A survey on image tampering and its detection in real-world photos

Abstract Editing a real-world photo through computer software or mobile applications is one of the easiest things one can do today before sharing the doctored image on one’s social networking sites. Although most people do it for fun, it is suspectable if one concealed an object or changed someone’s face within the image. Before questioning the intention behind the editing operations, we need to first identify how and which part of the image has been manipulated. It therefore demands automatic tools for identifying the intrinsic difference between authentic images and tampered images. This survey provides an overview on typical image tampering types, released image tampering datasets and recent tampering detection approaches. It presents a distinct perspective to rethink various assumptions of tampering clues behind different detection approaches. And this further encourages the research community to develop general tampering localization methods in the future instead of adhering to single-type tampering detection.

[1]  Muhammad Ghulam,et al.  Splicing image forgery detection based on DCT and Local Binary Pattern , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[2]  Jiwu Huang,et al.  Image Forgery Localization via Integrating Tampering Possibility Maps , 2017, IEEE Transactions on Information Forensics and Security.

[3]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[4]  Hany Farid,et al.  Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[5]  Andrea Fusiello,et al.  Robust Multiple Structures Estimation with J-Linkage , 2008, ECCV.

[6]  Ying Zhang,et al.  Automated face swapping and its detection , 2017, 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP).

[7]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[8]  Yong Ho Moon,et al.  Image splicing detection based on inter-scale 2D joint characteristic function moments in wavelet domain , 2016, EURASIP J. Image Video Process..

[9]  Davide Cozzolino,et al.  Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Christine Fernandez-Maloigne,et al.  Image splicing detection with local illumination estimation , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[11]  Xunyu Pan,et al.  Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Hongyuan Li,et al.  Image Forgery Forensics Based on Manual Blurred Edge Detection , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[13]  Andrea Fusiello,et al.  T-Linkage: A Continuous Relaxation of J-Linkage for Multi-model Fitting , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[14]  Anderson Rocha,et al.  Behavior Knowledge Space-Based Fusion for Copy–Move Forgery Detection , 2016, IEEE Transactions on Image Processing.

[15]  Roberto Caldelli,et al.  Splicing forgeries localization through the use of first digit features , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[16]  Bo Su,et al.  Enhanced state selection Markov model for image splicing detection , 2014, EURASIP J. Wirel. Commun. Netw..

[17]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[18]  Shih-Fu Chang,et al.  Camera Response Functions for Image Forensics: An Automatic Algorithm for Splicing Detection , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Manuel Menezes de Oliveira Neto,et al.  Image forgery detection confronts image composition , 2017, Comput. Graph..

[20]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[21]  Davide Cozzolino,et al.  Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[22]  Luisa Verdoliva,et al.  A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.

[23]  Chien-Ping Chang,et al.  Detection of copy-move image forgery using histogram of orientated gradients , 2015, Inf. Sci..

[24]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[25]  Davide Cozzolino,et al.  Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[26]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[27]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[28]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[29]  El-Sayed M. El-Alfy,et al.  Combining spatial and DCT based Markov features for enhanced blind detection of image splicing , 2014, Pattern Analysis and Applications.

[30]  Yiannis Kompatsiaris,et al.  Large-scale evaluation of splicing localization algorithms for web images , 2017, Multimedia Tools and Applications.

[31]  Mauro Barni,et al.  Counter-forensics of SIFT-based copy-move detection by means of keypoint classification , 2013, EURASIP J. Image Video Process..

[32]  Wei Su,et al.  Steganalysis Versus Splicing Detection , 2008, IWDW.

[33]  Alessandro Piva,et al.  Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[34]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[35]  Mauro Barni,et al.  A Framework for Decision Fusion in Image Forensics Based on Dempster–Shafer Theory of Evidence , 2013, IEEE Transactions on Information Forensics and Security.

[36]  Jing Dong,et al.  Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.

[37]  Wen Zhang,et al.  Smartphone Photography in Urban China , 2017 .

[38]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[39]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[40]  David G. Lowe,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.

[41]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[42]  Kimberley A. Wade,et al.  Can people identify original and manipulated photos of real-world scenes? , 2017, Cognitive Research: Principles and Implications.

[43]  Andrew C. Gallagher Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).

[44]  Hongtao Lu,et al.  Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..

[45]  Sonja Grgic,et al.  CoMoFoD — New database for copy-move forgery detection , 2013, Proceedings ELMAR-2013.

[46]  Davide Cozzolino,et al.  Detection of GAN-Generated Fake Images over Social Networks , 2018, 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).

[47]  S. Govindarajulu,et al.  A Comparison of SIFT, PCA-SIFT and SURF , 2012 .

[48]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[49]  Chi-Man Pun,et al.  Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.

[50]  Wang Zhi-quan,et al.  Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .

[51]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[52]  Rainer Böhme,et al.  The Dresden Image Database for Benchmarking Digital Image Forensics , 2010, J. Digit. Forensic Pract..

[53]  Muhammad Ghulam,et al.  Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors , 2015, Int. J. Artif. Intell. Tools.

[54]  Luis Mateus Rocha,et al.  Singular value decomposition and principal component analysis , 2003 .

[55]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[56]  Jan Flusser,et al.  Degraded Image Analysis: An Invariant Approach , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[57]  Luc Van Gool,et al.  SURF: Speeded Up Robust Features , 2006, ECCV.

[58]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[59]  Cong Geng,et al.  Face recognition using sift features , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[60]  Yun Q. Shi,et al.  A natural image model approach to splicing detection , 2007, MM&Sec.

[61]  Azeddine Beghdadi,et al.  Blind inpainting forgery detection , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[62]  Christine Guillemot,et al.  Image Inpainting : Overview and Recent Advances , 2014, IEEE Signal Processing Magazine.

[63]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[64]  Jing Dong,et al.  Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[65]  Adam Finkelstein,et al.  PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, SIGGRAPH 2009.

[66]  K. Sitara,et al.  Digital video tampering detection: An overview of passive techniques , 2016, Digit. Investig..

[67]  Yan Ke,et al.  PCA-SIFT: a more distinctive representation for local image descriptors , 2004, CVPR 2004.

[68]  Christian Riess,et al.  Exposing Digital Image Forgeries by Illumination Color Classification , 2013, IEEE Transactions on Information Forensics and Security.

[69]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[70]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[71]  Mauro Barni,et al.  Removal and injection of keypoints for SIFT-based copy-move counter-forensics , 2013, EURASIP J. Inf. Secur..

[72]  Patrick Pérez,et al.  Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.

[73]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[74]  Jing Dong,et al.  Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[75]  Jiwu Huang,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[76]  P. Langley Intelligent Behavior in Humans and Machines , 2012 .

[77]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[78]  Paolo Bestagini,et al.  Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks , 2017, J. Vis. Commun. Image Represent..

[79]  C.G. Patil,et al.  Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[80]  Jonathan Goh,et al.  A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection , 2015, Int. J. Electron. Secur. Digit. Forensics.

[81]  Ming-Kuei Hu,et al.  Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.

[82]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[83]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[84]  Muhammad Ghulam,et al.  Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.

[85]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[86]  Hong-Yuan Mark Liao,et al.  An efficient expanding block algorithm for image copy-move forgery detection , 2013, Inf. Sci..

[87]  Davide Cozzolino,et al.  Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[88]  Yiming Pi,et al.  Image-splicing forgery detection based on local binary patterns of DCT coefficients , 2015, Secur. Commun. Networks.

[89]  Tsuhan Chen,et al.  Image authentication by detecting traces of demosaicing , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[90]  Jiwu Huang,et al.  Localization of Diffusion-Based Inpainting in Digital Images , 2017, IEEE Transactions on Information Forensics and Security.

[91]  Can Chen,et al.  Image Splicing Detection via Camera Response Function Analysis , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[92]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[93]  Xingming Sun,et al.  A robust forgery detection algorithm for object removal by exemplar-based image inpainting , 2017, Multimedia Tools and Applications.

[94]  Yong Ho Moon,et al.  Efficient Markov feature extraction method for image splicing detection using maximization and threshold expansion , 2016, J. Electronic Imaging.

[95]  Jing Dong,et al.  Optimized 3D Lighting Environment Estimation for Image Forgery Detection , 2017, IEEE Transactions on Information Forensics and Security.

[96]  B. S. Manjunath,et al.  Detection and Localization of Image Forgeries Using Resampling Features and Deep Learning , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[97]  John F. Roddick,et al.  An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..

[98]  Asoke K. Nandi,et al.  Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[99]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[100]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[101]  Adobe Creative Team Adobe Photoshop CC Classroom in a Book , 2013 .

[102]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[103]  I-Cheng Chang,et al.  A forgery detection algorithm for exemplar-based inpainting images using multi-region relation , 2013, Image Vis. Comput..

[104]  Juan E. Gilbert,et al.  Human Trust Factors in Image Analysis , 2018, Advances in Human Error, Reliability, Resilience, and Performance.

[105]  A. Piva An Overview on Image Forensics , 2013 .

[106]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[107]  Paolo Bestagini,et al.  Tampering Detection and Localization Through Clustering of Camera-Based CNN Features , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[108]  Jianhua Li,et al.  Passive Image-Splicing Detection by a 2-D Noncausal Markov Model , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[109]  Manuel Menezes de Oliveira Neto,et al.  Humans are easily fooled by digital images , 2017, Comput. Graph..

[110]  Jiwu Huang,et al.  Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.

