Digital Media Tampering Detection Techniques: An Overview

Digital media has played a critical role in today information system. With emerging of easy-to-use media manipulating tools which can be found anywhere on the internet, a user can now alter the content of their digital media (e.g. digital image, audio or video) in order to achieve his/her personal goal without leaving no traces detectable by human’s basic perceptions. Hence, the authenticity of the digital media can no longer be guaranteed. This leads to the serious problem regarding digital crime investigation. In this paper, an overview on forgery attacks and techniques used to fight against these attacks are present and discussed.

[1]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[2]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[3]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[4]  Niloy Ganguly,et al.  Stop Clickbait: Detecting and preventing clickbaits in online news media , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[5]  James F. O'Brien,et al.  Exposing Photo Manipulation from Shading and Shadows , 2014, ACM Trans. Graph..

[6]  Min Wu,et al.  Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.

[7]  Dong-Hwan Har,et al.  A Novel Forged Image Detection Method Using the Characteristics of Interpolation , 2013, Journal of forensic sciences.

[8]  Xing Zhang,et al.  Detecting splicing in digital audios using local noise level estimation , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[9]  Katsushi Ikeuchi,et al.  Estimating demosaicing algorithms using image noise variance , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[10]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[11]  Babak Mahdian,et al.  Using noise inconsistencies for blind image forensics , 2009, Image Vis. Comput..

[12]  Shujun Li,et al.  Handbook of Digital Forensics of Multimedia Data and Devices , 2015 .

[13]  Xing Zhang,et al.  Exposing image forgery with blind noise estimation , 2011, MM&Sec '11.

[14]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.