A bibliography of pixel-based blind image forgery detection techniques

With the advent of powerful image editing tools, manipulating images and changing their content is becoming a trivial task. Now, you can add, change or delete significant information from an image, without leaving any visible signs of such tampering. With more than several millions pictures uploaded daily to the net, the move towards paperless workplaces, and the introduction of e-Government services everywhere, it is becoming important to develop robust detection methods to identify image tampering operations and validate the credibility of digital images. This led to major research efforts in image forensics for security applications with focus on image forgery detection and authentication. The study of such detection techniques is the main focus of this paper. In particular, we provide a comprehensive survey of different forgery detection techniques, complementing the limitations of existing reviews in the literature. The survey covers image copy-move forgery, splicing, forgery due to resampling, and the newly introduced class of algorithms, namely image retouching. We particularly discuss in detail the class of pixel-based techniques which are the most commonly used approaches, as these do not require any a priori information about the type of tampering. The paper can be seen as a major attempt to provide an up-to-date overview of the research work carried in this all-important field of multimedia. HighlightsA new comprehensive survey of pixel-based forgery detection methods is presented.A framework for grouping different forgery detection algorithms is described.We outline the strengths and weaknesses of research efforts in forgery detection.Numerous tables and figures, analyzing existing algorithms, are discussed.An extensive list of references covering the work of the last decade is provided.

[1]  K. J. Ray Liu,et al.  Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Muhammad Ghulam,et al.  Image forgery detection using steerable pyramid transform and local binary pattern , 2013, Machine Vision and Applications.

[3]  K. J. Ray Liu,et al.  Anti-forensics of digital image compression , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Davide Cozzolino,et al.  Copy-move forgery detection based on PatchMatch , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[5]  Wei Weimin,et al.  Notice of RetractionEstimation of rescaling factor and detection of image splicing , 2008, 2008 11th IEEE International Conference on Communication Technology.

[6]  Babak Mahdian,et al.  A bibliography on blind methods for identifying image forgery , 2010, Signal Process. Image Commun..

[7]  Yao Zhao,et al.  Anti-forensics of contrast enhancement in digital images , 2010, MM&Sec '10.

[8]  Hao-Chiang Hsu,et al.  Detection of copy-move forgery image using Gabor descriptor , 2012, Anti-counterfeiting, Security, and Identification.

[9]  Zaoshan Liang,et al.  An efficient forgery detection algorithm for object removal by exemplar-based image inpainting , 2015, J. Vis. Commun. Image Represent..

[10]  Thirapiroon Thongkamwitoon,et al.  An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Jason Weston,et al.  Gene Selection for Cancer Classification using Support Vector Machines , 2002, Machine Learning.

[12]  Rainer Böhme,et al.  Synthesis of color filter array pattern in digital images , 2009, Electronic Imaging.

[13]  Liu Guang-jie,et al.  Robust forensics for image regional duplication and forgery based on DWT and Zernike moment , 2009 .

[14]  Ting Zhang,et al.  Copy-Move Forgery Detection Based on SVD in Digital Image , 2009, 2009 2nd International Congress on Image and Signal Processing.

[15]  Yao Zhao,et al.  Forensic detection of median filtering in digital images , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[16]  Nasir D. Memon,et al.  Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[17]  Stefano Tubaro,et al.  Countering JPEG anti-forensics , 2011, 2011 18th IEEE International Conference on Image Processing.

[18]  Pier Luigi Dragotti,et al.  An investigation into aliasing in images recaptured from an LCD monitor using a digital camera , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[19]  Vivek Kumar Singh Fast and Efficient Region Duplication Detection in Digital Images Using Sub-Blocking Method , 2011 .

[20]  XiaoBing Kang,et al.  Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.

[21]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[22]  Saiqa Khan,et al.  Reduced Time Complexity for Detection of Copy-Move Forgery Using Discrete Wavelet Transform , 2010 .

[23]  K. J. Ray Liu,et al.  Undetectable image tampering through JPEG compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[24]  Zhang Xiong,et al.  JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality , 2014, IEEE Transactions on Information Forensics and Security.