[111]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[112]  Muhammad Ghulam,et al.  Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors , 2013, Int. J. Artif. Intell. Tools.

[113]  Edoardo Ardizzone,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < , 2007 .

[114]  Alex ChiChung Kot,et al.  Blurred Image Splicing Localization by Exposing Blur Type Inconsistency , 2015, IEEE Transactions on Information Forensics and Security.

[115]  Jing Zhang,et al.  A new approach merging markov and DCT features for image splicing detection , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[116]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[117]  Saeed Aghabozorgi,et al.  Improving RLRN Image Splicing Detection with the Use of PCA and Kernel PCA , 2014, TheScientificWorldJournal.

[118]  James F. O'Brien,et al.  Exposing photo manipulation with inconsistent shadows , 2013, TOGS.

[119]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[120]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[121]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[122]  Yu Chen,et al.  An Improved Double Compression Detection Method for JPEG Image Forensics , 2012, 2012 IEEE International Symposium on Multimedia.

[123]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[124]  Qing Wang,et al.  Double JPEG compression forensics based on a convolutional neural network , 2016, EURASIP J. Inf. Secur..

[125]  B. Rotman Becoming beside ourselves , 2008 .

[126]  Stefan Winkler,et al.  COVERAGE — A novel database for copy-move forgery detection , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[127]  Anderson Rocha,et al.  Image Splicing Detection Through Illumination Inconsistencies and Deep Learning , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[128]  Gilbert L. Peterson Forensic Analysis of Digital Image Tampering , 2005, IFIP Int. Conf. Digital Forensics.

[129]  Jing Dong,et al.  CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[130]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[131]  Anderson Rocha,et al.  Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.

[132]  Jichang Guo,et al.  Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.

[133]  Ying Zhang,et al.  Image Region Forgery Detection: A Deep Learning Approach , 2016, SG-CRC.

[134]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[135]  Philipp Koehn,et al.  Statistical Significance Tests for Machine Translation Evaluation , 2004, EMNLP.

[136]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[137]  Hongyuan Li,et al.  Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[138]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[139]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[140]  Ahmad Mahmoudi Aznaveh,et al.  Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.

[141]  Jing Dong,et al.  A Survey of Passive Image Tampering Detection , 2009, IWDW.

[142]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[143]  Sebastiano Battiato,et al.  Multimedia Forensics: discovering the history of multimedia contents , 2016, CompSysTech.

[144]  Jing Dong,et al.  Exploring DCT Coefficient Quantization Effects for Local Tampering Detection , 2014, IEEE Transactions on Information Forensics and Security.

[145]  Qiong Wu,et al.  Detection of digital doctoring in exemplar-based inpainted images , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[146]  Jessica J. Fridrich,et al.  On detection of median filtering in digital images , 2010, Electronic Imaging.

[147]  Tao Jing,et al.  Image splicing detection based on moment features and Hilbert-Huang Transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[148]  Michael Riegler,et al.  A Crowdsourced Data Set of Edited Images Online , 2014, CrowdMM '14.

[149]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[150]  Xuemin Wu,et al.  Image Splicing Detection Using Illuminant Color Inconsistency , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[151]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[152]  Mohamed Deriche,et al.  A bibliography of pixel-based blind image forgery detection techniques , 2015, Signal Process. Image Commun..

[153]  Paolo Bestagini,et al.  First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.

[154]  Miao Liao,et al.  Detection of tampered region for JPEG images by using mode-based first digit features , 2012, EURASIP J. Adv. Signal Process..

[155]  Bin Li,et al.  Copy-move forgery detection in the presence of similar but genuine objects , 2017, 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP).

[156]  Wei Su,et al.  Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.

[157]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[158]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[159]  Jing Dong,et al.  Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise , 2010, IWDW.

[160]  Soo-Chang Pei,et al.  Detecting digital tampering by blur estimation , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[161]  A. De Rosa,et al.  Unsupervised fusion for forgery localization exploiting background information , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[162]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[163]  Yiannis Kompatsiaris,et al.  Detecting image splicing in the wild (WEB) , 2015, 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

[164]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[165]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[166]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[167]  Miao Liao,et al.  Tampered region detection of inpainting JPEG images , 2013 .

[168]  Zaoshan Liang,et al.  An efficient forgery detection algorithm for object removal by exemplar-based image inpainting , 2015, J. Vis. Commun. Image Represent..

[169]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[170]  Giulia Boato,et al.  RAISE: a raw images dataset for digital image forensics , 2015, MMSys.

[171]  Paolo Bestagini,et al.  Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[172]  Wei Lu,et al.  Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..

[173]  K. Vijayalakshmi,et al.  Digital image forgery detection and estimation by exploring basic image manipulations , 2012, Digit. Investig..

[174]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[175]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .