Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Survey on blind image forgery detection

With the mushroom growth of state-of-the-art digital image and video manipulations tools, establishing the authenticity of multimedia content has become a challenging issue. Digital image forensics is an increasingly growing research field that symbolises a never ending struggle against forgery and tampering. This survey attempts to cover the blind techniques that have been proposed for exposing forgeries. This work dwells on the detection techniques for three of the most common forgery types, namely copy/move, splicing and retouching.

References

    1. 1)
      • 76. Hsiao, D.Y., Pei, S.C.: ‘Detecting digital tampering by blur estimation’. First Int. Workshop on Systematic Approaches to Digital Forensic Engineering, 2005, 2005, pp. 264278.
    2. 2)
      • 77. Jing, T., Peng, Y., Zhang, F., Huo, Y.: ‘Blind detection of digital forgeries using detection trace of eclosion’. Proc. Int. Conf. Computational Intelligence and Software Engineering, 11–13 December 2009, CiSE, 2009, pp. 14.
    3. 3)
      • 39. Huang, H., Guo, W., Zhang, Y.: ‘Detection of copy-move forgery in digital images using SIFT algorithm’. Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008. (PACIIA ’08), 2008, vol. 2, pp. 272276.
    4. 4)
      • 59. Kee, E., Farid, H.: ‘Detecting photographic composites of famous people’ (Department of Computer Science, Dartmouth College, 2009) TR2009-656.
    5. 5)
      • 2. Shivakumar, B.L., Baboo, S.S.: ‘Detecting copy-move forgery in digital images: a survey and analysis of current methods’, Global J. Comput. Sci. Technol., 2010, 10, pp. 6165.
    6. 6)
      • 14. Fridrich, J., Soukal, D., Lukàš, J.: ‘Detection of copy-move forgery in digital images’. Digital Forensic Research Workshop, 2003. Available at http://www.ws2.binghamton.edu/fridrich/Research/copymove.pdf.
    7. 7)
      • 72. Liu, Q., Sung, H.A.: ‘A new approach for jpeg resize and image splicing detection’. Proc. First ACM Workshop on Multimedia in Forensics (MiFor ’09), 2009, pp. 4348.
    8. 8)
      • 6. Mahdian, B., Saic, S.: ‘A bibliography on blind methods for identifying image forgery’, Signal Process.: Image Commun., 2010, 25, (6), pp. 389399 (doi: 10.1016/j.image.2010.05.003).
    9. 9)
      • 61. Zhang, Z., Zhou, Y., Kang, J., Ren, Y.: ‘Study of image splicing detection’. Proc. Fourth Int. Conf. on Intelligent Computing: Advanced Intelligent Computing Theories and Applications – with Aspects of Theoretical and Methodological Issues. (ICIC ’08), 2008, pp. 11031110.
    10. 10)
      • 28. Myna, A.N., Venkateshmurthy, M.G., Patil, C.G.: ‘Detection of region duplication forgery in digital images using wavelets and log-polar mapping’. Proc. Int. Conf. on Computational Intelligence and Multimedia Applications (ICCIMA 2007) – volume 03, 2007, pp. 371377.
    11. 11)
      • 44. Christlein, V., Riess, C., Angelopoulou, E.: ‘On rotation invariance in copy-move forgery detection’. Proc. 2010 Second IEEE Workshop on Information Forensics and Security (WIFS), 2010, pp. 16.
    12. 12)
      • 70. Jing, W., Hongbin, Z.: ‘Exposing digital forgeries by detecting traces of image splicing’. Proc. Eighth Int. Conf. Signal Processing (vol. 2 of ICSP 2006). Available at http://www.ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4129006.
    13. 13)
      • 20. Ardizzone, E., Mazzola, G.: ‘Detection of duplicated regions in tampered digital images by bit-plane analysis’. Proc. 15th Int. Conf. on Image Analysis and Processing. (ICIAP ’09), 2009, pp. 893901.
