Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

A Comprehensive Survey on Methods for Image Integrity

Published: 12 September 2024 Publication History

Abstract

The outbreak of digital devices on the Internet, the exponential diffusion of data (images, video, audio, and text), along with their manipulation/generation also by artificial intelligence models, such as generative adversarial networks, have created a great deal of concern in the field of forensics. A malicious use can affect relevant application domains, which often include counterfeiting biomedical images and deceiving biometric authentication systems, as well as their use in scientific publications, in the political world, and even in school activities. It has been demonstrated that manipulated pictures most likely represent indications of malicious behavior, such as photos of minors to promote child prostitution or false political statements. Following this widespread behavior, various forensic techniques have been proposed in the scientific literature over time both to defeat these spoofing attacks as well as to guarantee the integrity of the information. Focusing on image forensics, which is currently a very hot topic area in multimedia forensics, this article will present the whole scenario in which a target image could be modified. The aim of this comprehensive survey will be (1) to provide an overview of the types of attacks and contrasting techniques and (2) to evaluate to what extent the former can deceive prevention methods and the latter can identify counterfeit images. The results of this study highlight how forgery detection techniques, sometimes limited to a single type of real scenario, are not able to provide exhaustive countermeasures and could/should therefore be combined. Currently, the use of neural networks, such as convolutional neural networks, is already heading, synergistically, in this direction.

1 Introduction

With the increasingly pervasive intentional or unintentional manipulation of data (images, video, audio, and text), the focus on forgery/counterfeit detection is growing exponentially [274]. As highlighted in Figure 1, multimedia forensics is a broad disciplinary area that requires a lot of attention in terms of scientific and forensic activities. It bears the great responsibility of producing and disseminating methods to check Internet data, which is often manipulated, altered, and even generated, maliciously, with intentional anti-forensics techniques [120].
Fig. 1.
Fig. 1. The goal of forgery detection.
Restricting the scope to image forensics, which is currently a hot topic in multimedia forensics, the article will focus on image manipulation, which occurs when operations are performed on an image to modify it. In current literature, image forgery considers how the entire image is manipulated with malicious intent, whereas in image tampering, only parts of the image are intentionally modified. Image generation uses computer software or algorithms to produce an image or part of an image simulating real-world scenes. The common denominator of these classes of operations is the malicious intention to violate the integrity of an image to deceive the observer, whereas steganography has the objective of transporting secret messages from a sender to a recipient. In the latter, the image is modified so that it can store secret information invisible to the human eye, therefore maintaining the original appearance as much as possible. The goal of research in the field of image manipulation detection and identification is to examine, analyze, and define an acceptable confidence threshold to ensure data integrity and authenticity. At present, machine learning, and particularly approaches involving deep networks, are playing a supporting role both on the side of the attackers (Generative Adversarial Networks (GANs) [129]) and the defenders (Convolutional Neural Networks (CNNs) [193]), whether they are researchers, law enforcement agencies, or general operators in the forensics sector. Transparent editing operations (manipulation) for tampering, retouching, and enhancement on multimedia objects, which are uploaded or shared through social media or web platforms, alter the original content of the images, preventing them from still being considered authentic [247, 309]. However, even without manipulation, two types of artifacts inevitably remain in the image: image acquisition and compression artifacts. The intrinsic properties of these artifacts are essential forensic clues as they differ before and after the manipulation process [179, 198]. All of this leads to a lack of a sure and obvious answer on the origin of the image, the user or device capturing it, and the truthfulness and originality of the acquired scene. As a consequence, many problems arise in the field of forensics, creating a great deal of interest in the search for substantial and cutting-edge solutions. The scientific community has unanimously proposed a twofold classification of all the different approaches to assure/verify image integrity. As shown in Figure 2, “active” technologies usually embed data or signatures into the original image during its digitalization, either in the spatial or frequency domain, and “passive” technologies, which are increasingly sophisticated, are based exclusively on digital content and operate without any knowledge of either the original image or pre-defined data or signature, therefore just relying on, for example, statistical anomalies and/or artifacts. This investigation is a forensic contribution to the general scenario of forgery detection techniques. It will deal with the whole scenario where a target image could be modified. The aim will be (1) to provide an overview of the types of attacks and contrasting techniques and (2) to evaluate to what extent the former can deceive prevention methods and the latter to identify counterfeit images. The widespread diffusion of digital technologies has led, in the field of forensics, to a constant increase in cases in which the use of digital evidence has been decisive in identifying the solution. It is easy to understand how their use will soon be pervasive and well codified within forensic procedures. However, not all the approaches present in the current literature meet the requirements to be exploited in forensic activities [50]. Whenever a method is reproducible and replicable, it can be considered valid in court and/or in front of a judge, and therefore it is forensic. The evaluation of the confidence measure to obtain depends only on the common objective of the involved parties. This review has considered this forensic aspect an essential prerogative: all methods mentioned in the article have an experimental part, thus appearing as replicable and hence forensically sound. Thanks to the Budapest Convention [269, 322] and according to the reproducibility principle, digital evidence has been made admissible in courts. The Convention and the resulting regulations stipulate that all digital evidence is collected, archived, and presented according to a well-codified and recognized process. Once a scientific method has been identified, it will always be necessary to carry out an experimental evaluation phase before it can become a so-called best practice and its expected utility can be recognized by also carrying out a technology transfer action to operators in the sector. The European community boasts a network of experts (ENFSI (European Network of Forensics Science Institutes)) that promotes knowledge sharing, experience exchange, and the reaching of mutual agreements in the field of forensic sciences through the development and use of good practices and their collection in a devoted manual (ENFSI BPM1) also offering a different taxonomy that can inspire further insight into the problems dealt with. Starting from these assumptions as well as current literature, the survey projects itself into an exhaustive search for reliable and forensically sound methodologies to support technological solutions aimed above all at law enforcement agencies and forensics personnel. It will represent those treated aspects of the same problem assuming that there are counterfeits but doubting that they are always reproducible in court. This is where best practices should come into play, by possibly considering a joint use of different techniques having the same forensic purpose.
Fig. 2.
Fig. 2. Conceptual map of forgery detection methods.
Other available surveys in literature often focus on specific kinds of forgery and/or detection strategies (see, e.g., the work of Chauhan et al. [59] on keypoint-based copy-move forgery detection methods or the recent work of Zanardelli et al. [339] about deep learning approaches). This work aims to provide as wide and encompassing an account as possible of existing strategies, orienting readers in this extremely variated field. Many emerging topics like anti-forensic attacks and deepfake would deserve a deeper and wider critical analysis and discussion of open problems, which is beyond the scope of this survey. However, besides mentioning those topics, we suggest references that offer related sufficient and thorough insight. Therefore, although methodologies have evolved up to deep learning and CNNs, this survey demonstrates that the basic work done by traditional techniques, which still support and are the basis for neural networks, is still considerable and indispensable. It also strives to represent a testimony of continuity and tries to establish a common line between traditional and non-traditional approaches. It is worth noting how the statistics show the effective use of these techniques [16] in real operative scenarios. The conceptual map shown in Figure 2 proposes an updated scheme of real approaches to identify counterfeits.
The rest of the article is organized as follows. Section 2 formally introduces image forgery detection, basic concepts, the problem definition, and the workflow of blind approaches. Section 3 reviews the methods of forgery detection proposed in the current literature, and Section 4 presents an evaluation of benchmark datasets fitting this purpose. Section 5 discusses the research challenges and directions. Section 6 draws some conclusions. Finally, due to the broad scope of the subject, contrasting with the journal’s strict space restrictions, further insights, examples, and figures have been included in the online appendix available for the online version of the article.

2 Fundamentals

Image and video forensics (or forensics, for short) refers to a specific area of digital forensics [43, 255] that deals with the study and analysis of images (and videos) for their validation and use in forensics [24]. The field of image forgery detection has been developed (1) to combat the problem of image distortion in various application areas such as forensic and criminal investigation, insurance processing, surveillance systems, intelligence services, medical imaging, and journalism [214], and (2) to reply to some important and complex technological questions such as determining if an image is authentic, doctored, or computer generated [99].

2.1 What Is Image Forgery?

Counterfeiting can be defined as copying something with the intent to deceive, with it becoming a serious crime when it represents the making of realistic and fraudulent imitations of objects and documents to make them be considered authentic either for profit or to mislead surveillance systems. There is a slight difference in the law between forgery and counterfeiting, with the former referring to forging documents and images, and the latter referring to material assets such as money, securities, and consumer products. In this article, the two terms, implying intentional illegality, will be used interchangeably to identify deception. The most frequent tasks in photo manipulation are deleting/hiding a region in the image, adding a new object to the image, and misrepresenting image information [214].

2.2 Problem Definition

According to current literature [111, 213, 228, 312], forgery detection falls into two categories, namely active and passive techniques (see Figure 2). They can only extract forensic evidence if some information exists in the image [102].
Active Approach (AAFD—Active Approach to Forgery Detection) (Section 3.1.1). As the name suggests, active methods of detection (see the left side of Figure 2) focus on the information that is hidden in an image at the time of its acquisition/digitalization. Given an image, AAFD algorithms aim to detect the source and therefore forgery using
(1) watermarking, (2) digital signatures, and (3) cryptography techniques
for image authenticity confirmation. They require prior knowledge of the elements associated with the original image, digital watermarking, or digital signatures. When checking the image, if the additional information found is incorrect, the image can be identified as being tampered with; otherwise, the image is genuine. These approaches require special hardware or software to insert the authentication code inside the image before the image is distributed [225].
Passive Approach (PAFD—Passive Approach to Forgery Detection) (Section 3.1.2). Passive forensic techniques (see the right side of Figure 2) do not rely on any additional information in the image and aim to find traces left during the image processing phases (acquisition and storage). They extract features from an image to detect the forgery. These so-called “blind methods” can be classified as (1) against tampering operations (forgery type-dependent or forgery type-independent), (2) based on intrinsic regularities and inconsistencies), and (3) (handling natural and computer graphics/Artificial Intelligence (AI) images).

2.3 Some Basic Concepts

This section discusses some concepts that have been mentioned in Section 1 but will not be included anymore in the following. However, it is worth mentioning their role.
Image generation encompasses methods that use machine and deep learning based techniques to produce artificial images containing real-world objects and scenes from an existing dataet: generating a fake image does not necessarily imply a forgery. For this, image generation is not considered to be a part of image forgery. However, the advent of deepfake (from deep learning and fake) [4, 267] is quickly changing the way image generation is regarded by the forensic community [13, 131, 135, 170, 192, 310, 321]. Basically, it refers to a recent manipulation technique allowing to synthesizing of images or videos from scratch, such as using GANs and overimposing them on existing images or videos [134]. For example, it allows counterfeiting the identity of a person in a video/photo.
Image warping is the geometric deformation of a single object in a given image. Warping can be used for correcting image distortion as well as for creative purposes.
Image resizing is simply changing the size of the images without changing the number of pixels. When an image is resized, its pixel information changes. For example, if an image is reduced in size, all unnecessary pixel information will be deleted from the photo editor. When an image is enlarged, the photo editor must create and add new pixel information, based on its best guesses, to achieve a larger size.

