Passive Aproaches for Detecting Image Tampering: A Review

This paper defines the presently used methods and approaches in the domain of digital image forgery detection. A survey of a recent study is explored including an examination of the current techniques and passive approaches in detecting image tampering. This area of research is relatively new and only a few sources exist that directly relate to the detection of image forgeries. Passive, or blind, approaches for detecting image tampering are regarded as a new direction of research. In recent years, there has been significant work performed in this highly active area of research. Passive approaches do not depend on hidden data to detect image forgeries, but only utilize the statistics and/or content of the image in question to verify its genuineness. The specific types of forgery detection techniques are discussed below.

[1]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[2]  Rongrong Wang,et al.  Detecting doctored images using camera response normality and consistency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[3]  Alex ChiChung Kot,et al.  Accurate Detection of Demosaicing Regularity for Digital Image Forensics , 2009, IEEE Transactions on Information Forensics and Security.

[4]  Hagit Hel-Or,et al.  Digital Image Forgery Detection Based on Lens and Sensor Aberration , 2011, International Journal of Computer Vision.

[5]  Ee-Chien Chang,et al.  Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[6]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[7]  Husrev T. Sencar,et al.  Overview of State-of-the-Art in Digital Image Forensics , 2007 .

[8]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Jan Lukás,et al.  Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .

[10]  Siwei Lyu,et al.  How realistic is photorealistic , 2005 .

[11]  Sevinc Bayram,et al.  IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION , 2005 .

[12]  Wei Lu,et al.  Digital image forensics using statistical features and neural network classifier , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[13]  Yun Q. Shi,et al.  An Enhanced Statistical Approach to Identifying Photorealistic Images , 2009, IWDW.

[14]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[15]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[16]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[17]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[18]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[19]  Hany Farid A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo , 2010 .

[20]  Yao Zhao,et al.  Forensic estimation of gamma correction in digital images , 2010, 2010 IEEE International Conference on Image Processing.

[21]  Jiwu Huang,et al.  A Novel Method for Detecting Cropped and Recompressed Image Block , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[22]  Shih-Fu Chang,et al.  Image Splicing Detection using Camera Response Function Consistency and Automatic Segmentation , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[23]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[24]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[25]  Nasir D. Memon,et al.  Image manipulation detection , 2006, J. Electronic Imaging.

[26]  Hany Farid,et al.  A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo , 2015, J. Digit. Forensics Secur. Law.

[27]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[28]  Hany Farid,et al.  Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.

[29]  Hany Farid,et al.  Detecting Digital Forgeries Using Bispectral Analysis , 1999 .

[30]  Nenghai Yu,et al.  Camera Model Identification for JPEG Images via Tensor Analysis , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[31]  Alessandro Piva,et al.  Analysis of non-aligned double JPEG artifacts for the localization of image forgeries , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[32]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[33]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[34]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[35]  Micah K. Johnson,et al.  Metric Measurements on a Plane from a Single Image , 2006 .

[36]  Nasir D. Memon,et al.  Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust , 2008, IEEE Transactions on Information Forensics and Security.

[37]  Junfeng He,et al.  Detecting Doctored JPEG Images Via DCT Coefficient Analysis , 2006, ECCV.

[38]  Babak Mahdian,et al.  Blind methods for detecting image fakery , 2010 .

[39]  Shih-Fu Chang,et al.  Physics-motivated features for distinguishing photographic images and computer graphics , 2005, ACM Multimedia.

[40]  Matthias Kirchner,et al.  Linear row and column predictors for the analysis of resized images , 2010, MM&Sec '10.

[41]  Hany Farid,et al.  Digital Image Ballistics from JPEG Quantization , 2006 .

[42]  Mohan S. Kankanhalli,et al.  Identifying Source Cell Phone using Chromatic Aberration , 2007, 2007 IEEE International Conference on Multimedia and Expo.