_11
Wu L, Cao X, Zhang W, Wang Y (2012) Detecting image forgeries using metrology. Mach vis Appl 23(2):363–373. https://doi.org/10.1007/s00138-010-0296-6
Wu H, Kong X, Shang S (2015) A printer forensics method using halftone dot arrangement model. IEEE China Summit and Int Conf Signal and Inf Proc. https://doi.org/10.1109/ChinaSIP.2015.7230527
Wu Y, Abdalmageed W, Natarajan P (2019) Mantra-net: Manipulation tracing network for detection and localization of image forgeries with anomalous features. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. https://doi.org/10.1109/CVPR.2019.00977
Yao H, Wang S, Zhao Y, Zhang X (2012) Detecting image forgery using perspective constraints. IEEE Signal Process Lett 19(3):123–126. https://doi.org/10.1109/LSP.2011.2182191
Yao H, Xu M, Qiao T, Wu Y, Zheng N (2020) Image forgery detection and localization via a reliability fusion map. Sensors (switzerland) 20(22):1–18. https://doi.org/10.3390/s20226668
Ye S, Sun Q, Chang EC (2007) Detecting digital image forgeries by measuring inconsistencies of blocking artifact. IEEE Conference on Multimedia and Expo 117543(2):12–15
Ye S, Sun Q, Chang EC (2009) Exposing digital forgeries by detecting inconsistencies in image quality. Multimedia Communication Security: Recent Advances 1:167–196
Yerushalmy I, Hel-Or H (2011) Digital image forgery detection based on lens and sensor aberration. Int J Comput Vision 92(1):71–91. https://doi.org/10.1007/s11263-010-0403-1
Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process 90(12):3026–3036. https://doi.org/10.1016/j.sigpro.2010.04.027
Zhong JL, Pun CM (2020) An end-to-end dense-inceptionnet for image copy-move forgery detection. IEEE Transac Informat Forensic Sec 15:2134–2146. https://doi.org/10.1109/TIFS.2019.2957693
Zhu Y, Li CT, Zhao HJ (2007) Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain. Int Symposium Informat Assurance Sec. https://doi.org/10.1109/IAS.2007.46
Zhuang P, Li H, Tan S, Li B, Huang J (2021) Image tampering localization using a dense fully convolutional network. IEEE Trans Inf Forensics Secur 16:2986–2999. https://doi.org/10.1109/TIFS.2021.3070444
Zou D, Shi YQ, Su W, Xuan G (2006) Steganalysis based on Markov model of thresholded prediction-error image. IEEE Int Conf Multimedia and Expo. https://doi.org/10.1109/ICME.2006.262792
Funding
None.
Author information
Authors and Affiliations
Contributions
GK Writing—original draft, Survey Protocol, Research Gaps, Critical Analysis. NS and MK Survey Protocol, Research Gaps, Critical Analysis, Editing Review and Editing Final Draft.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no Conflict of interest in this work.
Informed consent
All the authors are agreed for this submission.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kaur, G., Singh, N. & Kumar, M. Image forgery techniques: a review. Artif Intell Rev 56, 1577–1625 (2023). https://doi.org/10.1007/s10462-022-10211-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-022-10211-7