1,248
Views
38
CrossRef citations to date
0
Altmetric
Reviews

Digital image forgery detection: a systematic scrutiny

ORCID Icon & ORCID Icon
Pages 488-526 | Received 28 Sep 2017, Accepted 31 Dec 2017, Published online: 05 Mar 2018

References

  • Farid H. Image forgery detection. IEEE Signal Process Mag. 2009;26(2):16–25.10.1109/MSP.2008.931079
  • Reis G. Digital image integrity. San Jose, CA; 1999.
  • Photo Tampering throughout history. Fourandsix Technologies, Inc. [Online]. [cited 2017 Aug 18]. Available from: http://pth.izitru.com/
  • Mhiripiri NA, Chari T. Media law, ethics, and policy in the digital age. United States of America: IGI Global; 2017.10.4018/AMEA
  • Birajdar GK, Mankar VH. Digital image forgery detection using passive techniques : a survey. Digit Investig. 2013;10(3):226–245.10.1016/j.diin.2013.04.007
  • Ali M, Deriche M. A bibliography of pixel-based blind image forgery detection techniques. Signal Process Image Commun. 2015;39:46–74.
  • Abd Warif NB, Abdul Wahab AW, Idna Idris MY, Ramli R, Salleh R, Shamshirband S, Choo KR. Copy-move forgery detection : survey, challenges and future directions. J Netw Comput Appl. 2016;75:259–278.
  • Mahmood T, Nawaz T, Ashraf R, Shah M, Khan Z, Irtaza A, Mehmood Z. A survey on block based copy move image forgery detection techniques. International Conference on Emerging Technologies (ICET), 2015.
  • Dada A, Dharaskar RV, Thakare VM. A survey on keypoint based copy-paste forgery detection techniques. Procedia Comput Sci 78 December 2015: 61–67, 2016.
  • Asghar K, Hussain M. Copy-move and splicing image forgery detection and localization techniques : a review. Aust J Forensic Sci. 2017;49(3):281–307.10.1080/00450618.2016.1153711
  • Anoop AM. Image forgery and its detection : a survey. In: International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015, pp. 1–9.
  • Bharti CN. A survey of image forgery detection techniques. In: International Conference onWireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 877–881.
  • Nirmalkar N. A Review of Image Forgery Techniques and their Detection. In: International Conference onInnovations in Information, Embedded and Communication Systems (ICIIECS), 2015.
  • Khapare AP, Phalke DA. Approaches for camera source identification : a review. Int J Enginnering Comput Sci. 2017;6(1):19977–19979.
  • Babar MA, Zhang H. Systematic literature reviews in software engineering: preliminary results from interviews with researchers. In Int Symp Empirical Softw Eng Meas, 2009, pp. 346–355.
  • Kitchenham B, Pretorius R, Budgen D, Brereton OP, Turner M, Niazi M, Linkman S. Systematic literature reviews in software engineering - a tertiary study. Inform Softw Technol. 2010;52(8):792–805.10.1016/j.infsof.2010.03.006
  • Abdelmaboud A, Jawawi DNA, Ghani I, Elsafi A, Kitchenham B. Quality of service approaches in cloud computing: a systematic mapping study. J Syst Softw. 2015;101:159–179.10.1016/j.jss.2014.12.015
  • Iankoulova I, Daneva M. Cloud computing security requirements: a systematic review. Int Conf Research Challenges Inform Sci. 2012:1–7.
  • Jula A, Sundararajan E, Othman Z. Cloud computing service composition: a systematic literature review. Expert Syst Appl. 2014;41(8):3809–3824.10.1016/j.eswa.2013.12.017
  • Singh K, Singh P, Kumar K. A systematic review of IP traceback schemes for denial of service attacks. Comput Secur. 2016;56:111–139.10.1016/j.cose.2015.06.007
  • Singh K, Singh P, Kumar K. Application layer HTTP-GET flood DDoS attacks: research landscape and challenges. Comput Secur. 2017;65:344–372.10.1016/j.cose.2016.10.005
  • Kitchenham BA. Systematic review in software engineering: where we are and where we should be going. Int Workshop Evidential Assess Softw Technol. 2012:1–2.
  • Brereton MOP, Kitchenham BA, Budgen D, Turner M, Khalil M. Lessons from applying the systematic literature review process within the software engineering domain”. J Syst Softw. 2007;80(4):571–583.10.1016/j.jss.2006.07.009
  • Mallett R, Hagen-Zanker J, Slater R, Duvendack M. The benefits and challenges of using systematic reviews in international development research. J Dev Eff. 2012;4(3):445–455.10.1080/19439342.2012.711342
  • Farid H. Digital doctoring: Can we trust photographs? Decept From Anc Empires to Internet Dating. 2009:95–108
  • Adobe Photoshop elements. Adobe Syst; 2016. [Online]. [cited 2017 Sep 9]. Available from: http://www.adobe.com/in/products/photoshop-elements.
  • PIXLR. [Online]. [cited 2017 Sep 9]. Available from: https://pixlr.com/.
  • GNU image manipulation program (GIMP); 2017. [cited 2017 Sep 9]. Available from: https://www.gimp.org/.
  • Piva A. An Overview on Image Forensics. ISRN Signal Process. 2013;2013:1–22.10.1155/2013/496701
  • Fridrich J L J, Soukal D. Detection of copy-move forgery in digital images. Digit Forensic Res Workshop. 2003:55–61.
  • Zhang Z, Zhou Y. Study of image splicing detection. Adv Intell Comput Theor Appl Asp Theor Methodol Issues. 2008;5226:1103–1110.
  • Nguyen HC, Katzenbeisser S. Robust resampling detection in digital images. in International Conference on Communications and Multimedia Security; 2012, pp. 3–15.10.1007/978-3-642-32805-3
  • Lyu S, Farid H. How realistic is photorealistic? IEEE Trans Signal Process. 2005;53(2):845–850.10.1109/TSP.2004.839896
  • Gloe T, Kirchner M, Winkler A, Böhme R. Can we trust digital image forensics? in 15th Int. Conf. Multimedia; 2007, pp. 78–86.
  • Stamm MC, Liu KJR. Anti-forensics of digital image compression. IEEE Trans Inf Forensics Secur. 2011;6(3):1050–1065.10.1109/TIFS.2011.2119314
  • Choi KS, Lam EY, WongKKY. Source camera identification using footprints from lens aberration. Proceedings Volume 6069, Digital Photography II; 60690J. 2006. https://doi.org/10.1117/12.649775.
  • Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N. Methods for identification of images acquired with digital cameras in Proc. of SPIE, Enabling Technologies for Law Enforcement and Security; 2001.
  • Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur. 2006;2(1):205–214.10.1109/TIFS.2006.873602
  • Bayram S, Sencar HT, Memon N, Avcibas I. Source camera identification based on CFA interpolation. in IEEE International Conference on Image Processing (ICIP); 2005.
  • Kharrazi M, Sencar HT, and Memon N. Blind source camera identification. in IEEE International Conference on Image Processing (ICIP); 2004.
  • Farid H, Bravo MJ. Perceptual discrimination of computer generated and photographic faces. Digit Investig. 2012;8(3):226–236.10.1016/j.diin.2011.06.003
  • Wang Y, Moulin P. On discrimination between photorealistic and photographic images. in IEEE International Conference on Acoustics, Speech and Signal Processing; 2006.
  • Dehnie S, Sencar HT, Memon N. Digital image forensics for identifying computer generated and digital camera images. in IEEE International Conference on Image Processing; 2006, pp. 2313–2316.
  • Khanna N, Chiu GT-C, Allebach JP, Delp EJ. Forensic techniques for classifying scanner, computer generated and digital camera images. in IEEE International Conference on Acoustics, Speech, and Signal Processing; 2008, pp. 1653–1656.
  • Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimed Tools Appl. 2008;39(1):1–46.10.1007/s11042-007-0154-3
  • Singh P, Chadha RS. A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol. 2013;2(9):165–175.
  • Wang X, Xue J, Zheng Z, Liu Z, Li N. Image forensic signature for content authenticity analysis. J Vis Comun Image Represent. Jul. 2012;23(5):782–797.
  • Cox I, Miller ML, Bloom JA. Digital watermarking. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.; 2002.
  • Friedman GL. The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans Consum Electron. 1993;39(4):905–910.10.1109/30.267415
  • Rey C, Dugelay J-L. A survey of watermarking algorithms for image authentication. EURASIP J Adv Signal Proc. 2002;2002(6):613–621.
