Passive detection of copy-move forgery in digital images: state-of-the-art.

Currently, digital images and videos have high importance because they have become the main carriers of information. However, the relative ease of tampering with images and videos makes their authenticity untrustful. Digital image forensics addresses the problem of the authentication of images or their origins. One main branch of image forensics is passive image forgery detection. Images could be forged using different techniques, and the most common forgery is the copy-move, in which a region of an image is duplicated and placed elsewhere in the same image. Active techniques, such as watermarking, have been proposed to solve the image authenticity problem, but those techniques have limitations because they require human intervention or specially equipped cameras. To overcome these limitations, several passive authentication methods have been proposed. In contrast to active methods, passive methods do not require any previous information about the image, and they take advantage of specific detectable changes that forgeries can bring into the image. In this paper, we describe the current state-of-the-art of passive copy-move forgery detection methods. The key current issues in developing a robust copy-move forgery detector are then identified, and the trends of tackling those issues are addressed.

[1]  Nenghai Yu,et al.  Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.

[2]  Jing Dong,et al.  Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.

[3]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[4]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[5]  C.G. Patil,et al.  Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[6]  Minglun Gong,et al.  An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).

[7]  Pravin Kakar,et al.  Detecting copy-paste forgeries using transform-invariant features , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).

[8]  Yan Zhao,et al.  Detecting Copy-Move Forgery Using Non-negative Matrix Factorization , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[9]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[10]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[11]  Deepa Kundur,et al.  Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007 , 2007, MM&Sec.

[12]  Xinpeng Zhang,et al.  Detection of Image Region-Duplication with Rotation and Scaling Tolerance , 2010, ICCCI.

[13]  Edoardo Ardizzone,et al.  Copy-move forgery detection via texture description , 2010, MiFor '10.

[14]  Ming-Kuei Hu,et al.  Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.

[15]  Ricardo da Silva Torres,et al.  Comparative study of global color and texture descriptors for web image retrieval , 2012, J. Vis. Commun. Image Represent..

[16]  Nicu Sebe,et al.  Multimedia Content Analysis and Mining , 2008 .

[17]  Mohd. Aizaini Maarof,et al.  Efficient image block matching algorithm with two layer feature extraction , 2011, 2011 7th International Conference on Information Technology in Asia.

[18]  B L Shivakumar,et al.  Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors , 2011 .

[19]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[20]  Xinpeng Zhang,et al.  Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images , 2011, IEEE Signal Processing Letters.

[21]  Li Kang,et al.  Copy-move forgery detection in digital image , 2010, 2010 3rd International Congress on Image and Signal Processing.

[22]  Jing Dong,et al.  A Survey of Passive Image Tampering Detection , 2009, IWDW.

[23]  Miroslaw Bober,et al.  MPEG-7 visual signature tools , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[24]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[25]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[26]  Eike Kiltz,et al.  Tightly-Secure Signatures from Chameleon Hash Functions , 2015, Public Key Cryptography.

[27]  Ting Zhang,et al.  Copy-Move Forgery Detection Based on SVD in Digital Image , 2009, 2009 2nd International Congress on Image and Signal Processing.

[28]  Edoardo Ardizzone,et al.  Detection of Duplicated Regions in Tampered Digital Images by Bit-Plane Analysis , 2009, ICIAP.

[29]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[30]  Saiqa Khan,et al.  Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform , 2010 .

[31]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[32]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[33]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[34]  Anil K. Jain,et al.  Unsupervised texture segmentation using Gabor filters , 1990, 1990 IEEE International Conference on Systems, Man, and Cybernetics Conference Proceedings.

[35]  David Letscher,et al.  Detecting filtered cloning in digital images , 2007, MM&Sec.

[36]  Shih-Fu Chang Blind Passive Media Forensics: Motivation and Opportunity , 2007, MCAM.

[37]  Hideyuki Tamura,et al.  Textural Features Corresponding to Visual Perception , 1978, IEEE Transactions on Systems, Man, and Cybernetics.