[25]  Weiyao Lin,et al.  Survey on blind image forgery detection , 2013, IET Image Processing.

[26]  John F. Roddick,et al.  An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns , 2013, J. Inf. Hiding Multim. Signal Process..

[27]  Asoke K. Nandi,et al.  Exposing duplicated regions affected by reflection, rotation and scaling , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[28]  Xunyu Pan,et al.  Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.

[29]  Yun Q. Shi,et al.  A natural image model approach to splicing detection , 2007, MM&Sec.

[30]  Azeddine Beghdadi,et al.  Blind inpainting forgery detection , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[31]  David Vazquez-Padin,et al.  Prefilter design for forensic resampling estimation , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[32]  Ahmad Faraahi,et al.  DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[33]  Rainer Böhme,et al.  Hiding Traces of Resampling in Digital Images , 2008, IEEE Transactions on Information Forensics and Security.

[34]  Wei Su,et al.  Rake transform and edge statistics for image forgery detection , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[35]  Yao Zhao,et al.  Forensic estimation of gamma correction in digital images , 2010, 2010 IEEE International Conference on Image Processing.

[36]  M. Shamim Hossain,et al.  Robust copy-move image forgery detection using undecimated wavelets and Zernike moments , 2011, ICIMCS '11.

[37]  Luisa Verdoliva,et al.  PRNU-based forgery detection with regularity constraints and global optimization , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[38]  FanZhigang,et al.  Identification of bitmap compression history , 2003 .

[39]  Hany Farid,et al.  Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.

[40]  Jing Dong,et al.  Run-Length and Edge Statistics Based Approach for Image Splicing Detection , 2009, IWDW.

[41]  Heung-Kyu Lee,et al.  Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.

[42]  Alpana A. Borse,et al.  Exploring Duplicated Regions in Natural Images , 2012 .

[43]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[44]  Stefano Tubaro,et al.  Revealing the Traces of JPEG Compression Anti-Forensics , 2013, IEEE Transactions on Information Forensics and Security.

[45]  Andrew C. Gallagher Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).

[46]  Gaobo Yang,et al.  Anti-Forensics for Unsharp Masking Sharpening in Digital Images , 2013, Int. J. Digit. Crime Forensics.

[47]  Zhang Xiong,et al.  A variational approach to JPEG anti-forensics , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[48]  Shiguo Lian,et al.  A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..

[49]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[50]  Babak Mahdian,et al.  Detection of Resampling Supplemented with Noise Inconsistencies Analysis for Image Forensics , 2008, 2008 International Conference on Computational Sciences and Its Applications.

[51]  Babak Mahdian,et al.  On Periodic Properties of Interpolation and Their Application To Image Authentication , 2007 .

[52]  Jessica J. Fridrich,et al.  On detection of median filtering in digital images , 2010, Electronic Imaging.

[53]  Nenghai Yu,et al.  Rotation robust detection of copy-move forgery , 2010, 2010 IEEE International Conference on Image Processing.

[54]  Matthias Kirchner,et al.  Linear row and column predictors for the analysis of resized images , 2010, MM&Sec '10.

[55]  Tao Jing,et al.  Image splicing detection based on moment features and Hilbert-Huang Transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[56]  Hai-Dong Yuan Identification of global histogram equalization by modeling gray-level cumulative distribution , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[57]  Korris Fu-Lai Chung,et al.  Revealing digital fakery using multiresolution decomposition and higher order statistics , 2011, Eng. Appl. Artif. Intell..

[58]  Wei Sun,et al.  Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.

[59]  Matthias Kirchner,et al.  Spectral methods to determine the exact scaling factor of resampled digital images , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.

[60]  Asoke K. Nandi,et al.  Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics , 2011, Signal Process..

[61]  Xunyu Pan,et al.  Detecting image region duplication using SIFT features , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[62]  Mohamadian Zahra Image Duplication Forgery Detection using Two Robust Features , 2012 .

[63]  Fernando Pérez-González,et al.  Multiple JPEG compression detection by means of Benford-Fourier coefficients , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[64]  Babak Mahdian,et al.  A cyclostationarity analysis applied to image forensics , 2009, 2009 Workshop on Applications of Computer Vision (WACV).

[65]  B L Shivakumar,et al.  Automated Forensic Method for Copy-Move Forgery Detection based on Harris Interest Points and SIFT Descriptors , 2011 .

[66]  Alex ChiChung Kot,et al.  Splicing detection in out-of-focus blurred images , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[67]  Nasir D. Memon,et al.  Source camera identification based on CFA interpolation , 2005, IEEE International Conference on Image Processing 2005.

[68]  Yao Zhao,et al.  Forensic detection of noise addition in digital images , 2014, J. Electronic Imaging.

[69]  Yiming Pi,et al.  Revealing Image Splicing Forgery Using Local Binary Patterns of DCT Coefficients , 2012 .

[70]  Muhammad Ghulam,et al.  Evaluation of Image Forgery Detection Using Multi-Scale Weber Local Descriptors , 2015, Int. J. Artif. Intell. Tools.

[71]  Shih-Fu Chang,et al.  A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[72]  Hongtao Lu,et al.  Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..

[73]  Yun Q. Shi,et al.  Edge Perpendicular Binary Coding for USM Sharpening Detection , 2015, IEEE Signal Processing Letters.

[74]  Hany Farid,et al.  Detecting Photographic Composites of People , 2008, IWDW.

[75]  Chengyun Yang,et al.  Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[76]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[77]  Edoardo Ardizzone,et al.  Copy-move forgery detection via texture description , 2010, MiFor '10.

[78]  Paul Lester Photojournalism: An Ethical Approach/MacIntosh Disk and Workbook , 1991 .

[79]  Paul Martin Lester,et al.  Photojournalism: An Ethical Approach , 1991 .

[80]  Roberto Caldelli,et al.  Splicing forgeries localization through the use of first digit features , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[81]  Rainer Böhme,et al.  Countering Counter-Forensics: The Case of JPEG Compression , 2011, Information Hiding.

[82]  Mauro Barni,et al.  Second-Order Statistics Analysis to Cope With Contrast Enhancement Counter-Forensics , 2015, IEEE Signal Processing Letters.

[83]  Yong-In Yun,et al.  A new estimation approach of resampling factors using threshold-based peak detection , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[84]  Muhammad Ghulam,et al.  Splicing image forgery detection based on DCT and Local Binary Pattern , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[85]  Bin Li,et al.  Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[86]  El-Sayed M. El-Alfy,et al.  Combining spatial and DCT based Markov features for enhanced blind detection of image splicing , 2014, Pattern Analysis and Applications.

[87]  Eero P. Simoncelli,et al.  On Advances in Statistical Modeling of Natural Images , 2004, Journal of Mathematical Imaging and Vision.

[88]  Fernando Pérez-González,et al.  On the role of differentiation for resampling detection , 2010, 2010 IEEE International Conference on Image Processing.

[89]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[90]  S. Prasad,et al.  On Resampling Detection and its Application to Detect Image Tampering , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[91]  Hamid Abdulla Jallb Al-Tulea Improving RLRN Image Splicing Detection with the Use of PCA and Kernel PCA , 2014 .

[92]  Yun Q. Shi,et al.  A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern , 2013, IWDW.

[93]  Pier Luigi Dragotti,et al.  Modelling radial distortion chains for video recapture detection , 2013, 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP).

[94]  Ricardo L. de Queiroz,et al.  Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..

[95]  Jing Zhang,et al.  A new approach for detecting Copy-Move forgery in digital images , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[96]  Stefano Tubaro,et al.  The cost of JPEG compression anti-forensics , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[97]  Min Wu,et al.  Information Forensics: An Overview of the First Decade , 2013, IEEE Access.

[98]  S. Sons Detection of Region Duplication Forgery in Digital Images Using SURF , 2011 .

[99]  Mohamed Deriche,et al.  An Image Quality Index Based on Mutual Information and Neural Networks , 2013, Arabian Journal for Science and Engineering.

[100]  Adam Finkelstein,et al.  PatchMatch: a randomized correspondence algorithm for structural image editing , 2009, SIGGRAPH 2009.

[101]  Yuenan Li Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. , 2013, Forensic science international.

