395
Views
19
CrossRef citations to date
0
Altmetric
Review

Image forgery detection based on physics and pixels: a study

&
Pages 119-134 | Received 06 Mar 2017, Accepted 13 Jul 2017, Published online: 03 Aug 2017

References

  • Mushtaq S, Mir AH. Digital image forgeriess and passive image authentication techniques: a survey. Int J Adv Sci Technol. 2014;73(02):15–32.10.14257/ijast
  • Dilshad M, Ghrera S, Tyagi V. Pixel based image forgery detection: a review. IETE J Edu. 2014;55(1):40–44.
  • Farid H. Image forgery detection. IEEE Signal Process Mag. 2009;26(2):16–25.10.1109/MSP.2008.931079
  • Patil C. Detection of region duplication forgery in digital images using wavelet and log polar mapping. In International conference on Computational Intelligence and multimedia applications; Sivakasi, Tamil Nadu, India; 2007.
  • Mire AV, Dhok S, Mistry N, Porey P. Catalogue of digital image forgery detection techniques, an overview. In Proceedings of International Conference on Advances in Information technology and Mobile Communication, Elsevier-2013; 2013.
  • Bayram S, Taha Sencar H, Memon N. An efficient and robust method for detecting copy-move forgery. IEEE International Conference on Acoustics, Speech and Signal Processing; Taipei; 2009. p. 1053–1056. doi:10.1109/ICASSP.2009.4959768
  • Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop; Cleveland; 2003. p. 55–61.
  • Popescu A, Farid H. “Exposing digital forgeries by detecting duplicated image regions”, Technical Report TR 2004–515. Dartmouth College: Dept. of Computer Science; 2004.
  • Myna MVCPA. Detection of region duplication forgery in digital images using wavelets and polar coordinates. In Proc. of Int. conf. on Computational Intelligence and Multimedia Applications ICCIMA; 2007; 371–377.
  • Lin H, Wang C, Kao Y. An efficient method for copy move forgery detection. In The Eighth WSEAS International conference on Applied Computer and Applied Computational science; 2009; 250–253.
  • Muhammed G, Hussain M, Bebis G. Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Invest. 2012;9:253–256.
  • Zhao J, Guo J. Passive forensics for copy move image forgery using a method based on DCT and SVD. Forensic Sci Int. 2013;233:158–166.10.1016/j.forsciint.2013.09.013
  • Liu B, Pun C-M. A SIFT and local features based integrated method for copy move attack detection in digital images. In IEEE Int. Conf. on Information and Automation; Yinchuan, china; Aug. 2013.
  • Kumar S, Desai JV, Mukherjee S. A fast keypoint based hybrid method for copy move forgery detection. Int J Comput Digital Syst. Apr. 2015;4(2):91–98.10.12785/ijcds/040203
  • Warbhe dada A, Dharaskar R, Thakare V. A survey on keypoint based copy-paste forgery detection techniques. Procedia Comput Sci. 2016;78:61–67.
  • Bashar M, Noda K, Ohnishi N, Mori K. Exploring duplicated regions in natural images. IEEE Transaction on Image Processing. 2010;99:1. doi:10.1109/TIP.2010.2046599
  • Liu G, Wang J, Lian S, Wang Z. A passive image authentication scheme for detecting region duplication forgery with rotation. J Netw Comput App. 2011;34:1557–1565.10.1016/j.jnca.2010.09.001
  • Lynch G, Shih F, Liao HM. An efficient expending block algorithm for image copy move forgery detection. Inf Sci. 2013;239:253–265.10.1016/j.ins.2013.03.028
  • Krichner M. Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue. ACM Multimedia Secur Workshop. 2006;11–20. doi:10.1145/1411328.1411333
  • Mahdian B, Saic S. Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensics Secur. 2008;3(3):529–538.10.1109/TIFS.2004.924603