    14. 14)
      • 5. Luo, W., Qu, Z., Feng, P., Huang, J.: ‘A survey of passive technology for digital image forensics’, Front. Comput. Sci. China, 2007, 1, (2), pp. 166179 (doi: 10.1007/s11704-007-0017-0).
    15. 15)
      • 21. Liu, G., Wang, J., Lian, S., Wang, Z.: ‘A passive image authentication scheme for detecting region-duplication forgery with rotation’, J Netw. Comput. Appl., 2011, 34, pp. 15571565 (doi: 10.1016/j.jnca.2010.09.001).
    16. 16)
      • 75. Levin, A., Rav-Acha, A., Lischinski, D.: ‘Spectral matting’. IEEE Conf. on Computer Vision and Pattern Recognition, 2007. (CVPR ’07), 2007, pp. 18.
    17. 17)
      • 38. Ting, Z., Rang-ding, W.: ‘Copy-move forgery detection based on SVD in digital image’. Second Int. Congress on Image and Signal Processing, 2009. (CISP ’09), 2009, pp. 15.
    18. 18)
      • 40. Pan, X., Lyu, S.: ‘Region duplication detection using image feature matching’, IEEE Trans. Inf. Forensics Secur., 2010, 5, (4), pp. 857867 (doi: 10.1109/TIFS.2010.2078506).
    19. 19)
      • 47. Bayram, S., Sencar, H.T., Memon, N.: ‘An efficient and robust method for detecting copy-move forgery’. Proc. IEEE Int. on Conf. Acoustics, Speech and Signal Processing. (ICASSP ’09), 2009, pp. 10531056.
    20. 20)
      • 4. Lanh, T.V., Chong, K.S., Emmanuel, S., Kankanhalli, M.S.: ‘A survey on digital camera image forensic methods’. 2007 IEEE Int. Conf. on Multimedia and Expo, 2007, pp. 1619.
    21. 21)
      • 57. Hsu, Y., Chang, S.: ‘Camera response functions for image forensics: an automatic algorithm for splicing detection’, IEEE Trans. Inf. Forensics Secur., 2010, 5, (4), pp. 816825 (doi: 10.1109/TIFS.2010.2077628).
    22. 22)
      • 32. Khan, S., Kulkarni, A.: ‘Detection of copy-move forgery using multiresolution characteristic of discrete wavelet transform’. Proc. Int. Conf. on Workshop on Emerging Trends in Technology. ICWET ’11, New York, NY, USA, 2011, pp. 127131.
    23. 23)
      • 63. Ng, T.T., Chang, S.: ‘A model for image splicing’. 2004 Int. Conf. on Image Processing, 2004. (ICIP ’04), 2004, vol. 2, pp. 11691172.
    24. 24)
      • 42. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: ‘A SIFT-based forensic method for copy–move attack detection and transformation recovery’, IEEE Trans. Inf. Forensics Secur., 2011, 6, (3), pp. 10991110 (doi: 10.1109/TIFS.2011.2129512).
    25. 25)
      • 31. Khan, S., Kulkarni, A.: ‘Robust method for detection of copy-move forgery in digital images’. 2010 Int. Conf. on Signal and Image Processing (ICSIP), 2010, pp. 6973.
    26. 26)
      • 43. Ryu, S., Lee, M., Lee, H.: ‘Detection of copy-rotate-move forgery using zernike moments’. Information Hiding. 2010, pp. 5165.
    27. 27)
      • 11. Ng, T.T., Chang, S.F., Lin, C.Y., Sun, Q.: ‘Passive-blind image forensics’. Zeng, W., Yu, H., Lin, C.Y., (Eds.), ‘Multimedia security technologies for digital rights management’ (Academic Press, 2006) pp. 383412.
    28. 28)
      • 33. Popescu, A.C., Farid, H.: ‘Exposing digital forgeries by detecting duplicated image regions’ (Dartmouth College, Computer Science, Hanover, NH, 2004) TR2004-515.