[102]  K. J. Ray Liu,et al.  Forensic estimation and reconstruction of a contrast enhancement mapping , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[103]  H. Farid Image Forgery Detection -- A survey , 2009 .

[104]  Yan Ke,et al.  PCA-SIFT: a more distinctive representation for local image descriptors , 2004, CVPR 2004.

[105]  N. Sudha,et al.  Exposing Digital Image Forgeries by Detecting Discrepancies in Motion Blur , 2011, IEEE Transactions on Multimedia.

[106]  Alberto Del Bimbo,et al.  Geometric tampering estimation by means of a SIFT-based forensic analysis , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[107]  Jiwu Huang,et al.  Countering anti-JPEG compression forensics , 2012, 2012 19th IEEE International Conference on Image Processing.

[108]  Muhammad Ghulam,et al.  Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..

[109]  I-Cheng Chang,et al.  A forgery detection algorithm for exemplar-based inpainting images using multi-region relation , 2013, Image Vis. Comput..

[110]  Shih-Fu Chang,et al.  A Data Set of Authentic and Spliced Image Blocks , 2004 .

[111]  A. Dantcheva Female facial aesthetics based on soft biometrics and photo-quality , 2011 .

[112]  Hany Farid,et al.  A perceptual metric for photo retouching , 2011, Proceedings of the National Academy of Sciences.

[113]  Hai-Dong Yuan,et al.  Blind Forensics of Median Filtering in Digital Images , 2011, IEEE Transactions on Information Forensics and Security.

[114]  Hwei-Jen Lin,et al.  Fast copy-move forgery detection , 2009 .

[115]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[116]  Stefano Tubaro,et al.  Discriminating multiple JPEG compressions using first digit features , 2012, APSIPA Transactions on Signal and Information Processing.

[117]  Miao Liao,et al.  Tampered region detection of inpainting JPEG images , 2013 .

[118]  Alberto Del Bimbo,et al.  Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .

[119]  Hany Farid,et al.  Detecting Digital Forgeries Using Bispectral Analysis , 1999 .

[120]  N. Ohnishi,et al.  Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[121]  Min Wu,et al.  Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images , 2009, IEEE Transactions on Information Forensics and Security.

[122]  Babak Mahdian,et al.  Detection and description of geometrically transformed digital images , 2009, Electronic Imaging.

[123]  Sun Xingming,et al.  DWT-PCA (EVD) Based Copy-move Image Forgery Detection , 2011 .

[124]  Katrin Franke,et al.  Improving the Efficiency of Digital Forensic Search by Means of the Constrained Edit Distance , 2007 .

[125]  Hui Zeng,et al.  Countering anti-forensics of median filtering , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[126]  Mauro Barni,et al.  Countering anti-forensics by means of data fusion , 2014, Electronic Imaging.

[127]  Javad Alirezaie,et al.  Robust detection of copy-move forgery using texture features , 2011, 2011 19th Iranian Conference on Electrical Engineering.

[128]  Yao Zhao,et al.  Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis , 2011, IEEE Signal Processing Letters.

[129]  K. J. Ray Liu,et al.  Wavelet-based image compression anti-forensics , 2010, 2010 IEEE International Conference on Image Processing.

[130]  K. J. Ray Liu,et al.  Anti-forensics of median filtering , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[131]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[132]  Christian Riess,et al.  On rotation invariance in copy-move forgery detection , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[133]  Matthias Kirchner On the detectability of local resampling in digital images , 2008, Electronic Imaging.

[134]  Matthias Kirchner,et al.  Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue , 2008, MM&Sec '08.

[135]  Osamah M. Al-Qershi,et al.  Passive detection of copy-move forgery in digital images: state-of-the-art. , 2013, Forensic science international.

[136]  Jan Lukás,et al.  Detecting digital image forgeries using sensor pattern noise , 2006, Electronic Imaging.

[137]  Christian Riess,et al.  A Study on Features for the Detection of Copy-Move Forgeries , 2010, Sicherheit.

[138]  Qiong Wu,et al.  A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[139]  Matthias Kirchner,et al.  On resampling detection in re-compressed images , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[140]  Shih-Fu Chang,et al.  Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[141]  Micah K. Johnson,et al.  Metric Measurements on a Plane from a Single Image , 2006 .