2.4 Generalized Workflow of the Passive (or Blind) Forgery Detection Process on the Image

In the passive approaches, before even getting to the identification of the kind of counterfeit, the main objective is to classify whether a given image is original (or authentic) or forged. A generalized scheme includes the following steps and is among the most used in the literature [1, 6, 94, 206, 213, 228, 273].
Image Pre-Processing. Before dealing with any image, an initial optional step [94], almost always enforced in best practices, is image pre-processing. Possible operations performed on the image include image filtering, image retouching, cropping, resizing, low-bypass filtering, the transformation from RGB to grayscale, and the modification of Discrete Cosine Transform (DCT) coefficients. The choice of this step and the type of operation also depends on the calculation.
Feature Extraction. Given an input image, feature selection provides both a separation between different image classes and a decrease in computational complexity [153]. Of course, more traditional methods extract handcrafted features that are engineered according to the chosen method and usually play a specific role in the procedure depending on the kind of forgery and the detection strategy. When deep learning based methods are rather involved in the workflow, the feature extraction step is completely demanded by the network so that the obtained embeddings are autonomously learned by the architecture and lack a precise explanation.
Feature Matching and Filtering. A classifier, such as latent Dirichlet allocation, Support Vector Machine (SVM), or a neural network in general, will be chosen according to the set of features extracted from the previous step. It will determine if the image is original or not [97, 203, 205].
Image Post-Processing Operations. Tampering operations often involve post-processing operations to smooth the boundaries of tampered regions, to make the final artifact less visually suspectable (active post-processing) or may be unintentionally introduced to tampered images during data transmission, such as JPEG compression, noise adding, and color reduction (passive post-processing) [350]. However, they can help detect those manipulations, such as location tracking, that might be included in the forged images. To improve the forgery localization, several mathematical morphological operations could be performed [123, 228].

3 Notable Methods Overview

Digital image forgery started to occur a decade after the first image was created in various ways. At present, it exploits various image manipulation software, available for almost all trading platforms. Among the first technical issues to be addressed, the identification of the forgery is especially relevant since the authenticity of the images also follows from it. To achieve this, several forgery detection techniques were used which will be examined in this section (see Figure 2). For the sake of completeness, the information is outlined later in Table 6. Special attention will be given to forensics-viable methods according to the Budapest Convention.

3.1 Taxonomy of Digital Forgery Detection Methods

Digital image forgery detection methods aim to detect those manipulations of a digital image that change the semantics of the visual message. As discussed earlier, the digital forensics techniques are classified into two categories [274]:
active (see the left side of Figure 2) and passive (see the right side of Figure 2).
This taxonomy depends on the accessibility of the original picture. Each strategy can be further sub-partitioned (see Figure 2).

3.1.1 Active Methods.

Active methods are robust mechanisms for safeguarding the integrity of digital images and exploiting certain information entered into them during the process of image acquisition and digitalization [58]. Alterations in an image are detected by analyzing such embedded (known) data. The main applications of these image authentication methods include intellectual and owner identification. They are classified according to whether they ensure strict integrity, content authentication, and the storage strategy of authentication data (i.e., watermark or external signature). These approaches include watermarking, digital signatures, and conventional cryptography [139].
Digital Watermarking Techniques. A large amount of literature currently deals with the topic of digital watermarking techniques [76, 110, 152, 188, 225]. Intuitively, image watermarking alters an image by inserting a mark that guarantees its authenticity. Watermarking methods are classified into three categories: (1) fragile watermarks (2) semi-fragile watermarks, and (3) robust watermarks.
Fragile watermarking methods only allow a strict integrity check, whereas semi-fragile watermarking methods, based on external signatures, ensure content authentication. The former watermarking methods are highly sensitive to any type of tampering even in the modification of a single bit. The results obtained with these techniques show that they are both robust and secure and are therefore the best solution for copyright protection. The latter semi-fragile watermarking methods can be used for forensic purposes. Through these techniques, the authenticator can distinguish the original images from those whose content is intentionally modified while preserving the content of an image. The results offered by them show that despite their computational complexity, these techniques are secure and robust for all types of counterfeiting attacks. Finally, there are the kinds of robust watermarking algorithms that can survive the content by preserving changes such as compression, noise addition, and filtering, as well as geometric changes such as resize, translation, rotation, and cropping, and many more. They are used for ownership authentication [64]. These approaches have a high computational complexity and also offer less embedding capability. Fragile watermarking methods remain the simplest to implement [271]. In digital watermarking, a specific message (digest) is inserted when an image is captured from a digital device. The watermarking is either “visible” or invisible [223] and is, generally, independent of the image data [323]. The basic underlying idea is that any attempt to alter the content of an image will also alter the watermark itself. In the following stages, a summary is then extracted from it to verify its legitimacy to compare it with the original digest. The result will indicate whether the image has been modified after acquisition. Therefore, the watermarking techniques consist of two phases. In the first phase, the image is generated and the watermark is also inserted. In the second phase, once the destination is reached, the watermark is extracted from the image and compared with the initial watermark. These techniques can be broadly classified into two categories depending on the kind of image transformation: (1) the spatial domain (least significant bit [284], spread spectrum [46], random insertion in file [36]) and (2) the frequency domain (Discrete Wavelet Transform (DWT) [304], DCT [95], discrete Fourier transform [306], Singular Value Decomposition (SVD) [217]). It has been pointed out that the frequency domain methods are more robust than the spatial domain techniques [79].
Advantages include that these methods provide authenticated multimedia content and focus on four essential features: robustness, security, capacity, and invisibility. Disadvantages include the following: (1) few (and generally expensive) devices have the function to incorporate a watermark in the image acquisition process, and (2) these techniques, which require specialized software to incorporate the abstract into the image, are unable to distinguish the legitimate manipulations performed for the enhancement of the image quality (enhancement of contrast, sharpening, etc.) from the illegitimate ones (see [271]).
Cryptographic Techniques. Encryption techniques involve two stages. In the encryption stage, the plaintext is converted into ciphertext using a cipher. Conversely, in the decryption stage, the same cipher is used to convert ciphertext to plaintext. Approaches such as classic cryptographically secure hash functions, like MD-4, MD-5 (message digest), CRC-32 (32-bit cyclic redundancy check), and SHA-1 (secure hash algorithms), are just some of the many methods existing in the literature that adopt a common general procedure. Due to the large research field, interested readers are advised to refer to other works [127, 194, 323, 328, 329, 336].
Digital Signatures Techniques. The validation of the authenticity of digital messages is normally based on a digital signature. Thanks to the valid signature, the recipient can assume that the message belongs to the known sender. The digital signature guarantees that the content is authentic, reliable, and from an authentic source. Applications of these techniques have been found to improve data integrity and image authentication in many industries, and some techniques are combined with watermarking, steganography, and cryptographic techniques [15, 181, 259, 301].
In conclusion, in active methods, a trustworthy camera calculates a digital watermark or signature from the image at capture time, and any subsequent changes to the image can be detected by checking the value of the digital watermark or digital signature value at the time of its use. The disadvantages of active methods include that digital cameras must be equipped with a watermarking chip or a digital signature chip which, using a private key wired into the camera itself, authenticates each captured image before storing it on the memory card. This implies the definition of a common standard protocol: a requirement that would limit the application of such solutions only to very limited scenarios [254].