    29. 29)
      • 13. Popescu, A.C., Farid, H.: ‘Exposing digital forgeries in color filter array interpolated images’, IEEE Trans. Signal Process., 2005, 53, (10), pp. 39483959 (doi: 10.1109/TSP.2005.855406).
    30. 30)
      • 18. Poisel, R., Tjoa, S.: ‘Forensics investigations of multimedia data: a review of the state-of-the-art’. 2011 Sixth Int. Conf. on IT Security Incident Management and IT Forensics (IMF), 2011, pp. 4861.
    31. 31)
      • 81. Avcibas, I., Bayram, S., Memon, N., Ramkumar, M., Sankur, B.: ‘A classifier design for detecting image manipulations’. Proc. IEEE Int. Conf. on Image Processing, 2004, pp. 26452648.
    32. 32)
      • 3. Granty, R.E.J., Aditya, T.S., Madhu, S.S.: ‘Survey on passive methods of image tampering detection’. 2010 Int. Conf. on Communication and Computational Intelligence (INCOCCI), 2010, pp. 431436.
    33. 33)
      • 48. Peng, F., Nie, Y., Long, M.: ‘A complete passive blind image copy-move forensics scheme based on compound statistics features’, Forensic Sci. Int., 2012, 212, pp. e21e25 (doi: 10.1016/j.forsciint.2011.06.011).
    34. 34)
      • 69. Dong, J., Wang, W., Tan, T., Shi, Y.Q.: ‘Digital watermarking’ (Springer-Verlag, Berlin, Heidelberg, 2009) pp. 7687.
    35. 35)
      • 46. Bo, W., Xianwei, K.: ‘Exposing copy-paste-blur forgeries based on color coherence’, Chin. J. Electron., 2009, 18, (03), pp. 487490.
    36. 36)
      • 64. Ng, T.T., Chang, S., Sun, Q.: ‘Blind detection of photomontage using higher order statistics’. Proc. 2004 Int. Symp. on Circuits and Systems, 2004. (ISCAS ’04), 2004, vol. 5, pp. V-688V-691.
    37. 37)
      • 51. Lin, G., Chang, M., Chen, Y.: ‘A passive-blind forgery detection scheme based on content-adaptive quantization table estimation’, IEEE Trans. Circuits Syst. Video Technol., 2011, 21, (4), pp. 421434 (doi: 10.1109/TCSVT.2011.2125370).
    38. 38)
      • 41. Pan, X., Lyu, S.: ‘Detecting image region duplication using SIFT features’. 2010 IEEE Int. Conf. on Acoustics Speech and Signal Processing (ICASSP), 2010, pp. 17061709.
    39. 39)
      • 84. Stamm, M.C., Liu, K.J.R.: ‘Forensic estimation and reconstruction of a contrast enhancement mapping’. Proc. IEEE Int. Conf. Acoustics Speech and Signal Processing (ICASSP), 2010, pp. 16981701.
    40. 40)
      • 7. Zhang, Z., Ren, Y., Ping, X.J., He, Z.Y., Zhang, S.Z.: ‘A survey on passive-blind image forgery by doctor method detection’. Proc. Seventh Int. Conf. on Machine Learning and Cybernetics, 2008, pp. 34633467.
    41. 41)
      • 50. Bo, X., Junwen, W., Guangjie, L., Yuewei, D.: ‘Image copy-move forgery detection based on SURF’. 2010 Int. Conf. on Multimedia Information Networking and Security (MINES), 2010, pp. 889892.
    42. 42)
      • 58. Johnson, M.K., Farid, H.: ‘Detecting photographic composites of people’. Shi, Y.Q., Kim, H.J., Katzenbeisser, S., (Eds.), ‘Digital watermarking’ (Springer, Guangzhou, China, 2008), (LNCS Vol. 5041) pp. 1933.
