1,660
Views
75
CrossRef citations to date
0
Altmetric
Reviews

Copy-move and splicing image forgery detection and localization techniques: a review

, &
Pages 281-307 | Received 07 Aug 2015, Accepted 08 Feb 2016, Published online: 29 Apr 2016

References

  • Kang X, Wei S. Identifying tampered regions using singular value decomposition in digital image forensics. In International conference on computer science and software engineering; 2008; Wuhan, China; 926–930.
  • Mushtaq S, Hussain A. Mir, Digital image forgeries and passive image authentication techniques: a survey. Int J Adv Sci Technol. 2014;73:15–32.
  • Amsberry C. Alterations of photos raise host of legal, ethical issues. Wall Street J. 1989;1:26–89.
  • Pearson H. Image manipulation: CSI: cell biology. Nature. 2005;434:952–953.10.1038/434952a
  • Farid H. Exposing digital forgeries in scientific images. In Proceedings of the 8th workshop on multimedia and security; 2006; Geneva; 29–36.
  • Summers SA, Wahl SC. , ed Multimedia security and forensics authentication of digital images; 2006.
  • Lin S, Wu T. An integrated technique for splicing and copy-move forgery image detection. In International congress on image and signal processing (CISP); 2011; Shenyang, China; 1086–1090.
  • Hsu J, Yu F. Image tampering detection for forensics applications, Citeseer, 2009.
  • Liu G, Wang J, Lian S, Wang Z. A passive image authentication scheme for detecting region-duplication forgery with rotation. J Netw Comput Appl. 2011;34:1557–1565.10.1016/j.jnca.2010.09.001
  • Li X, Jing T, Li X. Image splicing detection based on moment features and Hilbert-Huang Transform. In IEEE international conference on information theory and information security (ICITIS), 2010; Beijing, China; 1127–1130.
  • de Carvalho TJ, Riess C, Angelopoulou E, Pedrini H, de Rezende Rocha A. Exposing digital image forgeries by illumination color classification. IEEE Trans Inform Forensics Secur. 2013;8:1182–1194.10.1109/TIFS.2013.2265677
  • Shabanifard M, Shayesteh M, Akhaee A. Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram. IET Image Process. 2013;7:817–828.10.1049/iet-ipr.2012.0717
  • Hussain M, Saleh SQ, Aboalsamh H, Muhammad G, Bebis G. Comparison between WLD and LBP descriptors for non-intrusive image forgery detection. In IEEE international symposium on innovations in intelligent systems and applications (INISTA); 2014; Alberobello, Italy; 197–204.
  • Muhammad G, Al-Hammadi M, Hussain M, Bebis G. Image forgery detection using steerable pyramid transform and local binary pattern. Mach Vision Appl. 2014;25:985–995.10.1007/s00138-013-0547-4
  • Mushtaq S, Ajaz H. Novel method for image splicing detection. In International conference on advances in computing, communications and informatics (ICACCI); 2014; Delhi, India; 2398–2403.10.1109/ICACCI.2014.6968386
  • Cattaneo G, Roscigno G. A possible pitfall in the experimental analysis of tampering detection algorithms. In International conference on network-based information systems (NBiS); 2014; Salerno, Italy; 279–286
  • Lin Z, Wang R, Tang X, Shum H-Y. Detecting doctored images using camera response normality and consistency. In IEEE conference on computer vision and pattern recognition (CVPR); 2005; San Diego, CA, USA; 1087–1092.
  • Liu L, Yang B, Fieguth P W, Yang Z, Wei Y. BRINT: a binary rotation invariant and noise tolerant texture descriptor. In ICIP; 2013; Melbourne, Australia; 255–259.
  • Muratov O, Dang-Nguyen D-T, Boato G. De Natale FG. Saliency detection as a support for image forensics. In Communications control and signal processing (ISCCSP), 2012 5th international symposium on; 2012; Roma, Italy; 1–5.10.1109/ISCCSP.2012.6217880
  • Zhang Z, Wang G, Bian Y, Yu Z. A novel model for splicing detection. In IEEE 5th international conference on bio-inspired computing: theories and applications (BIC-TA); 2010; Changsha, China; 962–965.
  • Al-Qershi OM, Khoo BE. Passive detection of copy-move forgery in digital images: state-of-the-art. Forensic Sci Int. 2013;231:284–295.10.1016/j.forsciint.2013.05.027
  • Birajdar GK, Mankar VH. Digital image forgery detection using passive techniques: a survey. Digital Invest. 2013;10:226–245.10.1016/j.diin.2013.04.007
  • Ansari MD, Ghrera S, Tyagi V. Pixel-based image forgery detection: a review. IETE J Educ. 2014;55:40–46.10.1080/09747338.2014.921415
  • Huynh T, Huynh K, Le T, Nguyen S. A survey on image forgery detection techniques. In Computing & communication technologies-research, innovation, and vision for the Future (RIVF); 2015; CanTho, Vietnam; 71–76.
  • Fridrich J, Soukal D, Lukáš A. Detection of copy-move forgery in digital images. In Digital forensic research workshop; 2003; Trumansburg, NY, USA: DFRWS.
  • Popescu A, Farid H. Exposing digital forgeries by detecting duplicated image regions. Dartmouth College; Technical Report TR2004-515; Hanover, New Hampshire. 2004.
  • Popescu A, Farid H. Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process. 2005;53:758–767.10.1109/TSP.2004.839932
  • Luo W, Huang J, Qiu G. Robust detection of region-duplication forgery in digital image. In 18th international conference on pattern recognition, (ICPR); Hong Kong; 2006; 746–749.
  • Bashar M K, Noda K, Ohnishi N, Kudo H, Matsumoto T, Takeuchi Y. Wavelet-based multiresolution features for detecting duplications in images. In conference on Machine Vision Applications (MVA); 2007; Tokyo, Japan; 264–267.
  • Bayram S, Sencar H, Memon N. An efficient and robust method for detecting copy-move forgery. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2009; Taipei, Taiwan; 1053–1056.
  • Lin H, Wang C, Kao Y. Fast copy-move forgery detection. WSEAS Trans Signal Process. 2009;5:188–197.
  • Bo X, Junwen W, Guangjie L, Yuewei D. Image copy-move forgery detection based on SURF. In Multimedia information networking and security (MINES), 2010 international conference on;2010; Nanjing, China; 889–892.10.1109/MINES.2010.189
  • Kang L, Cheng X, Li K, Xiao C. Copy-move forgery detection in digital image. In IEEE 3rd international congress on image and signal processing; 2010; Yantai, China; 2419–2421.10.1109/CISP.2010.5648249
  • Davarzani R, Yaghmaie K, Mozaffari S, Tapak M. Copy-move forgery detection using multiresolution local binary patterns. Forensic Sci Int. 2013;231:61–72.10.1016/j.forsciint.2013.04.023
  • Li L, Li S, Zhu H, Chu S, Roddick J, Pan J. An efficient scheme for detecting copy-move forged images by local binary patterns. J Inform Hid Multimedia Signal Process. 2013;4:46–56.
  • Langille A, Gong M. An efficient match-based duplication detection algorithm. In The 3rd Canadian conference on computer and robot vision; 2006; Canada; 64–64.
  • Li G, Wu Q, Tu D, Sun S. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In IEEE international conference on multimedia and expo; 2007; Hanover, Germany; 1750–1753.
  • Zimba M, Xingming S. Detection of image duplicated regions affected by rotation, scaling and translation using block characteristics of DWT coefficients. Int J Digit Content Technol Appl. 2011;5:143–150.
  • Mahdian B, Saic S. Detection of copy–move forgery using a method based on blur moment invariants. Forensic Sci Int. 2007;171:180–189.10.1016/j.forsciint.2006.11.002
  • Lin Z, He J, Tang X, Tang C-K. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognit. 2009;42:2492–2501.10.1016/j.patcog.2009.03.019
  • Ghorbani M, Firouzmand M, Faraahi A. DWT-DCT (QCD) based copy-move image forgery detection. In International conference on systems, signals and image processing (IWSSIP); 2011; London, UK; 1–4.
  • Huang Y, Lu W, Sun W, Long D. Improved DCT-based detection of copy-move forgery in images. Forensic Sci Int. 2011;206:178–184.10.1016/j.forsciint.2010.08.001
  • Zimba M, Xingming S. Fast and robust image cloning detection using block characteristics of DWT coefficients. Int J Digital Cont Technol Appl. 2011;5:359–367.
  • Zhao J, Guo J. Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci Int. 2013;233:158–166.10.1016/j.forsciint.2013.09.013
  • Sunil K, Jagan D, Shaktidev M. DCT-PCA based method for copy-move forgery detection. In 48th annual convention of computer society of India on ICT and critical infrastructure; 2014; Vishakapatnam, India; 577–583.
  • Yang B, Sun X, Chen X, Zhang J, Li X. An efficient forensic method for copy–move forgery detection based on DWT-FWHT. Radioengineering. 2013;22:1098–1105.