3.1.2 Passive Methods.

As discussed previously, active methods use specially designed digital signatures and watermarking tools in cameras. Passive methods, sometimes known as blind methods, overcome this limitation by exclusively analyzing the binary information of an image [101], relying directly on image statistics, without requiring any prior information on image acquisition (Figure 3). Passive methods fall into three categories: (A) based on tampering operations, (B) based on intrinsic regularities and inconsistencies, and (C) coping with natural and computer graphics images. The most prevalent characteristics are certainly the first and second ones. The first category is divided into forgery-dependent and forgery-independent methods [35, 42, 242, 264, 312]: forgery type-dependent techniques depend on the different types of forgery performed on the image and include methods to detect the most popular kinds of attack copy-move and image slicing, and forgery type-independent techniques are independent of the type of attack.
Fig. 3.
Fig. 3. Passive approach. Each of (a) through (c) represents effects on images due to different types of forgery.
A. Methods Based on Tampering Operations
Forgery Type-Dependent Techniques
Copy-Move Forgery. Copy-move attack refers to forgeries that use a single image to copy a region from it and paste it into the same image to hide or duplicate specific objects. The copied part may or may not be modified. Since it belongs to the same image, its essential properties such as noise, color, and texture do not change, so the final forged image has homogeneous characteristics. This makes it difficult to even locate the forgery. Further operations such as rescaling, filtering, and noise scattering can be applied to hide any traces of the forgery.
The copy-move forgery detection technique is the process of identifying the occurrence of a copy-move in an image and can be classified into three categories: (1) brute force detection, (2) block-based detection, and (3) keypoint-based detection. Due to the computational time complexity of the first category, the literature mainly refers to approaches based on blocks and key points.
Brute force detection is based on an exhaustive search and autocorrelation technique, which checks for any position change. The exhaustive search examines the corresponding image segment through circular shifts, producing a large number of comparisons. The computational times are relatively high.
Block-based detection divides the forged image into overlapping or non-overlapping blocks to analyze the block features in the frequency domain.
In the phase of block feature extraction several approaches have been applied:
(1)
Since the Local Binary Patterns (LBP) operator is a texture descriptor for rotation-invariant grayscale images, it is widely used as a grayscale operator. LBP codes can be extracted from blocks beyond block texture verification. Farooq et al. [105] proposed a generic passive image forgery scheme that combines a spatial rich model with a textural feature based on the LBP operator. The combination of LBP with co-occurrence matrices makes the model capable of detecting almost all types of forgeries with improved detection accuracy.
(2)
The use of the frequency domain, through a signal transform, can carry on the signatures for the image blocks, thus allowing for the identification of duplicate regions. Mahmood et al. [215] used stationary wavelet transform and DCT to detect and localize the copy-move operation in digital images. Stationary wavelet transform allows it to work in both spatial and spectral domains, and the feature vectors are reduced by applying DCT. Dimension reduction processes are widely used to enhance the performance of the frameworks. Table 1 references the most used algorithms.
Table 1.
(A) - FORGERY TYPE-INDEPENDENT TECHNIQUES
Copy-Move Forgery Detection Techniques: Main Methods
Block-based detection
AlgorithmsRef.AlgorithmsRef.
Discrete Wavelet Transform (DWT)[123, 169, 187, 330, 342]Texture and Intensity[146, 222, 300, 314]
Singular Value Decomposition (SVD)[93, 167, 187, 317]Discrete Cosine Transform (DCT)[114, 190]
Fourier-Mellin Transform[33]Log-Polar Coordinates or transform[47, 227]
Log-Polar Fast Fourier Transform (LPFFT)[325]Radix Sort[195]
Dyadic Wavelet Transform (DyWT)[224, 261]Wiener Filter Wavelet[70]
Multi-resolution wavelet decomposition[22]Principal Component Analysis (PCA)[256]
Moments Invariant[209]Dimension Reduction[180]
  KPCA[21, 86]
Radon Transformation and Phase Correlation[241]Local Binary Patterns (LBP)[317]
Fast Walsh Hadamard Transform (FWHT)[289]Zernike Moments[216, 245, 272]
Keypoint-based detection
AlgorithmsRef.AlgorithmsRef.
SIFT (Scale-Invariant Feature Transform)[11, 150, 166, 191]Principal Component Analysis (PCA)[286]
ORB (OrientedFAST and Rotated BRIEF)[295]Harris Corner Detector[154]
BRISK (Binary Robust-Invariant Scalable KPs)[182]  
Splicing Forgery Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Bispectral Analysis[98]Bicoherence magnitude and phase feature[235]
Inverse CRF[115, 240]Expectation/Maximization (EM)[74, 230]
Based on the use of the VGG-16 CNN[178]Wavelet decomposition-D phase congruency[97, 115]
Multi-size block DCT[285]Moment features and image quality metrics[282]
CRF signature[234, 282]DCT coefficients and SVM[202]
Based on DCT/image quality features[347]Gray-Level Co-occurrence Matrix[315]
Based on inverse CRF functions[200]Hilbert-Huang Transform (HHT)[65, 115, 252]
Planar homography constraint[345]Based on chroma spaces[349]
Artificial neural network, indip. CA, and auto-regressive coefficient[130, 142]Based on Sobel edge detection, derivative operations, Hough transform[160]
Based on the image of a person’s eyes[164]Based on geometry invariants[147, 148]
Based on statistics of 2D phase congruency[97]Based on a natural image model[285]
Based on a neural network architecture called CAU-Net[250]Based on a fully convolutional network (FCN)[275]
Based on a RRU-Net[37]Based on SVM[91]
Based on computing the inverse CRF functions[200]Locally Planar Irradiance Points and CFR[149]
Table 1. A. Based on Tampering Operations—1st Part: Main Methods
In keypoint-based detection, feature-based or keypoint-based approaches extract key points from forged images. They use a two-step process of locating and describing the local interest points. Robust local descriptors are constructed which must be invariant to affine alterations. They are not only robust to noise and geometric transformations but also use scale- and rotation-invariant feature detectors and descriptors. Table 1 lists the main algorithms used in the feature extraction phase. These methods rely on the identification and selection of high-entropy image regions (i.e., the “key points”): one feature vector per keypoint is then extracted. As a result, fewer feature vectors are estimated, resulting in reduced computational complexity of feature matching and post-processing. Post-processing thresholds are also lower than those of block-based methods. The downside is that the copied regions are not always covered by a satisfactory number of corresponding key points. If the copied regions show little structure, the region may be completely missing. Yang et al. [331] proposed a keypoint-based copy-move forgery detection and location technique based on a hierarchical point matching that reduces the number of points to improve the matching process. Feature-based approaches are relatively better than block-based and brute force methods in terms of computational efficiency, complexity, and robustness against many transformations such as scaling, rotation, and cropping [167].
In the phase of matching and filtering, both in block-based and keypoint-based detection approaches, in identifying matching among the feature descriptors and to reduce the probability of false matches, most authors propose the use of main similarity measures and algorithms such as the Euclidean distance, correlation coefficient, sorting (lexicographic sorting, KD-tree, radix sort), hash (counting Bloom filters, locality-sensitive hashing), DCT and sequential clustering, Best Bin First, 2NNg, 2NN, and clustering (HAC, WPGMC), among others.
In conclusion, both classes of methods have strengths and limitations. To address the limitation of these methods in flat regions, some approaches (see [111]) also implemented mixed processes to tackle copy-move tampering detection problems, combining techniques based on features with block-based techniques. The approach in the work of Hashmi et al. [140] combines the keypoint-based SIFT method with the block-based method using DyWT (Dyadic Wavelet Transform. Additionally, in the work of Su and Kaizhen [295], a combination of the two different approaches is proposed by extracting the key SIFT points in an image and then combining LPP (Locality Preserving Projection) to obtain low-dimensional feature descriptors.
Image Splicing. Splicing is the process of cutting out a section of an image and pasting it onto the same image or another image. To create a fake image, splicing entails merging a minimum of two images. When images with contrasting bases have been well blended, the edges between the spliced regions can be visually imperceptible. Unlike copy-move forgery, in splicing, used objects are harvested from more than one image. The splicing, however, disturbs the higher-order Fourier statistics. These insights can then be used as an element to distinguish fakes [115, 237, 238, 348].
Image splicing detection is fundamental in image forgery detection [42]. Table 1 lists the main related algorithms.
It appears from the literature that many of the methods mentioned work well when the analyzed image is compressed by a high-quality factor. Otherwise, compression artifacts make it very difficult to spot the fake.
Forgery Type-Independent Techniques
J-Compression. Editing an image involves loading it, modifying it, and then saving it again. Knowing the history of these compression operations, as well as whether a bitmap image has been previously compressed, is a clue in forgery detection. Table 2 lists the main used methods in image J-Compression detection techniques. These methods work well for detecting saved images: the problem is when they are rotated, resized, and/or enhanced.
Table 2.
(A) - FORGERY TYPE-INDEPENDENT TECHNIQUES
J-Compression Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Maximum likelihood estimation to identify what quantization table was used[96, 253]Double compression by examining the histograms of the DCT coefficients[257]
Operations on DCT coefficient structure[231]Histograms of coefficient subbands analysis[303]
Benford’s law statistical model for probability distributions of the block-DCT first digits[116]Exploration of conditions under which primary quantization coefficients are identified[290]
Tampered areas detection in double JPEG2000 compression tampered images[343]Mismatch information of BAG as a clue of copy-paste forgery[189]
Shifted DJPEG with a convolutive model[262]Markov process/transition probability matrix[61]
Probabilities of the first digits of quantized DCT coefficients from etc[184]Classification from the first-order statistics of DCT modes of a low-frequency DCT coefficient[252]
Double/multiple quantization effects and CNN-First Quantization Estimation solutions[25, 26, 27, 141, 179, 199]Detection of either block-aligned or misaligned recompression[68]
PCA analysis on separate different SQF noises[291]Detection of the presence of NA-JPEG images[38, 39, 40]
Detection via B-G analysis of JPEG artifacts[41]First quantization matrix estimation[119]
Analysis of the blocking periodicity[67]Analysis of the properties of the image blocks[187]
Maximum likelihood estimation of JPEG quantization steps was developed[96]Detection of composites created by JPEG images of different qualities[100]
Detection of DJPEG images with periodic artifacts of re-quantization and discontinuities[107]Analysis of weakness/strength points of the current solutions on DCT/JPEG properties[28]
Exploration of the image-specific artifacts[212]Estimation of the kind of source encoder[196]
Based on blocking artifacts[335]Based on multi-domain CNN[12]
Re-Sampling Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Pre-filtering/derivation vs. re-sampling[82]Detection of adaptive scaling of images[112]
Relations: rotation angle/frequencies at peaks[277]Property of 2°der. of interpolated periodicity of images[118, 229]
Decomposition and random matrix principles[311]Expectation/Maximization (EM) algorithm to estimate probability maps[258]
Multidirectional high-pass filters on images[248]Re-sampling detection in JPEG images[176]
Cyclostationary process[211]Zero-crossings of the second difference signal[260]
ML to distinguish between seam-carved (or seam-inserted) and normal images[277]Dual-filtering-based CNN to extract features directly from the images[251]
Cumulative periodograms[174, 319]Radon transformation[211]
Retouching Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Identify/rebuild gamma operations[51]Identify the use of histogram equalization[292, 293]
Two contrast enhancement based algorithms via histogram peak/gap artifacts analysis[53]PRNU-based forgery detection algorithm based on the whole image[69]
To measure the distortion between an image original and one processed[18]Statistical anomalies through the Laplace modeling of the derivative histogram[34]
Algorithm vs. cut-and-paste image forgery[197]Image sharpening detection methods[351]
Detection of USM sharpening operations in images[52]A JPEG-robust forensic method based on CNN[283]
Table 2. A. Based on Tampering Operations—2nd Part: Main Methods
Image Re-Sampling. When spatial transformations such as resizing, rotation, and stretching are applied to a digital image (to a specific object in the image or to all the image content), the type of forgery is known as re-sampling. The resizing of an image changes the dimensions of an object but does not improve the quality of that object. Re-sampling can be performed in different ways: up/down-sampling, mirroring, skewing, and seam carving.
With regard to image re-sampling detection, to create a fake image, some selected regions need to undergo geometric transformations such as rotate, scale, stretch, skew, and flip. For example, if the face of a person is larger in an image, it should be scaled to the extent that the sizes of the faces are similar in the composite image. This requires re-sampling the image to compose a new sample and adding periodic correlations between pixels in the neighborhood. These transformations leave traces that are not typically present in the original images, and forgery techniques seek to identify such traces that constitute re-sampling cues. The interpolation phase (e.g., nearest neighbor, bilinear, bicubic) also plays an important role in the re-sampling process and introduces non-negligible statistical changes due to the specific periodic correlations in the image. These correlations can be used to recognize falsehoods caused by re-sampling [210, 259]. Table 2 summarizes several elements proposed and combined over time.
Image Retouching. Image retouching forgery aims to enhance an object or image to exhibit or hide a specific feature such as coloring, lighting, or background changing. It is commonly used for aesthetic and commercial purposes, to enhance or reduce image features, and to create a compelling composite of two images that may require transformations such as rotating, stretching, or scaling one of the images.
With regard to image retouching detection, many methods have been proposed for the detection of retouched forgeries, which is difficult if the image is significantly changed from the original image. Additionally, human intervention is often required to interpret the result. Table 2 lists the main related proposals.
Image Morphing. A gradual transformation from one graphical object or image (source) to another graphical object or image (target) is called image morphing [155]. Differently from warping, image morphing interpolates two or more graphical objects. It is a combination of image warping and blending techniques to interpolate objects to create a novel one. The basic idea of morphing is to distort the first image into another image by some pre-defined set of rules. The two basic principles of image morphing are image warping and cross-fading, which must be coupled. Obviously, during this transformation, the central image (i.e., the generated one) is the key point of the technology because it decides whether the sequence will look good or not. It is intuitive to think that as the source image evolves, it begins to degrade and the target image evolves with new characteristics. The first images in the sequence will look more like the source. The central image will have the characteristics of both the source and the final images and will be distorted [60]. Table 3 lists the basis of the latest generation algorithms and automated morphing attack detection approaches recently proposed [219, 307].
Table 3.
(A) - FORGERY TYPE-INDEPENDENT TECHNIQUES
Morphing Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
De-morphing method without needing a reference image or prior information etc[19]Wavelet domain analysis to gain insight into the spatial-frequency content etc[3]
De-morphing GAN (FD-GAN) to restore the accomplice’s facial image[249]FM detection strategy with 3 modules (ICAO-aligned pre-processing, feature extraction, and classification module)[233]
Neural network exploiting Layer-wise Relevance Propagation (LRP) to analyze the differences in the decision-making process of the differently trained neural networks[281]StirTrace framework toward benchmarking face morphing forgeries extending it by additional scaling functions for the face biometrics scenario[144]
MAP methodology vs. the morphing potential attack[109]Framework for the continual learning strategies[45]
De-morphing approach to protecting ABControl systems[108]Micro-texture variations extraction using BSIF with SVM[265]
Morphing attack detection approach based on CNNs[280]Use of transferable features from pre-trained Deep CNN to detect both digital etc...[266]
Discriminative 2D-DWT[2]The Fourier Spectrum of Sensor Pattern Noise (FS-SPN)[344]
Morph detection algorithm based on an analysis of PRNU[85]Distribution of Benford features extracted in JPEG images[218]
TDA (Topological Data Analysis) approach to detect various known morphing attacks[156]Morphing detection by using state-of-the-art facial recognition algorithms etc[313]
Detection for FM forgeries on image degradation[232]Facial landmarks shifting patterns reference/probe image[83]
Deep MS Context Aggregation Net for denoised images[307, 308]Automated morph detection on pattern recognition algorithms[279]
Inconsistencies (Image Processing Operations) Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Classifiers of distortion between original/processed images[18, 30, 32]Based on blind deconvolution[297]
Based on image segmentation techniques[17]Based on non-intrusive component forensics[175, 298]
Table 3. A. Based on Tampering Operations—3rd Part: Main Methods
Inconsistencies (Image Processing Operations). An altered image has undergone basic image processing operations (Brightness&Contrast, Cropping&Recompressed, Sharpening&Blurring, and Filtering). Tampering produces inconsistencies in the regular models, and the traces of these operations can be useful in identifying forgery. Table 3 also lists the most recently proposed techniques in image processing operations detection.
B. Based on Intrinsic Regularities and Inconsistencies
Image regularities are of different nature—for example, optical, processing related, sensor related, and statistical.
Optical Regularities. These regularities include imperfections due to illumination, radial distortion of the lens, and chromatic aberration. Table 4 lists the most recently proposed techniques in optical regularities detection.
Table 4.
(B) BASED ON INTRINSIC REGULARITIES AND INCONSISTENCIES
Optical Regularities Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
How the direction of a point light source is estimated[161, 162, 163, 164, 165]Automatic estimation of chromatic and aberration[126, 162, 337]
Based on the geometric and photometric constraints[103, 168]Based on the focus on lens radial distortion[71]
To calculate the surface normal matrix of the image[207]Based on camera lens distortion correction[128]
Processing Regularities Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Detection framework of demosaicing regularity[54, 299]A 3-layer feedforward backpropagation neural network (BPN)[151]
Sensor Regularities Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Based on imperfections of CCD pixels[122]Based on the detection of sensor dust characteristics[89]
Based on sensor noise[63, 172, 185]Based on camera response normality and consistency[200]
The Color Filter Array (CFA) is examined[31, 258]Based on significant noise residual regions[201]
Based on the PRNU & PNU[8, 49, 55, 204]Based on Colour-Decoupled PRNU[186]
Statistical Regularities Detection Techniques: Main Methods
AlgorithmsRef.AlgorithmsRef.
Based on binary similarity and image quality measures, higher-order wavelet statistics with SVM Class[57]By analyzing image variations using statistical process control[23]
SVD-based image manipulation detection[137]To categorize a camera model[104, 173]
Table 4. (B) Based on Intrinsic Regularities and Inconsistencies: Main Methods
Processing Regularities. These regularities include demosaicing, white balancing, and gamma correction. Table 4 lists the most recently proposed techniques in processing regularities detection.
Sensor Regularities (PNU (Pixel Non-Uniformity)). The Source Camera Identification (SCI) techniques identify the intrinsic evidence left in images by the corresponding digital cameras responsible for their acquisitions. It is worth mentioning sensor pattern noise (the Photo Response Non-Uniformity (PRNU), dust pattern, feature extraction, and Camera Response Function (CRF). Table 4 lists the most recently proposed techniques in sensor regularities detection.
Statistical Regularities. These regularities include color features, image quality metrics, and natural image statistics. Table 4 lists the most recently proposed techniques in statistical regularities detection. Methods based on image features do not work well when the image from a camera has a similar CCD [312].
C. Natural and Computer Graphics Images
Graphic software can generate photorealistic images. A challenging problem is to distinguish between computer-generated photorealistic and real (photographic) images. Table 5 lists the main bases for the proposed algorithms in natural and computer graphics image detection.
Table 5.
(C) NATURAL AND COMPUTER GRAPHICS IMAGES: MAIN METHODS
AlgorithmsRef.AlgorithmsRef.
Edge properties features[183]Residual pattern noise[171]
Moments of 1D and 2D characteristic functions[296]Color, edge, and texture properties[80]
An aggregate of existing features[276]Identifying computer-generated images[87, 88]
Zero connectivity and fuzzy membership[324]Progressive randomization[221]
Models on (1) first-order and higher-order wavelet statistics, and (2) characteristic function of the image and wavelet subbands[66, 208]The combination of three different algorithms based on the geometry, the wavelet, and the cartoon features[236, 239]
Table 5. (C) Natural and Computer Graphics Images

