Digital Image Forgery Detection Techniques: A Comprehensive Review

The image forgery techniques are used to provide the particular image in the form of computerized pictures with no errors in capturing of digital image information which shows the original image. While compared to normal images the edited images are difficult to find out the forged images. The image should maintain the authenticity and integrity to secure the picture from unauthorized users. In this paper, we have compared the digital image forgery and JPEG is the most common format used by the photographic images and the digital camera devices. These operations are performed in an adobe photo-shop using with the content of image security to restore some digital image with an authenticity and integrity to detect the digital image forgery using active and passive techniques.

[1]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[2]  D. Storck,et al.  A New Approach to Integrity of Digital Images , 1996, IFIP World Conference on Mobile Communications.

[3]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[4]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[5]  Ashraf Y. A. Maghari,et al.  Comparison between image forgery detection algorithms , 2017, 2017 8th International Conference on Information Technology (ICIT).

[6]  Ahmad Faraahi,et al.  DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[8]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[9]  S. P. Ghrera,et al.  Implementation of Wavelet Based Modified Buyer-Seller Watermarking Protocol ( BSWP ) , 2014 .

[10]  H. Farid A Survey of Image Forgery Detection , 2008 .

[11]  Ashwani Kumar,et al.  Modified Buyer Seller Watermarking Protocol based on Discrete Wavelet Transform and Principal Component Analysis , 2016 .

[12]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[13]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[14]  Ashwani Kumar,et al.  A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform , 2011 .

[15]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  Ee-Chien Chang,et al.  Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[17]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[18]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[19]  N. Sugitha,et al.  Digital image forgery — A threaten to digital forensics , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).