  • Muhammad G, Hussain M, Bebis G. Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Invest. 2012;9:49–57.10.1016/j.diin.2012.04.004
  • Huang H, Guo W, Zhang Y. Detection of copy-move forgery in digital images using SIFT algorithm. In Pacific-Asia workshop on computational intelligence and industrial application (PACIIA’08); 2008; Wuhan, China; 272–276.10.1109/PACIIA.2008.240
  • Pan X, Lyu S. Detecting image region duplication using SIFT features. In IEEE international conference on acoustics speech and signal processing (ICASSP); 2010; Texas, USA; 1706–1709.
  • Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G. A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans Inform Forensics Secur. 2011;6(3):1099–1110.10.1109/TIFS.2011.2129512
  • Costanzo A, Amerini I, Caldelli R, Barni M. Forensic analysis of SIFT keypoint removal and injection. IEEE Trans. Inform Forensics Secur. 2014;9:1450–1464.10.1109/TIFS.2014.2337654
  • Zhao J, Zhao W. Passive forensics for region duplication image forgery based on Harris feature points and local binary patterns. Math Prob Eng. 2013;2013:1–12.
  • Kaur A, Sharma R. Optimization of copy-move forgery detection technique. Comput Eng Appl J. 2013;3(4):576–578.
  • Silva E, Carvalho T, Ferreira A, Rocha A. Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Visual Commun Image Represent. 2015;29:16–32.10.1016/j.jvcir.2015.01.016
  • Ryu S, Lee J, Lee H. Detection of copy-rotate-move forgery using zernike moments. In Information hiding; 2010; Alberta, Canada: Springer; 51–65.
  • Zhao Y, Wang S, Zhang X, Yao H. Robust hashing for image authentication using zernike moments and local features. IEEE Trans Inform Forensics Secur. 2013;8:55–63.10.1109/TIFS.2012.2223680
  • Muhammad G, Hussain M. Passive detection of copy–move image forgery using undecimated wavelets and zernike moments. Int Inform Instit (Tokyo) Inform. 2013;16(5):1343–4500.
  • Lee C, Chang P, Chen K. Detection of copy–move image forgery using histogram of orientated gradients. Inform Sci. 2015;321:250–262.
  • Ng T, Chang S. A model for image splicing. In International conference on image processing (ICIP’04); 2004; Singapore; 1169–1172.
  • Farid H. Detecting digital forgeries using bispectral analysis. In AI Lab, Massachusetts Institute of Technology, Tech. Rep. AIM-1657;1999.
  • Ng T-T, Chang S-F, Sun Q. Blind detection of photomontage using higher order statistics. In International Symposium on Circuits and Systems (ISCAS’04); 2004; Vancouver, Canada; V-688-V-691 Vol. 5.
  • Hsu Yu-Feng, Chang S. Camera response functions for image forensics: An automatic algorithm for splicing detection. IEEE Trans Inform Forensics Secur. 2010;5:816–825.10.1109/TIFS.2010.2077628
  • Fang Z, Wang S, Zhang X. Image splicing detection using camera characteristic inconsistency. In International Conference on Multimedia Information Networking and Security (MINES’09); 2009; Hubei, China; 20-24.10.1109/MINES.2009.208
  • Wang W, Dong J, Tan T. Effective image splicing detection based on image chroma. In 16th IEEE International Conference on Image Processing (ICIP); 2009; Cairo, Egypt; 1257–1260.
  • Hsu F, Chang S. Detecting image splicing using geometry invariants and camera characteristics consistency. In IEEE International Conference on Multimedia and Expo; 2006; Seattle, USA; 549–552.
  • Zhao X, Li S, Wang S, Li J, Yang K. Optimal chroma-like channel design for passive color image splicing detection. EURASIP J Adv Signal Process. 2012;2012:1–11.
  • Zhang Z, Zhou Y, Kang J, Ren Y. Study of image splicing detection. In Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues. Springer; 2008; Shanghai, China; 1103–1110.
  • Qu Z, Qiu G, Huang J. Detect digital image splicing with visual cues. In Information Hiding; Berlin: Springer; 2009; 247-261.10.1007/978-3-642-04431-1
  • Bashar M, Noda K, Ohnishi N, Mori K. Exploring duplicated regions in natural images. In IEEE Transactions on Image Processing; 2010.