3.2 Summary Table: A Summary Outline

Table 6 reports some essential helpful information for the identification of the main classes of methods in this context.
Table 6.
Ref.NameCategoryOperation\(^1\)Class.Ref.NameCategoryOperation\(^1\)Class.
3.1.1Digital SignatureActive3.1.2Copy-MovePassiveATODependent forgery
3.1.1Digital WatermarkingActive3.1.2Image SplicingPassiveATODependent forgery
3.1.1CryptographyActive3.1.2J-CompressionPassiveATOIndependent forgery
3.1.2Optical RegularitiesPassiveBOIR3.1.2Image Re-SamplingPassiveATOIndependent forgery
3.1.2Source Camera IdentificationPassiveBOIR3.1.2Image MorphingPassiveATOIndependent forgery
3.1.2Processing RegularitiesPassiveBOIR3.1.2InconsistenciesPassiveATOIndependent forgery
3.1.2Statistical RegularitiesPassiveBOIR3.1.2Image RetouchingPassiveATOIndependent forgery
3.1.2OthersPassiveN&CGI
Table 6. Summary Outline of the Public Forgery Type Detection Methodologies Considered in This Review
\(^1\)BOIR, based on intrinsic regularities and inconsistencies; ATO, against tampered operations; N&CGI, natural and computer graphics images.

4 Datasets and Evaluations

4.1 Benchmark Image Datasets

This subsection presents some public benchmark datasets (Table 7) for the training and evaluation of the PAFD approaches. Each dataset was created for specific forgery attack detection methods. A combination of existing ones can be used for a wide range of applications. However, this requires some preliminary work to create a unified structure with consistent annotations. It is worth noting that it would be extremely interesting to compare the real performance of methods and their effectiveness in the wild. However, a serious and thorough performance comparison would entail a shared benchmark and widely acknowledged protocols that currently are missing. These requirements represent an engaging challenge for the future, especially assembling a single dataset for all detection methods.
Table 7.
Ref.Dataset NameYearForgery TypeRef.Dataset NameYearForgery Type
[278]UCID2003For SCI purposes[56]UniSA TIDE2014Tampered color images with different resolutions, splicing operations, blur filtering
[237]COLUMBIA GRAY2004SCI: Splicing, BMP format gray images[288]CMH2015Copy-move, rotation, resizing, rotation, and resizing
[147]COLUMBIA COLOUR2006Splicing, TIFF format color images[14]CVIP2015Translation, copy-move, rotation, scaling
[158]INRIA_Copy Days2008Cropping, scaling, JPEG compression, combined strong attacks[84]RAISE2015SCI: High luminance images, uncompressed images, and camera native images
[90]SIDD2008For SCI purposes[327]SCUT-FBP2015For automatic facial beauty perception
[90]CASIA v1.02009SCI: JPEG formatting and splicing (at pre-processing)[318]Wattanachote2015Seam-carved/seam-inserted images at various quality factors
[90]CASIA v2.02009SCI: Copy-move and splice images[338]Wild WEB2015SCI: Cut&Paste, copy-move, erase forging
[11, 125]DRESDEN2010SCI: Multiple cameras, multiple file formats, and different visual qualities[320]COVERAGE2016Copy-move along with interpretations
[20]BOSS_Bases v0.932011Grayscale, no PGM, multiple camera models, and appropriate raw EIF[132]NC2016Splice and localization detection, provenance modification
[11]MICC-20002011SCI: Coloring, copy-move, and JPEG formatting[177]RTD v.2.02017Modifications, PRNU signatures, TIFF/PNG formatting, ground truth maps of 3-level
[11]MICC-F2202011SCI: Coloring, copy-move, JPEG-format, images with no mask, lacks post-processing[287]VISION2017For SCI purposes
[41]Bianchi2012JPEG and TIFF formatting[5]DHFI2018For SCI purposes
[72]CMEN2012Copy-move images, resized images[121]KAGGLE2018For SCI purposes
[72]IMD2012Copy-move images[132]MFC2018Splicing investigates processing events, source modification camera verification, GAN modifications
[72]MANIP2012Copy-move images[302]DSID_DAXING2019For SCI purposes
[305]CoMoFoD2013Coloring PNG/JPEG formatting, copy-move[117]SOCRATES2019For SCI purposes
[106]IEEE IFS-TC2013Copy-move images and splicing[138]FODB-FORCHHEIM2020For SCI purposes
[10]MICC-F6002013SCI: Coloring PNG and JPEG formatting, copy-move[243]IMD2020Multiple-forged advanced GAN, inpainting-forged-images, images-from-2322-device
[77]CMFDdb grip2014Rotation, scaling, JPEG compression[48]UNISA20202021For SCI (on PNU): images from multiple conventional digital cameras of the same type
Table 7. List of the Public Forgery Digital Image Datasets\(^2\)
\(^2\)The columns provide the following information for each dataset (from left to right): reference section, name, year, and forgery type.