  • Gallagher AC. Detection of linear and cubic interpolation in mpeg compressed images. In Proc. 2nd Canadian conf. Computer and Robust Vision; Canada; 2005.
  • Prasad S, Ramakrishnan K. On resampling detection and its application to image tampering. In Proc. IEEE Int. Conf. Multimedia and Exposition; Toronto, Canada; 2006.
  • Weimin W, Shuozhong W, Zhenjun T. Estimation of rescaling factor and detection of image splicing. In 11th IEEE Int. conf. on Communication Technology; Hangzhou, China; 2008.
  • Xunyu P, Siwei L. Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur. 2011;5(4):857–867.
  • Farid H. Image forgery detection: a survey. IEEE Signal Process Mag. 2009;26(2):16–25.10.1109/MSP.2008.931079
  • Farid H. www.cs.dartmouth.edu 6. [Online]. [Cited 2016 Jan 21]. Available from: www.cs.dartmouth.edu
  • Popescu, Farid H. Exposing digital forgeries by detecting traces of re-sampling. IEEE Trans Signal Process. 2005;53(2):758–767.10.1109/TSP.2004.839932
  • Kirchner M. On resampling detection in re-compressed images. IEEE Workshop Inf Forensics Secur. Dec 2009:21–25. doi:10.1109/WIFS.2009.5386489
  • Nataraj L, Sarkar A, Manjunath BS. Adding Gaussian noise to ‘denoise’ JPEG for detecting image resizing. 2009 16th IEEE International Conference on Image Processing (ICIP); Cairo; 2009. p. 1493–1496. doi: 10.1109/ICIP.2009.5414609
  • Feng X, Cox I, Doerr G. Normalized energy density-based forensic detection of resampled images. IEEE Trans Multimedia. 2012;14(3):536–545.10.1109/TMM.2012.2191946
  • Subhatra P, Baskar A, Kumar D. Detecting image forgeries using resampling by automatic region of interest. ICTACT J Image Video Process. May 2014;16(2):10–13.
  • Farid H. Detecting digital forgeries using bispectral analysis. Cambridge, MA: Massachusetts Institute of Technology; 1999.
  • Ng T, Chang S. A model for splicing. IEEE Int Conf Image Process, Singapore. 2004;2:1169–1172.
  • Popescu A, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Trans Signal Process. 2005;53(10):3948–3959.10.1109/TSP.2005.855406
  • Ferrara P, Bianchi T, Rosa D, Piva A. Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans Inf Forensics Sec. 2012;7(5): 1566–1577.10.1109/TIFS.2012.2202227
  • Johnson M, Farid H. Exposing digital forgeries through chromatic aberration. In Proc. of Multimedia and Security Workshop; 2006; 48–55.
  • Chennamma H, Rangarajan L. Image splicing detection using inherent lens radial distortion. Int J Comput Sci Issues. 2011;7:149–158.
  • Li H, Zheng J. Blind detection of digital forgery image based on the edge width. Intell Sci Intell Data Eng Sci. 2012;7202:546–553.10.1007/978-3-642-31919-8
  • Ng T, Chang S, Sun Q. Blind detection of photomontage using higher order statistics. In Proc. IEEE International Symposium on Circuits and Systems; 2004; 688–691.
  • Fu D, Shi Y, Su W. Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In Proc. of International Workshop on Digital watermarking; 2006; 177–187.
  • Chen W, Shi Y, Su W. Image splicing detection using 2D phase congruency and statistical moments of characteristic function. In Proc. of SPIE Electronics Imaging: Security, Steganography and watermarking of Multimedia Contents; 2007.
  • Zhang W, Cao X, Qu Y, Hou Y, Zhao H, Zhang C. Detecting and extracting the photo composites using planar homography and graph cut. IEEE Trans Inf Forensic Secur. 2010;5(3):544–555.
  • Zhenhua Q, Guooing Q, Jiwu H. Detect digital image splicing with visual cues. In The proc. International workshop on Information Hiding; 2009; 247–261.