[38]  Javad Alirezaie,et al.  Robust detection of copy-move forgery using texture features , 2011, 2011 19th Iranian Conference on Electrical Engineering.

[39]  Zhen Li,et al.  A DWT-DCT Based Passive Forensics Method for Copy-Move Attacks , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[40]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[41]  Sun Xingming,et al.  DWT-PCA (EVD) Based Copy-move Image Forgery Detection , 2011 .

[42]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[43]  Zhao Junhong Detection of Copy-Move Forgery based on one improved LLE method , 2010, 2010 2nd International Conference on Advanced Computer Control.

[44]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[45]  Koen E. A. van de Sande,et al.  Evaluating Color Descriptors for Object and Scene Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[46]  Yanjun Cao,et al.  A Robust Detection Algorithm for Region Duplication in Digital Images , 2011 .

[47]  Robert B. Ash,et al.  Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.

[48]  Asoke K. Nandi,et al.  Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics , 2011, Signal Process..

[49]  Xunyu Pan,et al.  Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[50]  Jie Hu,et al.  An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection , 2011, 2011 Second International Conference on Networking and Distributed Computing.

[51]  Dongming Wang,et al.  Blur Detection of Digital Forgery Using Mathematical Morphology , 2007, KES-AMSTA.

[52]  Ngoc Thanh Nguyen,et al.  Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications , 2007 .

[53]  Asoke K. Nandi,et al.  Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling , 2009, 2009 17th European Signal Processing Conference.

[54]  Hany Farid,et al.  Exposing digital forgeries in scientific images , 2006, MM&Sec '06.

[55]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[56]  C. Won,et al.  Efficient Use of MPEG‐7 Edge Histogram Descriptor , 2002 .

[57]  Zhengyao Bai,et al.  Image copy-move forgery detection based on “crossing shadow” division , 2011, 2011 International Conference on Electric Information and Control Engineering.

[58]  Yogesh Rathore,et al.  DWT Based Copy-Move Image Forgery Detection , 2012 .

[59]  Shinfeng D. Lin,et al.  An integrated technique for splicing and copy-move forgery image detection , 2011, 2011 4th International Congress on Image and Signal Processing.

[60]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[61]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[62]  Nenghai Yu,et al.  Passive detection of doctored JPEG image via block artifact grid extraction , 2009, Signal Process..

[63]  Edoardo Ardizzone,et al.  Detecting multiple copies in tampered images , 2010, 2010 IEEE International Conference on Image Processing.

[64]  Xinpeng Zhang,et al.  Image Splicing Detection Using Color Edge Inconsistency , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[65]  M. Shamim Hossain,et al.  Robust copy-move image forgery detection using undecimated wavelets and Zernike moments , 2011, ICIMCS '11.

[66]  Dimitris Kanellopoulos,et al.  Recent Advances in Multimedia Information System Security , 2009, Informatica.

[67]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[68]  G. Bebis,et al.  Blind copy move image forgery detection using dyadic undecimated wavelet transform , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).

[69]  Tiegang Gao,et al.  A robust detection algorithm for copy-move forgery in digital images. , 2012, Forensic science international.

[70]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[71]  J. Flusser,et al.  Moments and Moment Invariants in Pattern Recognition , 2009 .

[72]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[73]  Sun Xingming,et al.  Fast and Robust Image Cloning Detection using Block Characteristics of DWT Coefficients , 2011 .

[74]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[75]  Qiong Wu,et al.  Detection of digital doctoring in exemplar-based inpainted images , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[76]  A. Laub,et al.  The singular value decomposition: Its computation and some applications , 1980 .

[77]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[78]  M.,et al.  Statistical and Structural Approaches to Texture , 2022 .

[79]  Luc Van Gool,et al.  SURF: Speeded Up Robust Features , 2006, ECCV.

[80]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[81]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[82]  Xiaochun Cao,et al.  Duplication Localization and Segmentation , 2010, PCM.