[142]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[143]  Katrin Eismann Photoshop Restoration and Retouching , 2001 .

[144]  Alessandro Neri,et al.  Image forgery detection by means of no-reference quality metrics , 2012, Other Conferences.

[145]  Azeddine Beghdadi,et al.  A perceptual image completion approach based on a hierarchical optimization scheme , 2014, Signal Process..

[146]  Paolo Bestagini,et al.  Multi-Clue Image Tampering Localization , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[147]  Wei Lu,et al.  Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..

[148]  Xu Bo,et al.  Image Copy-Move Forgery Detection Based on SURF , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[149]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[150]  Roberto Caldelli,et al.  Exploiting perceptual quality issues in countering SIFT-based Forensic methods , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[151]  Alberto Del Bimbo,et al.  Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..

[152]  Jie Xu,et al.  SCUT-FBP: A Benchmark Dataset for Facial Beauty Perception , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.

[153]  Alex ChiChung Kot,et al.  Identification of recaptured photographs on LCD screens , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[154]  K BirajdarGajanan,et al.  Digital image forgery detection using passive techniques , 2013 .

[155]  Jing Zhang,et al.  A new approach merging markov and DCT features for image splicing detection , 2009, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[156]  Azadeh Mansouri,et al.  Adaptive matching for copy-move Forgery detection , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[157]  Fei Peng,et al.  Identification of Natural Images and Computer‐Generated Graphics Based on Statistical and Textural Features , 2015, Journal of forensic sciences.

[158]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[159]  Gopu Darsan,et al.  Blind Detection Method for Video Inpainting Forgery , 2012 .

[160]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[161]  A. Piva An Overview on Image Forensics , 2013 .

[162]  Wei Su,et al.  Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.

[163]  Minglun Gong,et al.  An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).

[164]  Heung-Kyu Lee,et al.  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments , 2013, IEEE Transactions on Information Forensics and Security.

[165]  Davide Cozzolino,et al.  Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[166]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[167]  Azeddine Beghdadi,et al.  Perceptual quality assessment for color image inpainting , 2013, 2013 IEEE International Conference on Image Processing.

[168]  Hatice Gunes,et al.  Assessing facial beauty through proportion analysis by image processing and supervised learning , 2006, Int. J. Hum. Comput. Stud..

[169]  Yu Zhang,et al.  Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[170]  Wang Zhi-quan,et al.  Fast and Robust Forensics for Image Region-duplication Forgery , 2009 .

[171]  Jessica Fridrich,et al.  Detection of Copy-Move Forgery in Digital Images , 2004 .

[172]  Zhiquan Wang,et al.  Fast and Robust Forensics for Image Region-duplication Forgery: Fast and Robust Forensics for Image Region-duplication Forgery , 2010 .

[173]  Chen Haipeng Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .

[174]  Matthias Kirchner Notes on Digital Image Forensics and Counter-Forensics , 2012 .

[175]  Rainer Böhme,et al.  Counter-Forensics: Attacking Image Forensics , 2013 .

[176]  Vijay H. Mankar,et al.  Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..

[177]  Hongyuan Li,et al.  Detection of Image Region Duplication Forgery Using Model with Circle Block , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[178]  Md. Khayrul Bashar,et al.  Wavelet-Based Multiresolution Features for Detecting Duplications in Images , 2007, MVA.

[179]  Luo Wei,et al.  Robust Detection of Region-Duplication Forgery in Digital Image , 2007 .

[180]  Hany Farid,et al.  Exposing digital forgeries through chromatic aberration , 2006, MM&Sec '06.

[181]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[182]  K. J. Ray Liu,et al.  Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.

[183]  Adam Finkelstein,et al.  The Generalized PatchMatch Correspondence Algorithm , 2010, ECCV.

[184]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[185]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[186]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[187]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[188]  Yao Zhao,et al.  Detection of image sharpening based on histogram aberration and ringing artifacts , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[189]  Muhammad Ghulam,et al.  Accurate and robust localization of duplicated region in copy–move image forgery , 2014, Machine Vision and Applications.