  • Langelaar GC, Setyawan I, Lagendijk RL. Watermarking digital image and video data. a state-of-the-art overview. IEEE Signal Proc Mag. 2000;17(5):20–46.10.1109/79.879337
  • Tafti AP, Malakooti MV, Ashourian M, Janosepah S. Digital image forgery detection through data embedding in spatial domain and cellular automata. 7th International Conference on Digital Content, Multimedia Technology and its Applications (IDCTA); 2011:11–15.
  • Elwin JGR, Aditya TS, Shankar SM. Survey on passive methods of image tampering detection. Proceedings of the International Conference on Communication and Computational Intelligence; 2010 Dec 27–29; Perundurai, Erode: Kongu Engineering College; 2003. p. 431–436.
  • Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kolodziej J, Li H, Lin W, Yow KC, et al. Survey on blind image forgery detection. IET Image Proc. 2013;7(7):660–670.10.1049/iet-ipr.2012.0388
  • Christlein CRV, Jordan J, Riess C, Angelopoulou E. An evaluation of popular copy-move forgery detection approaches. IEEE Trans Inf Forensics Secur. 2012;7(6):1841–1854.10.1109/TIFS.2012.2218597
  • Zheng J, Liu Y, Ren J, Zhu T, Yan Y, Yang H. Fusion of block and keypoints based approaches for effective copy-move image forgery detection. Multidimens Syst Signal Process. 2016;27(4):989–1005.10.1007/s11045-016-0416-1
  • Sreelakshmy IJ, Anver J. An improved method for copy-move forgery detection in digital forensic. in Online International Conference on Green Engineering and Technologies (IC-GET); 2016.
  • Farid H. Detecting digital forgeries using bispectral analysis. in AI Lab, Massachusetts Institute of Technology; 1999, p. Tech. Rep. AIM-1657.
  • Ng TT, Chang SF. A model for image splicing. in International Conference on Image Processing (ICIP); 2004.
  • Lin Z, Wang R, Tang X, Shum H-Y. Detecting doctored images using camera response normality and consistency. Recognition, IEEE conference on computer vision and pattern (CVPR); 2005, pp. 1087–1092.
  • Fontani M, Bianchi T, De Rosa A, Piva A, Barni M. A framework for decision fusion in image forensics based on Dempster Shafer theory of evidence. IEEE Trans. Inf. Forensics Secur. 2013;8(4):593–607.10.1109/TIFS.2013.2248727
  • Kharrazi M, Sencar HT, Memon ND. Improving steganalysis by fusion techniques: a case study with image steganography. Trans Data Hiding Multimed Secur. 2006;4300:123–137.10.1007/11926214
  • Kirchner M, Gloe T. “On resampling detection in re-compressed images”, in First IEEE International Workshop on Information Forensics and Security, 2009. WIFS. 2009;2009:21–25.
  • JVCIR, Su Y, Jin X, Zhang C, Chen Y. Hierarchical image resampling detection based on blind deconvolution q. J Vis Commun Image Represent. 2017;48:480–490.
  • Kirchner M, Fridrich J. On detection of median filtering in digital images. Proceedings of the SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, USA; January 2010. 2010.
  • Kang X, Stamm MC, Peng A, Liu KJR. Robust median filtering forensics using an autoregressive model. IEEE Trans. Inf. Forensics Secur. 2013;8(9):1456–1468.10.1109/TIFS.2013.2273394
  • Chen C, Ni J, Huang R, Huang J. Blind median filtering detection using statistics in difference domain. In 14th international conference on Information Hiding; 2012, pp. 1–15.
  • Yuan H. Blind forensics of median filtering in digital images. IEEE Trans Inf Forensics Secur. 2011;6(4):1335–1345.10.1109/TIFS.2011.2161761
  • Garg A, Hailu A, Sridharan R. Image forgery identification using jpeg intrinsic fingerprints. 2008:1–6.
  • Zach F, Riess C, Angelopoulou E. “Automated image forgery detection through classification of JPEG Ghosts”, DAGM/OAGM 2012. Pattern Recognit. 2012;7476:185–194.
  • Bianchi T, Piva A. Detection of non-aligned double JPEG compression based on integer periodicity maps. IEEE Trans Inf Forensics Secur. 2012;7(2):842–848.
  • Johnson MK, Farid H. Exposing digital forgeries by detecting inconsistencies in lighting. ACM Multimedia and Security Workshop ’05 New York, NY, USA. 2005:1–10.
  • Johnson MK, Farid H. Exposing digital forgeries in complex lighting environments. IEEE Trans Inf Forensics Secur. 2007;2(3):450–461.10.1109/TIFS.2007.903848
  • Kee E, Farid H. Exposing digital forgeries from 3-D lighting environments, in IEEE Int. Forensics Security: Conf. on Inf; 2010.
  • Silva E, Carvalho T, Ferreira A, Rocha A. Going deeper into copy-move forgery detection: exploring image telltales via multi-scale analysis and voting processes. J Vis Commun Image Represent. 2015;29:16–32.10.1016/j.jvcir.2015.01.016
  • Cozzolino D, Poggi G, Verdoliva L. Efficient dense-field copy – move forgery detection. IEEE Trans Inf Forensics Secur. 2015;10(11):2284–2297.10.1109/TIFS.2015.2455334
  • Yu L, Han Q, Niu X. Feature point-based copy-move forgery detection : covering the non-textured areas. Multimed Tools Appl. 2016;75(2):1159–1176.10.1007/s11042-014-2362-y
  • Zandi M, Mahmoudi-aznaveh A, Talebpour A. Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans Inf Forensics Secur. 2016;11(11):2499–2512.10.1109/TIFS.2016.2585118
  • Uliyan DM, Jalab HA, Wahab AWA, Sadeghi S. Image region duplication forgery detection based on angular radial partitioning and Harris key-points. Symmetry (Basel). 2016;8(7):62–81.
  • Ulutas G, Muzaffer G. A new copy move forgery detection method resistant to object removal with uniform background forgery. Math Probl Eng. 2016;2016:1–19.10.1155/2016/3215162
  • Wang X, Li S, Liu Y. A new keypoint-based copy-move forgery detection for small smooth regions. Multimed Tools Appl. 2016;2017(22):23353–23382.
  • Zhang W, Yang Z, Niu S, Wang J. Detection of copy-move forgery in flat region based on feature enhancement. In: Shi Y, Kim H, Perez-Gonzalez F, Liu F, editors. Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science, vol 10082. Springer, Cham; 2017. 2017:159–171.
  • Yang F, Li J, Lu W, Weng J. Copy-move forgery detection based on hybrid features. Eng Appl Artif Intell. 2017;59, no. December 2016:73–83. 10.1016/j.engappai.2016.12.022
  • Abdul Warif NB, Abdul Wahab AW, Idna Idris MY, Fazidah Othman RS. SIFT-Symmetry : A robust detection method for copy-move forgery with reflection attack. J Vis Commun Image Represent. 2017;46:219–232.
  • Bi X, Pun CM, Yuan XC. Multi-level dense descriptor and hierarchical feature matching for copy-move forgery detection. Inf Sci (NY). 2016;345:226–242.10.1016/j.ins.2016.01.061
  • Lee J-C, Chang C-P, Chen W-K. Detection of copy-move image forgery using histogram of orientated gradients. Inf Sci (NY). 2015;321:250–262.10.1016/j.ins.2015.03.009
  • Lee J-C. Copy-move image forgery detection based on Gabor magnitude. J Vis Commun Image Represent. 2015;31:320–334.10.1016/j.jvcir.2015.07.007
  • Liang Z, Yang G, Ding X, Li L. An efficient forgery detection algorithm for object removal by exemplar-based image inpainting. J Vis Commun Image Represent. 2015;30:75–85.10.1016/j.jvcir.2015.03.004
  • Huang D, Huang C, Hu W, Chou C. Robustness of copy-move forgery detection under high JPEG compression artifacts. Multimed Tools Appl. 2017;76(1):1509–1530.10.1007/s11042-015-3152-x
  • Tralic D, Grgic S, Sun X, Rosin PL. Combining cellular automata and local binary patterns for copy-move forgery detection. Multimed Tools Appl. 2016;75(24):16881–16903.10.1007/s11042-015-2961-2
  • Zhou H, Shen Y, Zhu X, Liu B, Fu Z, Fan N. Digital image modification detection using color information and its histograms. Forensic Sci Int. 2016;266:379–388.10.1016/j.forsciint.2016.06.005
  • Wo Y, Yang K, Han G, Chen H, Wu W. Copy-move forgery detection based on multi- radius PCET. IET Image Process. 2016;11(2):99–108.
  • Jenadeleh M, Moghaddam ME. Blind detection of region duplication forgery using fractal coding and feature matching. J Forensic Sci. 2016;61(3):623–636.10.1111/1556-4029.13108
  • Jinke X, Guangdong Z. Image forgery detection algorithm based on non sampling wavelet transform and Zernike moments. Int J Secur Its Appl. 2016;10(2):27–38.
  • Wang X, Liu Y, Xu H, Wang P, Yang H. Robust copy-move forgery detection using quaternion exponent moments. Pattern Anal Appl. 2016;2016:1–17. https://doi.org/10.1007/s10044-016-0588-1.
  • Ustubioglu B et al. Improved copy-move forgery detection based on the CLDs and colour moments. Imaging Sci J. 2016;64(4).
  • Li J, Li X, Yang B, Sun X. Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur. 2015;10(3):507–518.
  • Pun CM, Yuan XC, Bi XL. Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur. 2015;10(8):1705–1716.
  • Ardizzone E, Bruno A, Mazzola G. Copy-move forgery detection by matching triangles of keypoints. IEEE Trans Inf Forensics Secur. 2015;10(10):2084–2094.10.1109/TIFS.2015.2445742
  • Zhong J, Gan Y, Xie S. Radon odd radial harmonic Fourier moments in detecting cloned forgery image. Chaos Solitons Fractals. 2016;89:115–129.10.1016/j.chaos.2015.10.010
  • Tatkare KA, History A. Fusion of sift and hue moments features for cloning tamper detection, in International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT);2015, pp. 409–414.10.1109/ICATCCT.2015.7456918
  • Thirunavukkarasu V, Kumar JS, Chae GS, Kishorkumar J. Non-intrusive forensic detection method using DSWT with reduced feature set for copy-move image. Wirel Pers Commun. 2017:1–19. https://doi.org/10.1007/s11277-016-3941-1.
  • Ferreira A, Felipussi SC, Alfaro C, Fonseca P, Vargas-Muñoz JE, dos Santos JA, Rocha A. Behavior knowledge space-based fusion for copy-move forgery detection. IEEE Trans Image Process. 2016;25(10):4729–4742.10.1109/TIP.2016.2593583
  • Zhao X, Wang S, Li S, Li J. Passive image splicing detection by a 2-D Noncausal Markov Model. IEEE Trans Circuits Syst Video Technol. 2015;25(2):185–199.10.1109/TCSVT.2014.2347513
  • Bahrami K, Kot AC, Li L, Li H. Blurred image splicing localization by exposing blur type inconsistency. IEEE Trans Inf Forensics Secur. 2015;10(5):999–1009.10.1109/TIFS.2015.2394231
  • Zhan L, Zhu Y, Mo Z. An image splicing detection method based on PCA minimum eigenvalues. J Inf Hiding Multimed Signal Process. 2016;7(3):610–619.
  • Carvalho T, Faria FA, Pedrin H, Torres RS, Rocha A. Illuminant-based transformed spaces for image forensics. IEEE Trans Inf FORENSICS Secur. 2016;11(4):720–733.10.1109/TIFS.2015.2506548
  • Cozzolino D, Verdoliva L. Single-image splicing localization through autoencoder-based anomaly detection, in IEEE International Workshop on Information Forensics and Security (WIFS);2016.
  • J. V. C. I. R, Pun C, Liu B, Yuan X. Multi-scale noise estimation for image splicing forgery detection. J Vis Commun Image Represent. 2016; 38:195–206. 10.1016/j.jvcir.2016.03.005
  • Han JG, Park TH, Moon YH, Eom IK. Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion,” J Electron Imaging. 2016;25(2):023031. https://doi.org/10.1117/1.JEI.25.2.023031.
  • Zhang Y, Li S, Wang S, Zhao X. Identifying image splicing based on local statistical features in DCT and DWT domain. In: Mu J, Liang Q, Wang W, Zhang B, Pi Y, editors. The proceedings of the third international conference on communications, signal processing, and systems. Lecture Notes in Electrical Engineering, vol 322. Cham: Springer, pp. 723–731.
  • Kaur M, Gupta S. A passive blind approach for image splicing detection based on DWT and LBP histograms. Int Symp Secur Comput Commun. 2016:318–327.10.1007/978-981-10-2738-3
  • Li C. Image splicing detection based on Markov features in QDCT domain. Neurocomputing. 2017;228:29–36.