5 Discussion: Limitations, Challenges, and Opportunities

At present, generative AI techniques [270] and diffusion models [75] are a continuous source of new challenges. These techniques are spreading so quickly and in such a pervasive way that they would deserve much more space than a section herein. It is our hope that the suggested references can effectively complement the present survey. Diffusion models can be used also for audio synthesis [341]. As can be deduced from Figure 2, multimedia forensics, in addition to image forensics, also includes audio and video. In particular, following the increasing popularity of deepfakes, interest in video forensics is growing more and more. Currently, deepfake detection is classified into machine learning based classical methods, and more recent ones based on deep learning based (the most widely used), statistical, and blockchain-based techniques [267]. The literature testifies that most deepfake detection research uses deep learning algorithms looking for inconsistencies in deepfake videos. However, since these are generated through adversarial training (often GANs), their ability to evade AI-based detection systems will improve as they become familiar with new detection methods. The challenge of recognizing them is increasingly difficult. The wide range of forensic video products available today for forensic investigators [157] provides an overview that is not able to tackle all challenges. For a complete discussion of this area of research, we suggest referring to exhaustive related works [9, 92, 113, 124, 133, 136, 143, 294, 332, 333].
The main challenge in detecting tampering is represented by the structural changes that occur in digital images. Due to their massive and widespread use in every field of application and considering the speed by which neural networks tackle/propose challenges, research is increasingly projected toward a combined use of traditional techniques with machine learning solutions. In addition to the traditional detection techniques mentioned previously, CNNs can represent an ambitious and effective solution to detect counterfeits. Touted as one of the most popular deep learning methods, CNN-based approaches are recently gaining success in digital image forensics [12, 29, 62, 73, 78, 145, 220, 268, 316, 346]. In active forgery detection, in the work of Zeng et al. [340], a watermarking technique based on an auto-encoder CNN network for robust non-blind watermarking was proposed, which achieves better performance than that of domain transform techniques. However, in passive forgery detection, a CNN has been used to identify the camera that captured the particular image. Yao et al. [334] proposed a multi-classifier based on CNNs that subjected images to post-processing attacks such as JPEG compression and adding noise. Several CNN-based approaches deal with copy-move operation [44, 78, 159, 226, 326]. Ouyang et al. [244] used an adjusted network obtained from an existing trained ImageNet model and obtained satisfactory performance compared to automatically generated spoofed images, although it does not apply to real spoofed images. Quan et al. [263] proposed a CNN generic framework to classify images as computer generated or natural with robust results against re-sampling (resizing) and JPEG compression. In the work of Ali et al. [7], a useful list of CNN-based techniques with related comparisons is mentioned.
Actually, in the context of image tampering, new proposed solutions based on image anomaly detection and deep anomaly detection are emerging. Anomaly detection, or novelty detection, is referred to as the process of discovering data instances that deviate significantly from the majority of data instances. Due to the complexity of the problem and difficulty of learning, an advanced approach such as deep anomaly detection is currently also required [246]. Da Costa et al. [81] surveyed the concerns and efforts made so far to optimize and improve anomaly/tampering detection methods. Their work includes a comprehensive table that summarizes image tampering detection and image anomaly detection datasets fit for purpose. The direction of all these aforementioned efforts introduces the need for a rigorous consideration of new and increasingly complex challenges related to tampered image detection. The most promising trend in terms of research, challenges, and opportunities is the use of machine learning techniques.

6 Conclusion

The huge diffusion of data (images, video, audio, and text), often uploaded/shared via social media or web platforms, and the possibility of their manipulation/generation also through AI models, poses serious problems. Some examples are counterfeiting biomedical images, deceiving biometric authentication systems, and cheating in scientific publications in the political world and in school activities.
In particular, the deepfake technique (e.g., photorealistic video or image content creation via DL methods), with the associated social and legal problems, poses serious threats to the privacy, reputation, and security of the victims. Despite many recent proposals for deepfake detection, the rapid progress in multimedia technology and the proliferation of application tools continuously pose new challenges calling for a reliable and definitive solution [135]. A side effect is a decreased focus on more traditional forgery techniques, which, however, still represent not completely solved problems.
Whatever the nature of the manipulation, once a digital image represents a crime, it is necessary to detect the forgery. This document presented a comprehensive overview of current and past research specially developed to list image forgery detection algorithms in the digital forensics scenario. The article overviewed the most important methodologies used so far, restricting the scope to cases where the solution is forensic. Taking into account the various other public investigations for the detection of forgery images available in the current literature, it aimed to provide a comprehensive longitudinal overview of the entire image-related forensics scenario. As mentioned in Section 1, retracing the fundamental work carried out so far, this investigation aimed to represent a testimony of continuity between traditional and non-traditional approaches. It is our hope that this survey will help forensic groups tackle the detection of existing attacks, and get basic information about the rising ones while providing a compass for a deeper insight. In the future, we plan to move the focus toward deep manipulation detection in the context of deepfake applications.

Footnote

1
This Best Practice Manual for Digital Image Authentication was funded by the European Union’s Internal Security Fund–Police, and it is currently available for download (https://enfsi.eu/wp-content/uploads/2021/10/BPM_Image-Authentication_ENFSI-BPM-DI-003-1.pdf).