  • Pan X, Lyu S. Region duplication detection using image feature matching. IEEE Trans Inform Forensics Secur. 2010;5:857–867.10.1109/TIFS.2010.2078506
  • Lynch G, Shih FY, Liao H-Y M An efficient expanding block algorithm for image copy-move forgery detection. Inf Sci. 2013;239:253–265.10.1016/j.ins.2013.03.028
  • Hussain M, Muhammad G, Saleh S Q, Mirza A M, Bebis G. Image forgery detection using multi-resolution Weber local descriptors. IEEE EUROCON; 2013; Zagreb, Croatia; 1570–1577.
  • Wandji ND, Xingming S. Robust detection of copy-move forgery in color images. In International Conference on Image Processing, Computer Vision & Pattern Recognition (IPCV’13); 2013; Las Vegas, Nevada, USA; 492–495.
  • Ketenci S, Ulutas G. Copy-move forgery detection in images via 2D-Fourier transform. In 36th International Conference on Telecommunications and Signal Processing (TSP); 2013; Rome, Italy; 813–816.
  • Amerini I, Ballan L, Caldelli R, Del Bimbo A, Del Tongo L, Serra G. Copy-move forgery detection and localization by means of robust clustering with J-linkage. Signal Process: Image Commun. 2013;28:659–669.
  • Kang X, Stamm MC, Peng A, Liu KR. Robust median filtering forensics using an autoregressive model. IEEE Trans Inform Forensics Secur. 2013;8:1456–1468.10.1109/TIFS.2013.2273394
  • Li L, Li S, Zhu H, Wu X. Detecting copy-move forgery under affine transforms for image forensics. Comput Electr Eng. 2014;40:1951–1962.
  • Hashmi MF, Anand V, Keskar AG. Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia. 2014;9:84–91.10.1016/j.aasri.2014.09.015
  • Chen J, Kang X, Liu Y, Wang ZJ. Median filtering forensics based on convolutional neural networks. IEEE Signal Process Lett. 2015;22:1849–1853.10.1109/LSP.2015.2438008
  • Ng T-T, Chang S-F, Sun Q. A data set of authentic and spliced image blocks. 2004;3:6–9.
  • Dong J, Wang W. CASIA tampered image detection evaluation (TIDE) database, v1. 0 and v2. 0 (2011) [cited 14 Apr 2015]. Available from: http://forensics.idealtest.org
  • Christlein V, Riess C, Jordan J, Riess Corinna. An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inform Forensics Secur. 2012;7:1841–1854.10.1109/TIFS.2012.2218597
  • Schaefer G, Stich M. UCID: an uncompressed color image database. in Electron Im. 2004;2003:472–480.
  • Tralic D, Zupancic I, Grgic S, Grgic M, CoMoFoD – New database for copy-move forgery detection. In ELMAR, 2013 55th International Symposium; 2013; Zadar, Croatia; 49–54.
  • Zhu Z, Luo, P, Wang, X, Tang X. Deep learning identity-preserving face space. In IEEE International Conference on Computer Vision (ICCV); 2013; Santiago, Chile; 113–120.
  • Sun Y, Wang X, Tang X. Deep learning face representation from predicting 10,000 classes. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2014; Columbus, OH, USA; 1891–1898.
  • Xu Y, Mo T, Feng Q, P Zhong, Lai M, Chang E I. Deep learning of feature representation with multiple instance learning for medical image analysis. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2014; Florence, Italy; 1626–1630.
  • Hu J, Lu J, Tan Y-P. Discriminative deep metric learning for face verification in the wild. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR); 2014; Columbus, OH, USA; 1875–1882.
  • Salakhutdinov R, Hinton G E. Deep Boltzmann machines. In International Conference on Artificial Intelligence and Statistics; 2009; Florida, Clearwater; 448–455.
  • Larochelle H, Bengio Y, Louradour J, Lamblin P. Exploring strategies for training deep neural networks. J Mach Learn Res. 2009;10:1–40.
  • Ciresan D C, Meier U, Masci J, Maria Gambardella L, Schmidhuber J. Flexible, high performance convolutional neural networks for image classification. In IJCAI Proceedings-International Joint Conference on Artificial Intelligence; 2011; Barcelona, Spain; 1237–1242.
  • Krizhevsky A, Sutskever I, Hinton G E. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems; 2012;2:1097–1105.
  • Ji S, Xu W, Yang M, Yu K. 3D convolutional neural networks for human action recognition. IEEE Trans Pattern Anal Mach Intell. 2013;35:221–231.10.1109/TPAMI.2012.59
  • Collobert R, Weston J. A unified architecture for natural language processing: Deep neural networks with multitask learning. In Proceedings of the 25th international conference on Machine learning; 2008; Helsiniki, Finland; 160–167.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.