  • He X, Guan Q, Tong Y, Zhao X. a novel robust image forensics algorithm based on L1-norm estimation. International Workshop on Digital Watermarking. 2017;2:145–158.
  • Li H, Luo W, Qiu X, Huang J. Image forgery localization via integrating tampering possibility maps. IEEE Trans Inf Forensics Secur. 2017;12(5):1240–1252.10.1109/TIFS.2017.2656823
  • Korus P, Huang J. Multi-scale fusion for improved localization of malicious tampering in digital images. IEEE Trans Image Process. 2016;25(3):1312–1326.10.1109/TIP.2016.2518870
  • Chen J, Kang X, Liu Y, Wang ZJ. Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. 2015;22(11):1849–1853.10.1109/LSP.2015.2438008
  • Bayar B, Stamm MC. A deep learning approach to universal image manipulation detection using a new convolutional layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec ’16; 2016, pp. 5–10.
  • Wang Q, Zhang R. Double JPEG compression forensics based on a convolutional neural network. EURASIP J Inf Secur. 2016;2016:23. https://doi.org/10.1186/s13635-016-0047-y.
  • Zhang Y, Goh J, Lei L, Thing V. Image region forgery detection : a deep learning approach. Singapore Cyber-Security Conf. 2016;14:1–11.
  • Liu A, Zhao Z, Zhang C, Su Y. Smooth filtering identification based on convolutional neural networks. Multimed Tools Appl. 2016:1–15.
  • Yu J, Zhan Y, Yang J Xiangui KB. A multi-purpose image counter-anti-forensic method using convolutional neural networks. In International Workshop on Digital Watermarking. 2017:3–15.
  • Choi, H, et al. Detecting composite image manipulation based on deep neural networks. Int. Conf. Syst. Signals Image Process; 2017.
  • Rao Y, Ni J. A deep learning approach to detection of splicing and copy-move forgeries in images. IEEE Int Work Information Forensics Secur. 2016. https://doi.org/10.1109/WIFS.2016.7823911.
  • Cozzolino D, Poggi G, Verdoliva L. “Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection”, in 5th ACM Workshop on Information Hiding and Multimedia. Security. 2017;159–164.
  • Tuba V, Jovanovic R, Tuba M. Digital Image Forgery Detection Based on Shadow HSV Inconsistency. In 5th International Symposium on Digital Forensic and Security (ISDFS); 2017.
  • Li B, Ng T, Li X, Tan S. Revealing the trace of high-quality JPEG compression through quantization noise analysis. IEEE Trans Inf Forensics Secur. 2015;10(3):558–573.
  • Li L, Xue J, Wang X. A robust approach to detect digital forgeries by exploring correlation patterns. Pattern Anal Appl. 2015;18(2):351–365.10.1007/s10044-013-0319-9
  • Cristin R, Raj VC. Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery. Sci China Inf Sci. 2017;2017:60, 082101. https://doi.org/10.1007/s11432-016-0478-y.
  • Hwang M, Kim S, Har D. A method of identifying digital images with geometric distortion. Aust J Forensic Sci. 2017;49(1):93–105.10.1080/00450618.2015.1128970
  • Farooq S, Yousaf MH, Hussain F. A generic passive image forgery detection scheme using local binary pattern with rich models. Comput Electr Eng. 2017;62:459–472.
  • Wattanachote K, Shih TK, Member S, Chang W, Chang H. Tamper detection of JPEG image due to seam modifications. IEEE Trans Inf Forensics Secur. 2015;10(12):2477–2491.10.1109/TIFS.2015.2464776
  • Liu Q. An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics. Pattern Recognit. 2017;65:35–46.10.1016/j.patcog.2016.12.010
  • Alhussein M. Image tampering detection based on local texture descriptor and extreme learning machine. In 18th International Conference on Computer Modelling and Simulation; 2016, pp. 196–199.
  • Yin T, Yang G, Li L, Zhang D. Detecting seam carving based image resizing. Comput Secur. 2015;55:130–141.10.1016/j.cose.2015.09.003
  • Zeng F, Wang W, Tang M, Cao Z. Exposing Blurred Image Forgeries through Blind Image Restoration. In 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC);2015, pp. 466–469.
  • Shen X, Shi Z, Chen H. Splicing image forgery detection using textural features based on the gray level co-occurrence matrices. IET Image Process. 2017;11(1):44–53.10.1049/iet-ipr.2016.0238

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.