    43. 43)
      • 52. Fang, Z., Wang, S., Zhang, X.: ‘Image splicing detection using color edge inconsistency’. 2010 Int. Conf. on Multimedia Information Networking and Security (MINES), 2010, pp. 923926.
    44. 44)
      • 23. Lin, H., Wang, C., Kao, Y.: ‘An efficient method for copy-move forgery detection’. Proc. Eighth WSEAS Int. Conf. on Applied Computer and Applied Computational Science, 2009, pp. 250253.
    45. 45)
      • 62. Math, S., Tripathi, R.C.: ‘Image quality feature based detection algorithm for forgery in images’, Int. J. Comput. Graph. Animat., 2011, 01, (01), pp. 1321.
    46. 46)
      • 86. Cao, G., Zhao, Y., Ni, R.: ‘Forensic estimation of gamma correction in digital images’. Proc. 17th IEEE Int. Conf. on Image Processing, (ICIP'2010), 2010, pp. 20972100.
    47. 47)
      • 87. Wei, L.X., Zhu, J., Yang, X.: ‘An image forensics algorithm for blur detection based on properties of sharp edge points’, Adv. Mater. Res., 2012, 341–342, pp. 743747 (doi: 10.4028/www.scientific.net/AMR.341-342.743).
    48. 48)
      • 19. Luo, W., Huang, J., Qiu, G.: ‘Robust detection of region-duplication forgery in digital image’. 18th Int. Conf. on Pattern Recognition, 2006. (ICPR 2006), 2006, vol. 4, pp. 746749.
    49. 49)
      • 26. Mahdian, B., Saic, S.: ‘Detection of copy-move forgery using a method based on blur moment invariants’, Forensic Sci. Int., 2007, 171, (2–3), pp. 180189 (doi: 10.1016/j.forsciint.2006.11.002).
    50. 50)
      • 83. Stamm, M.C., Liu, K.J.R.: ‘Blind forensics of contrast enhancement in digital images’. Proc. 15th IEEE Int. Conf. Image Processing 2008, (ICIP'2008), 2008, pp. 31123115.
    51. 51)
      • 15. Bayram, S., Sencar, H.T., Memon, N.: ‘A survey of copy-move forgery detection techniques’. IEEE Western New York Image Processing Workshop, 2008. Available at http://www.cs.dartmouth.edu/farid/dfd/index.php/publications/show/219.
    52. 52)
      • 34. Muhammad, G., Bebis, G.: ‘Blind copy move image forgery detection using dyadic undecimated wavelet transform’. Proc. Int. Conf. on Signal and Image Processing, 2010, Available at http://www.cse.unr.edu/~bebis/DSP11.pdf.
    53. 53)
      • 80. Boato, G., Natale, F.G.B.D., Zontone, P.: ‘How digital forensics may help assessing the perceptual impact of image formation and manipulation’. Proc. Fifth Int. Workshop on Video Processing and Quality Metrics for Consumer Electronics – VPQM 2010, 2010. Available at http://www.enpub.fulton.asu.edu/resp/vpqm/vpqm10/Proceedings_VPQM2010/vpqm_p56.pdf.
    54. 54)
      • 8. Shaid, S.Z.M.: ‘Estimating optimal block size of copy-move attack detection on highly textured image’. Thesis Submitted to the University of Technology, Malaysia, 2009. Available at http://www.csc.fsksm.utm.my/syed/images/files/publications/thesis/estimating_ optimal_block_size_for_copy-move_attack_detection_on_highly_textured_image.pdf.
    55. 55)
      • 30. Khan, S., Kulkarni, A.: ‘An efficient method for detection of copy-move forgery using discrete wavelet transform’, Int. J. Comput. Sci. Eng., 2010, 02, (05), pp. 18011806.
    56. 56)
      • 71. He, Z., Sun, W., Lu, W., Lu, H.: ‘Digital image splicing detection based on approximate run length’, Pattern Recognit. Lett., 2011, 32, (12), pp. 15911597 (doi: 10.1016/j.patrec.2011.05.013).