Supplementary Material

3633203-app (3633203-app.pdf)
Supplementary material

References

[1]
Nor Bakiah Abd Warif, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Roziana Ramli, Rosli Salleh, Shahaboddin Shamshirband, and Kim-Kwang Raymond Choo. 2016. Copy-move forgery detection: Survey, challenges and future directions. Journal of Network and Computer Applications 75 (2016), 259–278.
[2]
Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, and Nasser M. Nasrabadi. 2021. Detection of morphed face images using discriminative wavelet sub-bands. In Proceedings of the 2021 IEEE International Workshop on Biometrics and Forensics (IWBF ’21). IEEE, Los Alamitos, CA, 1–6.
[3]
Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, and Nasser M. Nasrabadi. 2022. Morph detection enhanced by structured group sparsity. In Proceedings of the 2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW ’22). 311–320.
[4]
Zahid Akhtar. 2023. Deepfakes generation and detection: A short survey. Journal of Imaging 9, 1 (2023), 18.
[5]
Omar Al Shaya, Pengpeng Yang, Rongrong Ni, Yao Zhao, and Alessandro Piva. 2018. A new dataset for source identification of high dynamic range images. Sensors 18, 11 (2018), 3801.
[6]
Amani Alahmadi, Muhammad Hussain, Hatim Aboalsamh, Ghulam Muhammad, George Bebis, and Hassan Mathkour. 2017. Passive detection of image forgery using DCT and local binary pattern. Signal, Image and Video Processing 11 (2017), 81–88.
[7]
S. S. Ali, I. I. Ganapathi, N. S. Vu, SD Ali, N. Saxena, and N. Werghi. 2022. Image forgery detection using deep learning by recompressing images. Electronics 11, 3 (2022), 403.
[8]
Erwin J. Alles, Zeno J. M. H. Geradts, and Cor J. Veenman. 2009. Source camera identification for heavily JPEG compressed low resolution still images. Journal of Forensic Sciences 54, 3 (2009), 628–638.
[9]
Irene Amerini, Gianmarco Baldini, and Francesco Leotta. 2021. Image and video forensics. Journal of Imaging 7, 11 (2021), 242.
[10]
Irene Amerini, Lamberto Ballan, Roberto Caldelli, Alberto Del Bimbo, Luca Del Tongo, and Giuseppe Serra. 2013. Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Processing: Image Communication 28, 6 (2013), 659–669.
[11]
I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra. 2011. A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Transactions on Information Forensics and Security 6, 3 Pt. 2 (2011), 1099–1110.
[12]
Irene Amerini, Tiberio Uricchio, Lamberto Ballan, and Roberto Caldelli. 2017. Localization of JPEG double compression through multi-domain convolutional neural networks. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW ’17). 1865–1871.
[13]
Muhammad Aoun. 2023. Deep fake detection in social media forensic taxonomy, challenges, future directions. LC International Journal of STEM 4, 1 (2023), 16–26.
[14]
Edoardo Ardizzone, Alessandro Bruno, and Giuseppe Mazzola. 2015. Copy–move forgery detection by matching triangles of keypoints. IEEE Transactions on Information Forensics and Security 10, 10 (2015), 2084–2094.
[15]
Rizky Damara Ardy, Oktaviana Rena Indriani, Christy Atika Sari, De Rosal Ignatius Moses Setiadi, and Eko Hari Rachmawanto. 2017. Digital image signature using triple protection cryptosystem (RSA, vigenere, and MD5). In Proceedings of the 2017 International Conference on Smart Cities, Automation, and Intelligent Computing Systems (ICON-SONICS ’17). IEEE, Los Alamitos, CA, 87–92.
[16]
Matthew P. J. Ashby. 2017. The value of CCTV surveillance cameras as an investigative tool: An empirical analysis. European Journal on Criminal Policy and Research 23, 3 (2017), 441–459.
[17]
Jan Lukas. 2000. Digital image authentication using image filtering techniques. In Proceedings of the Conference on Scientific Computing, Vol. 236. 236–244.
[18]
I. Avcibas, S. Bayram, N. Memon, M. Ramkumar, and B. Sankur. 2004. A classifier design for detecting image manipulations. In Proceedings of the 2004 International Conference on Image Processing (ICIP ’04), Vol. 4. 2645–2648.
[19]
Sudipta Banerjee, Prateek Jaiswal, and Arun Ross. 2022. Facial de-morphing: Extracting component faces from a single morph. In Proceedings of the 2022 IEEE International Joint Conference on Biometrics (IJCB ’22). 1–10.
[20]
Patrick Bas, Tomáš Filler, and Tomáš Pevnỳ. 2011. “Break our steganographic system”: The ins and outs of organizing BOSS. In Information Hiding. Lecture Notes in Computer Science, Vol. 6958. Springer, 59–70.
[21]
M. Bashar, K. Noda, N. Ohnishi, and K. Mori. 2010. Exploring duplicated regions in natural images. IEEE Transactions on Image Processing. Early Access, March 25, 2010.
[22]
Md. Khayrul Bashar, Keiji Noda, Noboru Ohnishi, Hiroaki Kudo, Tetsuya Matsumoto, and Yoshinori Takeuchi. 2007. Wavelet-based multiresolution features for detecting duplications in images. In Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA ’07). 264–267.
[23]
Philip Bateman, Anthony T. S. Ho, and Alan Woodward. 2009. Image forensics of digital cameras by analysing image variations using statistical process control. In Proceedings of the 2009 7th International Conference on Information, Communications, and Signal Processing (ICICS ’09). 1–5.
[24]
Sebastiano Battiato, Fausto Galvan, Martino Jerian, and Matteo Salcuni. 2013. Linee guida per l’autenticazione forense di immagini. In IISFA Memberbook 2013. IISFA, 125–176.
[25]
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, and Giovanni Puglisi. 2021. Estimating previous quantization factors on multiple JPEG compressed images. EURASIP Journal on Information Security 2021, 1 (2021), 1–11.
[26]
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, and Giovanni Puglisi. 2021. First quantization estimation by a robust data exploitation strategy of DCT coefficients. IEEE Access 9 (2021), 73110–73120.
[27]
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, and Giovanni Puglisi. 2022. CNN-based first quantization estimation of double compressed JPEG images. Journal of Visual Communication and Image Representation 89 (2022), 103635.
[28]
Sebastiano Battiato and Giuseppe Messina. 2009. Digital forgery estimation into DCT domain: A critical analysis. In Proceedings of the 1st ACM Workshop on Multimedia in Forensics. 37–42.
[29]
Belhassen Bayar and Matthew C. Stamm. 2016. A deep learning approach to universal image manipulation detection using a new convolutional layer. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. 5–10.
[30]
Sevinç Bayram, İsmail Avcıbaş, Bülent Sankur, and Nasir Memon. 2006. Image manipulation detection. Journal of Electronic Imaging 15, 4 (2006), 041102–041102.
[31]
S. Bayram, H. Sencar, N. Memon, and I. Avcibas. 2005. Source camera identification based on CFA interpolation. In Proceedings of the 2005 IEEE International Conference on Image Processing, Vol. 3. 69–72.
[32]
Sevinc Bayram, Husrev T. Sencar, and Nasir Memon. 2008. Classification of digital camera-models based on demosaicing artifacts. Digital Investigation 5, 1-2 (2008), 49–59.
[33]
Sevinc Bayram, Husrev Taha Sencar, and Nasir Memon. 2009. An efficient and robust method for detecting copy-move forgery. In Proceedings of the 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, Los Alamitos, CA, 1053–1056.
[34]
S. Bharathiraja. 2019. Anti-forensics contrast enhancement detection (AFCED) technique in images based on Laplace derivative histogram. Mobile Networks and Applications 24, 4 (2019), 1174–1180.
[35]
Charmil Nitin Bharti and Purvi Tandel. 2016. A survey of image forgery detection techniques. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing, and Networking (WiSPNET ’16). IEEE, Los Alamitos, CA, 877–881.
[36]
Sharbani Bhattacharya. 2012. Additive watermarking in optimized digital image. IEEE Beacon 31, 1 (2012), 79.
[37]
Xiuli Bi, Yang Wei, Bin Xiao, and Weisheng Li. 2019. RRU-Net: The ringed residual U-Net for image splicing forgery detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.
[38]
Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. 2011. Improved DCT coefficient analysis for forgery localization in JPEG images. In Proceedings of the 2011 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’11). IEEE, Los Alamitos, CA, 2444–2447.
[39]
Tiziano Bianchi and Alessandro Piva. 2011. Detection of non-aligned double JPEG compression with estimation of primary compression parameters. In Proceedings of the 2011 18th IEEE International Conference on Image Processing. 1929–1932.
[40]
Tiziano Bianchi and Alessandro Piva. 2011. Detection of nonaligned double JPEG compression based on integer periodicity maps. IEEE Transactions on Information Forensics and Security 7, 2 (2011), 842–848.
[41]
Tiziano Bianchi and Alessandro Piva. 2012. Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 1003–1017.
[42]
Gajanan K. Birajdar and Vijay H. Mankar. 2013. Digital image forgery detection using passive techniques: A survey. Digital Investigation 10, 3 (2013), 226–245.
[43]
Rainer Böhme, Felix C. Freiling, Thomas Gloe, and Matthias Kirchner. 2009. Multimedia forensics is not computer forensics. In Computational Forensics. Lecture Notes in Computer Science, Vol. 5718. Springer, 90–103.
[44]
Luca Bondi, Silvia Lameri, David Güera, Paolo Bestagini, Edward J. Delp, and Stefano Tubaro. 2017. Tampering detection and localization through clustering of camera-based CNN features. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW ’17). 1855–1864.
[45]
Guido Borghi, Gabriele Graffieti, Annalisa Franco, and Davide Maltoni. 2022. Incremental training of face morphing detectors. In Proceedings of the 2022 26th International Conference on Pattern Recognition (ICPR ’22). 914–921.
[46]
Anirban Bose and Santi Prasad Maity. 2017. Spread spectrum watermark detection on degraded compressed sensing. IEEE Sensors Letters 1, 5 (2017), 1–4.
[47]
Sergio Bravo-Solorio and Asoke K. Nandi. 2009. Passive forensic method for detecting duplicated regions affected by reflection, rotation and scaling. In Proceedings of the 2009 17th European Signal Processing Conference. 824–828.
[48]
Andrea Bruno, Paola Capasso, Giuseppe Cattaneo, Umberto Ferraro Petrillo, and Riccardo Improta. 2022. A novel image dataset for source camera identification and image based recognition systems. Multimedia Tools and Applications 82, 6 (2022), 1–17.
[49]
Andrea Bruno, Giuseppe Cattaneo, Umberto Ferraro Petrillo, and Paola Capasso. 2021. PNU spoofing: A menace for biometrics authentication systems? Pattern Recognition Letters 151 (2021), 3–10.
[50]
Eric Van Buskirk and Vincent T. Liu. 2006. Digital evidence: Challenging the presumption of reliability. Journal of Digital Forensic Practice 1, 1 (2006), 19–26.
[51]
Gang Cao, Yao Zhao, and Rongrong Ni. 2010. Forensic estimation of gamma correction in digital images. In Proceedings of the 2010 IEEE International Conference on Image Processing. IEEE, Los Alamitos, CA, 2097–2100.
[52]
Gang Cao, Yao Zhao, Rongrong Ni, and Alex C. Kot. 2011. Unsharp masking sharpening detection via overshoot artifacts analysis. IEEE Signal Processing Letters 18, 10 (2011), 603–606.
[53]
Gang Cao, Yao Zhao, Rongrong Ni, and Xuelong Li. 2014. Contrast enhancement-based forensics in digital images. IEEE Transactions on Information Forensics and Security 9, 3 (2014), 515–525.
[54]
Hong Cao and Alex C. Kot. 2009. Accurate detection of demosaicing regularity for digital image forensics. IEEE Transactions on Information Forensics and Security 4, 4 (2009), 899–910.
[55]
Paola Capasso, Lucia Cimmino, Andrea F. Abate, Andrea Bruno, and Giuseppe Cattaneo. 2022. A PNU-based methodology to improve the reliability of biometric systems. Sensors 22, 16 (2022), 6074.
[56]
Giuseppe Cattaneo and Gianluca Roscigno. 2014. A possible pitfall in the experimental analysis of tampering detection algorithms. In Proceedings of the 2014 17th International Conference on Network-Based Information Systems. IEEE, Los Alamitos, CA, 279–286.
[57]
Oya Celiktutan, Bülent Sankur, and Ismail Avcibas. 2008. Blind identification of source cell-phone model. IEEE Transactions on Information Forensics and Security 3, 3 (2008), 553–566.
[58]
B. Chaitra and P. V. Bhaskar Reddy. 2019. A study on digital image forgery techniques and its detection. In Proceedings of the 2019 International Conference on Contemporary Computing and Informatics (IC3I ’19). IEEE, Los Alamitos, CA, 127–130.
[59]
Devanshi Chauhan, Dipali Kasat, Sanjeev Jain, and Vilas Thakare. 2016. Survey on keypoint based copy-move forgery detection methods on image. Procedia Computer Science 85 (2016), 206–212.
[60]
Rahul Chauhan, Preeti Mishra, and R. C. Joshi. 2020. An overview of digital image forensics: Image morphing and forgery detection algorithms. In Information Security and Optimization. Chapman & Hall/CRC, 107–120.
[61]
Chunhua Chen, Yun Q Shi, and Wei Su. 2008. A machine learning based scheme for double JPEG compression detection. In Proceedings of the 2008 19th International Conference on Pattern Recognition. IEEE, Los Alamitos, CA, 1–4.
[62]
Jiansheng Chen, Xiangui Kang, Ye Liu, and Z. Jane Wang. 2015. Median filtering forensics based on convolutional neural networks. IEEE Signal Processing Letters 22, 11 (2015), 1849–1853.
[63]
Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukás. 2008. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3, 1 (2008), 74–90.
[64]
Tao Chen and Hongtao Lu. 2012. Robust spatial LSB watermarking of color images against JPEG compression. In Proceedings of the 2012 IEEE 5th International Conference on Advanced Computational Intelligence (ICACI ’12). IEEE, Los Alamitos, CA, 872–875.
[65]
Wen Chen, Yun Q. Shi, and Wei Su. 2007. Image splicing detection using 2D phase congruency and statistical moments of characteristic function. In Security, Steganography, and Watermarking of Multimedia Contents IX, Edward J. Delp III and Ping Wah Wong (Eds.), Vol. 6505. International Society for Optics and Photonics, SPIE, 65050R.
[66]
Wen Chen, Yun Q. Shi, and Guorong Xuan. 2007. Identifying computer graphics using HSV color model and statistical moments of characteristic functions. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo. IEEE, Los Alamitos, CA, 1123–1126.
[67]
Yi-Lei Chen and Chiou-Ting Hsu. 2008. Image tampering detection by blocking periodicity analysis in JPEG compressed images. In Proceedings of the 2008 IEEE 10th Workshop on Multimedia Signal Processing. 803–808.
[68]
Yi-Lei Chen and Chiou-Ting Hsu. 2011. Detecting recompression of JPEG images via periodicity analysis of compression artifacts for tampering detection. IEEE Transactions on Information Forensics and Security 6, 2 (2011), 396–406.
[69]
Giovanni Chierchia, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2014. A Bayesian-MRF approach for PRNU-based image forgery detection. IEEE Transactions on Information Forensics and Security 9, 4 (2014), 554–567.
[70]
Hyeokho Choi and R. Baraniuk. 1998. Analysis of wavelet-domain wiener filters. In Proceedings of the IEEE-SP International Symposium on Time-Frequency and Time-Scale Analysis. 613–616.
[71]
Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong. 2006. Source camera identification using footprints from lens aberration. In Digital Photography II, Nitin Sampat, Jeffrey M. DiCarlo, and Russel A. Martin (Eds.), Vol. 6069. International Society for Optics and Photonics, SPIE, 60690J.
[72]
Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, and Elli Angelopoulou. 2012. An evaluation of popular copy-move forgery detection approaches. IEEE Transactions on Information Forensics and Security 7, 6 (2012), 1841–1854.
[73]
Sara Concas, Gianpaolo Perelli, Gian Luca Marcialis, and Giovanni Puglisi. 2022. Tensor-based deepfake detection in scaled and compressed images. In Proceedings of the 2022 IEEE International Conference on Image Processing (ICIP ’22). IEEE, Los Alamitos, CA, 3121–3125.
[74]
Valentina Conotter, Giulia Boato, and Hany Farid. 2010. Detecting photo manipulation on signs and billboards. In Proceedings of the 2010 IEEE International Conference on Image Processing. 1741–1744.
[75]
Riccardo Corvi, Davide Cozzolino, Giada Zingarini, Giovanni Poggi, Koki Nagano, and Luisa Verdoliva. 2023. On the detection of synthetic images generated by diffusion models. In Proceedings of the 2023 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’23). IEEE, Los Alamitos, CA, 1–5.
[76]
Ingemar Cox, Matthew Miller, Jeffrey Bloom, and Chris Honsinger. 2002. Digital watermarking. Journal of Electronic Imaging 11, 3 (2002), 414.
[77]
Davide Cozzolino, Giovanni Poggi, and Luisa Verdoliva. 2014. Copy-move forgery detection based on PatchMatch. In Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP ’14). IEEE, Los Alamitos, CA, 5312–5316.
[78]
Davide Cozzolino and Luisa Verdoliva. 2016. Single-image splicing localization through autoencoder-based anomaly detection. In Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS ’16). IEEE, Los Alamitos, CA, 1–6.
[79]
S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung. 1998. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications 16, 4 (1998), 573–586.
[80]
Florin Cutzu, Riad Hammoud, and Alex Leykin. 2005. Distinguishing paintings from photographs. Computer Vision and Image Understanding 100, 3 (2005), 249–273.
[81]
Kelton A. P. da Costa, João P. Papa, Leandro A. Passos, Danilo Colombo, Javier Del Ser, Khan Muhammad, and Victor Hugo C. de Albuquerque. 2020. A critical literature survey and prospects on tampering and anomaly detection in image data. Applied Soft Computing 97 (2020), 106727.
[82]
Nahuel Dalgaard, Carlos Mosquera, and Fernando Pérez-González. 2010. On the role of differentiation for resampling detection. In Proceedings of the 2010 IEEE International Conference on Image Processing. 1753–1756.
[83]
Naser Damer, Viola Boller, Yaza Wainakh, Fadi Boutros, Philipp Terhörst, Andreas Braun, and Arjan Kuijper. 2019. Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts. In Pattern Recognition. Lecture Notes in Computer Science, Vol. 11269. Springer, 518–534.
[84]
Duc-Tien Dang-Nguyen, Cecilia Pasquini, Valentina Conotter, and Giulia Boato. 2015. RAISE: A raw images dataset for digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference. 219–224.
[85]
Luca Debiasi, Ulrich Scherhag, Christian Rathgeb, Andreas Uhl, and Christoph Busch. 2018. PRNU-based detection of morphed face images. In Proceedings of the 2018 International Workshop on Biometrics and Forensics (IWBF ’18). 1–7.
[86]
Chandan Deep Kaur and Navdeep Kanwal. 2019. An analysis of image forgery detection techniques. Statistics, Optimization & Information Computing 7, 2 (2019), 486–500.
[87]
Sintayehu Dehnie, Taha Sencar, and Nasir Memon. 2006. Digital image forensics for identifying computer generated and digital camera images. In Proceedings of the 2006 International Conference on Image Processing. IEEE, Los Alamitos, CA, 2313–2316.
[88]
Ahmet Emir Dirik, Sevinç Bayram, Husrev T. Sencar, and Nasir Memon. 2007. New features to identify computer generated images. In Proceedings of the 2007 IEEE International Conference on Image Processing, Vol. 4. IEEE, Los Alamitos, CA, IV–433.
[89]
Ahmet Emir Dirik, Husrev Taha Sencar, and Nasir Memon. 2008. Digital single lens reflex camera identification from traces of sensor dust. IEEE Transactions on Information Forensics and Security 3, 3 (2008), 539–552.
[90]
Jing Dong, Wei Wang, and Tieniu Tan. 2013. CASIA image tampering detection evaluation database. In Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing. IEEE, Los Alamitos, CA, 422–426.
[91]
Jing Dong, Wei Wang, Tieniu Tan, and Yun Q. Shi. 2009. Run-length and edge statistics based approach for image splicing detection. In Digital Watermarking, Hyoung-Joong Kim, Stefan Katzenbeisser, and Anthony T. S. Ho (Eds.). Springer, Berlin, Germany, 76–87.
[92]
Ricard Durall, Margret Keuper, and Janis Keuper. 2020. Watch your up-convolution: CNN based generative deep neural networks are failing to reproduce spectral distributions. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 7890–7899.
[93]
Brandon Dybala, Brian Jennings, and David Letscher. 2007. Detecting filtered cloning in digital images. In Proceedings of the 9th Workshop on Multimedia and Security (MM&Sec ’07). ACM, New York, NY, 43–50.
[94]
Mohamed A. Elaskily, Heba K. Aslan, Osama A. Elshakankiry, Osama S. Faragallah, Fathi E. Abd El-Samie, and Mohamed M. Dessouky. 2017. Comparative study of copy-move forgery detection techniques. In Proceedings of the 2017 International Conference on Advanced Control Circuits Systems (ACCS ’17) Systems and the 2017 International Conference on New Paradigms in Electronics and Information Technology (PEIT ’17). IEEE, Los Alamitos, CA, 193–203.
[95]
Ferda Ernawan and Muhammad Nomani Kabir. 2018. A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6 (2018), 20464–20480.
[96]
Zhigang Fan and Ricardo L. De Queiroz. 2003. Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Transactions on Image Processing 12, 2 (2003), 230–235.
[97]
Zhen Fang, Shuozhong Wang, and Xinpeng Zhang. 2009. Image splicing detection using camera characteristic inconsistency. In Proceedings of the 2009 International Conference on Multimedia Information Networking and Security, Vol. 1. 20–24.
[98]
Hany Farid. 1999. Detecting Digital Forgeries Using Bispectral Analysis. Technical Report. MIT, Cambridge, MA.
[99]
Hany Farid. 2004. Creating and Detecting Doctored and Virtual Images: Implications to the Child Pornography Prevention Act. Technical Report TR2004-518. Department of Computer Science, Dartmouth College, Hanover, NH.
[100]
Hany Farid. 2009. Exposing digital forgeries from JPEG ghosts. IEEE Transactions on Information Forensics and Security 4, 1 (2009), 154–160.
[101]
Hany Farid. 2009. Image forgery detection. IEEE Signal Processing Magazine 26, 2 (2009), 16–25.
[102]
Hany Farid. 2016. Photo Forensics. MIT Press, Cambridge, MA.
[103]
Hany Farid and Mary J. Bravo. 2010. Image forensic analyses that elude the human visual system. In Media Forensics and Security II, Vol. 7541. SPIE, 52–61.
[104]
Giovanni Maria Farinella, Mario Valerio Giuffrida, Vincenzo Digiacomo, and Sebastiano Battiato. 2015. On blind source camera identification. In Advanced Concepts for Intelligent Vision Systems. Lecture Notes in Computer Science, Vol. 9386. Springer, 464–473.
[105]
Sundus Farooq, Muhammad Haroon Yousaf, and Fawad Hussain. 2017. A generic passive image forgery detection scheme using local binary pattern with rich models. Computers & Electrical Engineering 62 (2017), 459–472.
[106]
Sundus Farooq, Muhammad Haroon Yousaf, and Fawad Hussain. 2017. A generic passive image forgery detection scheme using local binary pattern with rich models. Computers & Electrical Engineering 62 (2017), 459–472.
[107]
Xiaoying Feng and Gwenaël J. Doërr. 2010. JPEG recompression detection. Proceedings of the SPIE 7541 (2010), 75410J.
[108]
Matteo Ferrara, Annalisa Franco, and Davide Maltoni. 2017. Face demorphing. IEEE Transactions on Information Forensics and Security 13, 4 (2017), 1008–1017.
[109]
Matteo Ferrara, Annalisa Franco, Davide Maltoni, and Christoph Busch. 2022. Morphing attack potential. In Proceedings of the 2022 International Workshop on Biometrics and Forensics (IWBF ’22). 1–6.
[110]
Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. 2012. Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Transactions on Information Forensics and Security 7, 5 (2012), 1566–1577.
[111]
William D. Ferreira, Cristiane B. R. Ferreira, Gelson da Cruz Júnior, and Fabrizzio Soares. 2020. A review of digital image forensics. Computers & Electrical Engineering 85 (2020), 106685.
[112]
Claude Fillion and Gaurav Sharma. 2010. Detecting content adaptive scaling of images for forensic applications. In Media Forensics and Security II, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III (Eds.), Vol. 7541. International Society for Optics and Photonics, SPIE, 75410Z.
[113]
Joel Frank, Thorsten Eisenhofer, Lea Schönherr, Asja Fischer, Dorothea Kolossa, and Thorsten Holz. 2020. Leveraging frequency analysis for deep fake image recognition. In Proceedings of the International Conference on Machine Learning. 3247–3258.
[114]
Jessica Fridrich. 2003. Detection of copy-move forgery in digital images. In Proceedings of the 2003 Digital Forensic Research Workshop.
[115]
Dongdong Fu, Yun Q. Shi, and Wei Su. 2006. Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition. In Digital Watermarking. Lecture Notes in Computer Science, Vol. 4283. Springer, 177–187.
[116]
Dongdong Fu, Yun Q. Shi, and Wei Su. 2007. A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In Security, Steganography, and Watermarking of Multimedia Contents IX, Edward J. Delp III and Ping Wah Wong (Eds.), Vol. 6505. International Society for Optics and Photonics, SPIE, 65051L.