[190]  Davide Cozzolino,et al.  Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[191]  Robert C. Bolles,et al.  Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.

[192]  Min Wu,et al.  Nonintrusive component forensics of visual sensors using output images , 2007, IEEE Transactions on Information Forensics and Security.

[193]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[194]  Mohamed A. Deriche,et al.  A review on copy move image forgery detection techniques , 2014, 2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices (SSD14).

[195]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[196]  Xuan-jing Shen,et al.  Blind identification algorithm for retouched images based on Bi-Laplacian: Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .

[197]  Mohamed A. Deriche,et al.  A fast no reference image quality assessment using laws texture moments , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[198]  Patrick Pérez,et al.  Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.

[199]  Ingemar J. Cox,et al.  Normalized Energy Density-Based Forensic Detection of Resampled Images , 2012, IEEE Transactions on Multimedia.

[200]  Jun Wang,et al.  Copy-move forgery detection based on PHT , 2012, 2012 World Congress on Information and Communication Technologies.

[201]  Nasir D. Memon,et al.  An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[202]  Jianhua Li,et al.  A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection , 2011, IWDW.

[203]  Jing Dong,et al.  Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[204]  Tieniu Tan,et al.  Image tampering detection based on stationary distribution of Markov chain , 2010, 2010 IEEE International Conference on Image Processing.

[205]  Yao Zhao,et al.  Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.

[206]  Mauro Barni,et al.  Watermarking Systems Engineering (Signal Processing and Communications, 21) , 2004 .

[207]  Wei Su,et al.  Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.

[208]  Xiaochun Cao,et al.  Detecting photographic composites using two-view geometrical constraints , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[209]  Babak Mahdian,et al.  Detection of copy-move forgery using a method based on blur moment invariants. , 2007, Forensic science international.

[210]  Anderson Rocha,et al.  Image Phylogeny by Minimal Spanning Trees , 2012, IEEE Transactions on Information Forensics and Security.

[211]  Oscar C. Au,et al.  Alternative Anti-Forensics Method for Contrast Enhancement , 2011, IWDW.

[212]  David Vazquez-Padin,et al.  Two-dimensional statistical test for the presence of almost cyclostationarity on images , 2010, 2010 IEEE International Conference on Image Processing.

[213]  K. Vijayalakshmi,et al.  Digital image forgery detection and estimation by exploring basic image manipulations , 2012, Digit. Investig..

[214]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[215]  Francesco G. B. De Natale,et al.  Discrimination between computer generated and natural human faces based on asymmetry information , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[216]  Xinpeng Zhang,et al.  Detection of Image Region-Duplication with Rotation and Scaling Tolerance , 2010, ICCCI.

[217]  A FischlerMartin,et al.  Random sample consensus , 1981 .

[218]  Rainer Böhme,et al.  Can we trust digital image forensics? , 2007, ACM Multimedia.

[219]  Jing Dong,et al.  New developments in color image tampering detection , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[220]  K. J. Ray Liu,et al.  Forensically determining the order of signal processing operations , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[221]  Jing Dong,et al.  CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[222]  Anderson Rocha,et al.  Vision of the unseen: Current trends and challenges in digital image and video forensics , 2011, CSUR.

[223]  Luisa Verdoliva,et al.  On the influence of denoising in PRNU based forgery detection , 2010, MiFor '10.

[224]  Mohd Aizaini Maarof,et al.  Efficient image duplicated region detection model using sequential block clustering , 2013, Digit. Investig..

[225]  Jianhua Li,et al.  Detecting Digital Image Splicing in Chroma Spaces , 2010, IWDW.

[226]  Rongrong Ni,et al.  Forensic identification of resampling operators: A semi non-intrusive approach. , 2012, Forensic science international.

[227]  Hany Farid,et al.  Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[228]  Jan P. Allebach,et al.  Forensic techniques for classifying scanner, computer generated and digital camera images , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[229]  Mauro Barni,et al.  Forensic Analysis of SIFT Keypoint Removal and Injection , 2014, IEEE Transactions on Information Forensics and Security.

[230]  K. J. Ray Liu,et al.  Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.