  • Zhao X, Li J, Li S, Wang S. Detecting digital image splicing in chroma spaces. In Proc. International Workshop on Digital Watermarking; 2010; 12–22.
  • Youseph SN, Cherian RR. Pixel and edge based illuminant color estimation for image forgery detection. Elsevier, Int. Conf. on Information and Communication Technologies; 2014; 1635–1642.
  • Moghaddasi Z, Jalab H, Noor R. SVD based image splicing detection. IEEE Int. Conf. on Information Technology and multimedia; 2014; 27–30.
  • Behrami K, Kot A, Leida L, Haoliang L. Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inf Forensics Secur. Jan 2015;10(5):999–1009.10.1109/TIFS.2015.2394231
  • Baharami K, Alex C, Leida L, Haoling L. Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inf Forensics Secur. 2015;10: 999–1009.
  • Johnson M, Farid H. Exposing digital forgeries by detecting Inconsistencies in Lighting. In Proc. ACM Multimedia and Security Workshop; 2005; 1–10.
  • Mahdian B, Saic S. A bibliography on blind methods for identifying image forgery. Elsevier, Signal Processing: Image Communication; 2010; 389–399.
  • Eklundh PAJ. Automatic estimation of the projected light source direction. In Proc. of IEEE Computer Society Conference on Computer Vision and Pattern recognition; 2001.
  • Johnson M, Farid H. Exposing digital forgery through specular highlights on the eyes. In Proc. 9th international conference on Information hiding; Saint Malo, France. 2007. p. 311–325, ISBN: 3-540-77369-X, 978-3-540-77369-6.10.1007/978-3-540-77370-2
  • Johnson MK. Exposing digital forgeries through specular highlights on the eye. US: Dartmouth College; 2008.
  • Johnson M, Farid. Exposing digital forgeries in complex lighting environments. IEEE Trans. Inf Forensics Secur. 2007;3(2):450–461.10.1109/TIFS.2007.903848
  • Kee E, Farid H. Exposing digital forgeries from 3-D lighting environments. 2010 IEEE International Workshop on Information Forensics and Security; Seattle, WA; 2010. p. 1–6. doi: 10.1109/WIFS.2010.5711437
  • Fan W, Wang K, Cayre F, Xiong Z. 3D lighting based image forgery detection using shape from shading. In 20th European Signal Processing Conference EUSIPCO; 2012; 1777–1781.
  • Huang R, Smith WP. Shape-from-shading under complex natural illumination. In Proc. of IEEE Int. Conf. on Image Processing; 2011; 13–16.
  • Chen H, Xuanjimg S, Lv Y. Blind identification method for authenticity of infinite light source images. In 5th Int. Conf. on Frontier of Computer Science and Technology; 2010; 131–135.
  • Yingda L, Xuanjing S, Haipeng C. An improved image blind identification based on inconsistency in light source direction. SuperComputing. 2011;58(1):50–67.
  • Carvalho TJD, Riess C, Angelopoulou E, Pedrini H. Exposing digital image forgeries by illumination color classification. IEEE Trans Inf Forensics Secur. 2013;8(7):1182–1194.10.1109/TIFS.2013.2265677
  • Carvalho T, Farid H, Kee E. Exposing photo manipulation from user guided 3-D lighting analysis. In Proc. SPIE Symposium on Electronic Imaging; 2015.
  • Johnson M, Farid H. [Online]. [Cited 2016 Jan 21]. Available from: https://kimojohnson.org/publications/envmap/envmap.html
  • Fang S, Ge H. Detecting image authenticity based on lambert illumination model and shadows. In Proc. of Network Security and Communication Engineering; 2015; 313–316.
  • Brian JFO, Farid H. Exposing photo manipulation with inconsistent reflections. ACM Trans Graphics. 2012;31(1):4:1–4:11.10.1145/2077341
  • Kee E, Brian J, Farid H. Exposing photo manipulation with inconsistent shadows. ACM Trans Graphics. 2013;32(4):1–12. 2810.1145/2487228

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.