    57. 57)
      • 1. Mahdian, B., Saic, S.: ‘Blind methods for detecting image fakery’, IEEE Aerosp. Electron. Syst. Mag., 2010, 25, (4), pp. 1824 (doi: 10.1109/MAES.2010.5467652).
    58. 58)
      • 55. Hsu, Y., Chang, S.: ‘Image splicing detection using camera response function consistency and automatic segmentation’. 2007 IEEE Int. Conf. on Multimedia and Expo, 2007, pp. 2831.
    59. 59)
      • 82. Li, X.F., Shen, X.J., Chen, H.P.: ‘Blind identification algorithm for the retouched images based on bi-Laplacian’, J. Comput. Appl., 2011, 31, pp. 239242.
    60. 60)
      • 68. Chennamma, H.R., Rangarajan, L.: ‘Image splicing detection using inherent lens radial distortion’, IJCSI Int. J. Comput. Sci. Issues, 2011, 7, pp. 149158.
    61. 61)
      • 49. Wang, J., Liu, G., Li, H., Dai, Y., Wang, Z.: ‘Detection of image region duplication forgery using model with circle block’. Int. Conf. on Multimedia Information Networking and Security, 2009. (MINES ’09), 2009, vol. 1, pp. 2529.
    62. 62)
      • 85. Stamm, M., Liu, K.J.R.: ‘Forensic detection of image manipulation using statistical intrinsic fingerprints’, IEEE Trans. Inf. Forensics Secur., 2010, 5, (3), pp. 492506 (doi: 10.1109/TIFS.2010.2053202).
    63. 63)
      • 65. Johnson, M., Farid, H.: ‘Exposing digital forgeries by detecting inconsistencies in lighting’. Proc. Seventh Workshop on Multimedia and Security. (MM&Sec ’05), 2005, pp. 110.
    64. 64)
      • 78. Ying, C., Yuping, W.: ‘Exposing digital forgeries by detecting traces of smoothing’. The Ninth Int. Conf. Young Computer Scientists. (ICYCS 2008), 2008, pp. 14401445.
    65. 65)
      • 29. Zhang, J., Feng, Z., Su, Y.: ‘A new approach for detecting copy-move forgery in digital images’. 11th IEEE Singapore Int. Conf. on Communication Systems, 2008, 2008, pp. 362366.
    66. 66)
      • 37. Yang, Q., Huang, C.: ‘Copy-move forgery detection in digital image’. Proc. 10th Pacific Rim Conf. Multimedia: Advances in Multimedia Information Processing. (PCM'09), 2009, pp. 816825.
    67. 67)
      • 67. Wang, W., Dong, J., Tan, T.: ‘Effective image splicing detection based on image chroma’. 2009 16th IEEE Int. Conf. on Image Processing (ICIP), 2009, pp. 12571260.
    68. 68)
      • 45. Zimba, M., Xingming, S.: ‘Detection of image duplicated regions affected by rotation, scaling and translation using block characteristics of DWT coefficients’, Int. J. Digit. Content Technol. Appl., 2011, 5, (11), pp. 143150 (doi: 10.4156/jdcta.vol5.issue11.18).
    69. 69)
      • 12. Zhou, Z., Zhang, X.: ‘Image splicing detection based on image quality and analysis of variance’. 2010 Second Int. Conf. on Education Technology and Computer (ICETC), 2001, vol. 4, pp. V4-242V4-246.
    70. 70)
      • 17. Farid, H.: ‘Image forgery detection: a survey. Signal processing magazine’, IEEE, 2009, 26, (2), pp. 1625.
    71. 71)
      • 24. Cao, Y., Gao, T., Fan, L., Yang, Q.: ‘A robust detection algorithm for copy-move forgery in digital images’, Forensic Sci. Int., 2012, 214, (1–3), pp. 33–43 (doi: 10.1016/j.forsciint.2011.07.015).
    72. 72)
      • 35. Zimba, M., Xingming, S.: ‘DWT-PCA (EVD) based copy-move image forgery detection’, Int. J. Digit. Content Technol. Appl., 2011, 5, (1), pp. 251258 (doi: 10.4156/jdcta.vol5.issue1.27).
    73. 73)
      • 66. Chen, W., Shi, Y.Q., Su, W.: ‘Image splicing detection using 2-D phase congruency and statistical moments of characteristic function’. Proc. SPIE 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 – February 1, 2007, 2007, pp. 65050R65050R-8. Available at http://www.dx.doi.org/10.1117/12.704321.
    74. 74)
      • 22. Sekeh, M.A., Marof, M.A., Rohani, M.F., Motiei, M.: ‘Sequential straightforward clustering for local image block matching’, World Acad. Sci. Eng. Technol., 2011, 50, pp. 774778.
    75. 75)
      • 73. Sun, S., Wu, Q., Li, G.: ‘Detection of image compositing based on a statistical model for natural images’, Acta Autom. Sin., 2010, 35, pp. 15641567 (doi: 10.3724/SP.J.1004.2009.01564).
    76. 76)
      • 54. Li, X., Jing, T., Li, X.H.: ‘Image splicing detection based on moment features and Hilbert-Huang transform’. 2010 IEEE Int. Conf. on Information Theory and Information Security (ICITIS), 2010, pp. 11271130.
    77. 77)
      • 25. Shih, F.Y., Yuan, Y.: ‘A comparison study on copy-cover image forgery detection’, Open Artif. Intell. J., 2010, 4, pp. 4954 (doi: 10.2174/1874061801004010049).
    78. 78)
      • 36. Li, G., Wu, Q., Tu, D., Sun, S.: ‘A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD’. 2007 IEEE Int. Conf. on Multimedia and Expo, 2007, pp. 17501753.
    79. 79)
      • 79. Mahdian, B., Saic, S.: ‘Using noise inconsistencies for blind image forensics’, Image Vis. Comput., 2009, 27, (10), pp. 14971503. Special Section: Computer Vision Methods for Ambient Intelligence (doi: 10.1016/j.imavis.2009.02.001).
    80. 80)
      • 56. Hsu, Y., Chang, S.: ‘Detecting image splicing using geometry invariants and camera characteristics consistency’. 2006 IEEE Int. Conf. Multimedia and Expo, 2006, pp. 549552.
    81. 81)
      • 27. Daubechies, I.: ‘Ten lectures on wavelets’ (SIAM, Philadelphia, PA, 1992).
    82. 82)
      • 74. Kakar, P., Natarajan, S., Ser, W.: ‘Detecting digital image forgeries through inconsistent motion blur’. 2010 IEEE Int. Conf. on Multimedia and Expo (ICME), 2010, pp. 486491.
    83. 83)
      • 53. Farid, H.: ‘A picture tells a thousand lies’, New Sci., 2003, 179, (2411), pp. 3841.
    84. 84)
      • 9. Farid, H.: ‘Digital doctoring: how to tell the real from the fake’, Significance, 2006, 3, (4), pp. 162166 (doi: 10.1111/j.1740-9713.2006.00197.x).
    85. 85)
      • 60. Qu, Z., Qiu, G., Huang, J.: ‘Detect digital image splicing with visual cues’ (Springer-Verlag, Berlin, Heidelberg, 2009) pp. 247261.
    86. 86)
      • 10. Krawtez, N.: ‘A pictures worth digital image analysis and forensics’. Black Hat Briefings, 2007, pp. 131. Available at www.hackerfactor.com/papers/bh-usa-07-krawetz-wp.pdf..
    87. 87)
      • 16. Christlein, V., Riess, C., Angelopoulou, E.: ‘A study on features for the detection of copy-move forgeries’. Sicherheit, 2010, pp. 105116.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2012.0388
Loading

Related content

content/journals/10.1049/iet-ipr.2012.0388
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address