[117]
Chiara Galdi, Frank Hartung, and Jean-Luc Dugelay. 2019. SOCRatES: A database of realistic data for SOurce camera REcognition on smartphones. In Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods (ICPRAM ’19). 648–655.
[118]
Andrew C. Gallagher. 2005. Detection of linear and cubic interpolation in JPEG compressed images. In Proceedings of the 2nd Canadian Conference on Computer and Robot Vision (CRV ’05). IEEE, Los Alamitos, CA, 65–72.
[119]
Fausto Galvan, Giovanni Puglisi, Arcangelo Ranieri Bruna, and Sebastiano Battiato. 2014. First quantization matrix estimation from double compressed JPEG images. IEEE Transactions on Information Forensics and Security 9, 8 (2014), 1299–1310.
[120]
Simson Garfinkel. 2007. Anti-forensics: Techniques, detection and countermeasures. In Proceedings of the 2nd International Conference on i-Warfare and Security, Vol. 20087. 77–84.
[121]
Michael Geiger. 2018. 2018IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge. Honors Thesis. Union College.
[122]
Zeno J. Geradts, Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki, and Naoki Saitoh. 2001. Methods for identification of images acquired with digital cameras. In Enabling Technologies for Law Enforcement and Security, Vol. 4232. SPIE, 505–512.
[123]
Mehdi Ghorbani, Mohammad Firouzmand, and Ahmad Faraahi. 2011. DWT-DCT (QCD) based copy-move image forgery detection. In Proceedings of the 2011 18th International Conference on Systems, Signals, and Image Processing. IEEE, Los Alamitos, CA, 1–4.
[124]
Oliver Giudice, Luca Guarnera, and Sebastiano Battiato. 2021. Fighting deepfakes by detecting GAN DCT anomalies. Journal of Imaging 7, 8 (2021), 128.
[125]
Thomas Gloe and Rainer Böhme. 2010. The ‘Dresden image database’ for benchmarking digital image forensics. In Proceedings of the 2010 ACM Symposium on Applied Computing. 1584–1590.
[126]
Thomas Gloe, Karsten Borowka, and Antje Winkler. 2010. Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics. In Media Forensics and Security II, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III (Eds.), Vol. 7541. International Society for Optics and Photonics, SPIE, 754107.
[127]
Oded Goldreich and Oded Goldreich. 1999. The foundations of modern cryptography. In Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Algorithms and Combinatorics, Vol. 17. Springer, 1–37.
[128]
Miroslav Goljan and Jessica Fridrich. 2012. Sensor-fingerprint based identification of images corrected for lens distortion. In Media Watermarking, Security, and Forensics 2012, Vol. 8303. SPIE, 132–144.
[129]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2020. Generative adversarial networks. Communications of the ACM 63, 11 (2020), 139–144.
[130]
E. S. Gopi, N. Lakshmanan, T. Gokul, S. KumaraGanesh, and Prerak R. Shah. 2006. Digital image forgery detection using artificial neural network and auto regressive coefficients. In Proceedings of the 2006 Canadian Conference on Electrical and Computer Engineering. 194–197.
[131]
Diego Gragnaniello, Davide Cozzolino, Francesco Marra, Giovanni Poggi, and Luisa Verdoliva. 2021. Are GAN generated images easy to detect? A critical analysis of the state-of-the-art. In Proceedings of the 2021 IEEE International Conference on Multimedia and Expo (ICME ’21). IEEE, Los Alamitos, CA, 1–6.
[132]
Haiying Guan, Mark Kozak, Eric Robertson, Yooyoung Lee, Amy N. Yates, Andrew Delgado, Daniel Zhou, Timothee Kheyrkhah, Jeff Smith, and Jonathan Fiscus. 2019. MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation. In Proceedings of the 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW ’18). IEEE, Los Alamitos, CA, 63–72.
[133]
Luca Guarnera, Oliver Giudice, and Sebastiano Battiato. 2020. Fighting deepfake by exposing the convolutional traces on images. IEEE Access 8 (2020), 165085–165098.
[134]
Luca Guarnera, Oliver Giudice, Francesco Guarnera, Alessandro Ortis, Giovanni Puglisi, Antonino Paratore, Linh M. Q. Bui, Marco Fontani, Davide Alessandro Coccomini, Roberto Caldelli, Fabrizio Falchi, Claudio Gennaro, Nicola Messina, Giuseppe Amato, Gianpaolo Perelli, Sara Concas, Carlo Cuccu, Giulia Orrù, Gian Luca Marcialis, and Sebastiano Battiato. 2022. The Face Deepfake Detection Challenge. Journal of Imaging 8, 10 (2022), 263.
[135]
Luca Guarnera, Oliver Giudice, Cristina Nastasi, and Sebastiano Battiato. 2020. Preliminary forensics analysis of deepfake images. In Proceedings of the 2020 AEIT International Annual Conference (AEIT ’20). IEEE, Los Alamitos, CA, 1–6.
[136]
Luca Guarnera, Oliver Giudice, Matthias Niesner, and Sebastiano Battiato. 2022. On the exploitation of deepfake model recognition. In Proceedings of the 2022 IEEE CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW ’22).
[137]
Gokhan Gul, Ismail Avcibas, and Fatih Kurugollu. 2010. SVD based image manipulation detection. In Proceedings of the 2010 IEEE International Conference on Image Processing. 1765–1768.
[138]
Benjamin Hadwiger and Christian Riess. 2021. The Forchheim image database for camera identification in the wild. In Pattern Recognition: ICPR International Workshops and Challenges. Lecture Notes in Computer Science, Vol. 12666. Springer, 500–515.
[139]
Adil Haouzia and Rita Noumeir. 2008. Methods for image authentication: A survey. Multimedia Tools and Applications 39 (2008), 1–46.
[140]
Mohammad Farukh Hashmi, Vijay Anand, and Avinas G. Keskar. 2014. Copy-move image forgery detection using an efficient and robust method combining un-decimated wavelet transform and scale invariant feature transform. AASRI Procedia 9 (2014), 84–91.
[141]
Junfeng He, Zhouchen Lin, Lifeng Wang, and Xiaoou Tang. 2006. Detecting doctored JPEG images via DCT coefficient analysis. In Proceedings of the European Conference on Computer Vision.
[142]
Jonatan Henríquez and Werner Kristjanpoller. 2019. A combined independent component analysis-neural network model for forecasting exchange rate variation. Applied Soft Computing 83 (2019), 105654.
[143]
Young-Jin Heo, Woon-Ha Yeo, and Byung-Gyu Kim. 2023. Deepfake detection algorithm based on improved vision transformer. Applied Intelligence 53, 7 (2023), 7512–7527.
[144]
Mario Hildebrandt, Tom Neubert, Andrey Makrushin, and Jana Dittmann. 2017. Benchmarking face morphing forgery detection: Application of StirTrace for impact simulation of different processing steps. In Proceedings of the 2017 5th International Workshop on Biometrics and Forensics (IWBF ’17). 1–6.
[145]
Zahra Hossein-Nejad and Mehdi Nasri. 2022. Clustered redundant keypoint elimination method for image mosaicing using a new Gaussian-weighted blending algorithm. Visual Computer 38, 6 (2022), 1991–2007.
[146]
Peter Howarth and Stefan Rüger. 2004. Evaluation of texture features for content-based image retrieval. In Image and Video Retrieval, Peter Enser, Yiannis Kompatsiaris, Noel E. O’Connor, Alan F. Smeaton, and Arnold W. M. Smeulders (Eds.). Springer, Berlin, Germany, 326–334.
[147]
Yu-Feng Hsu and Shih-Fu Chang. 2006. Detecting image splicing using geometry invariants and camera characteristics consistency. In Proceedings of the 2006 IEEE International Conference on Multimedia and Expo. IEEE, Los Alamitos, CA, 549–552.
[148]
Yu-Feng Hsu and Shih-Fu Chang. 2007. Image splicing detection using camera response function consistency and automatic segmentation. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo. 28–31.
[149]
Yu-Feng Hsu and Shih-Fu Chang. 2010. Camera response functions for image forensics: An automatic algorithm for splicing detection. IEEE Transactions on Information Forensics and Security 5, 4 (2010), 816–825.
[150]
Hailing Huang, Weiqiang Guo, and Yu Zhang. 2008. Detection of copy-move forgery in digital images using SIFT algorithm. In Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Vol. 2. 272–276.
[151]
Yizhen Huang and Yangjing Long. 2008. Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model. In Proceedings of the 2008 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, Los Alamitos, CA, 1–8.
[152]
Muhammad Hussain, Ghulam Muhammad, Sahar Q. Saleh, Anwar M. Mirza, and George Bebis. 2013. Image forgery detection using multi-resolution weber local descriptors. In Proceedings of Eurocon 2013. IEEE, Los Alamitos, CA, 1570–1577.
[153]
Rabha W. Ibrahim, Zahra Moghaddasi, Hamid A. Jalab, and Rafidah Md. Noor. 2015. Fractional differential texture descriptors based on the Machado entropy for image splicing detection. Entropy 17, 7 (2015), 4775–4785.
[154]
Meera Mary Isaac and M. Wilscy. 2015. Copy-move forgery detection based on Harris corner points and BRISK. In Proceedings of the 3rd International Symposium on Women in Computing and Informatics (WCI ’15). ACM, New York, NY, 394–399.
[155]
Md. Baharul Islam, Md. Tukhrejul Inam, and Balaji Kaliyaperumal. 2013. Overview and challenges of different image morphing algorithms. International Journal of Advanced Research in Computer Science and Electronics Engineering 2, 4 (2013), 410–414.
[156]
Sabah Jassim and Aras Asaad. 2018. Automatic detection of image morphing by topology-based analysis. In Proceedings of the 2018 26th European Signal Processing Conference (EUSIPCO ’18). IEEE, Los Alamitos, CA, 1007–1011.
[157]
Abdul Rehman Javed, Zunera Jalil, Wisha Zehra, Thippa Reddy Gadekallu, Doug Young Suh, and Md. Jalil Piran. 2021. A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions. Engineering Applications of Artificial Intelligence 106 (2021), 104456.
[158]
Herve Jegou, Matthijs Douze, and Cordelia Schmid. 2008. Hamming Embedding and Weak Geometry Consistency for Large Scale Image Search—Extended Version. INRIA.
[159]
Jesse S. Jin, Changsheng Xu, Min Xu, Dai-Kyung Hyun, Min-Jeong Lee, Seung-Jin Ryu, Hae-Yeoun Lee, and Heung-Kyu Lee. 2013. Forgery detection for surveillance video. In The Era of Interactive Media. Springer, 25–36.
[160]
Wang Jing and Zhang Hongbin. 2006. Exposing digital forgeries by detecting traces of image splicing. In Proceedings of the 2006 8th International Conference on Signal Processing, Vol. 2.
[161]
Micah K. Johnson and Hany Farid. 2005. Exposing digital forgeries by detecting inconsistencies in lighting. In Proceedings of the 7th Workshop on Multimedia and Security. 1–10.
[162]
Micah K. Johnson and Hany Farid. 2006. Exposing digital forgeries through chromatic aberration. In Proceedings of the 8th Workshop on Multimedia and Security. 48–55.
[163]
Micah K. Johnson and Hany Farid. 2007. Exposing digital forgeries in complex lighting environments. IEEE Transactions on Information Forensics and Security 2, 3 (2007), 450–461.
[164]
Micah K. Johnson and Hany Farid. 2008. Detecting photographic composites of people. In Digital Watermarking. Lecture Notes in Computer Science, Vol. 5041. Springer, 19–33.
[165]
Micah K. Johnson and Hany Farid. 2008. Detecting photographic composites of people. In Digital Watermarking. Lecture Notes in Computer Science, Vol. 5041. Springer, 19–33.
[166]
Pravin Kakar and N. Sudha. 2012. Exposing postprocessed copy-paste forgeries through transform-invariant features. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 1018–1028.
[167]
XiaoBing Kang and ShengMin Wei. 2008. Identifying tampered regions using singular value decomposition in digital image forensics. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Vol. 3. 926–930.
[168]
Eric Kee and Hany Farid. 2010. Exposing digital forgeries from 3-D lighting environments. In Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security. IEEE, Los Alamitos, CA, 1–6.
[169]
Saiqa Khan and Arun Kulkarni. 1801. An efficient method for detection of copy-move forgery using discrete wavelet transform. International Journal on Computer Science and Engineering 2, 5 (1801), 2010.
[170]
Ihtiram Raza Khan, Saman Aisha, Deepak Kumar, and Tabish Mufti. 2023. A systematic review on deepfake technology. In Proceedings of the International Conference on Data Analytics and Management (ICDAM ’22). 669–685.
[171]
Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, and Edward J. Delp. 2008. Forensic techniques for classifying scanner, computer generated and digital camera images. In Proceedings of the 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, Los Alamitos, CA, 1653–1656.
[172]
Nitin Khanna, Aravind K. Mikkilineni, and Edward J. Delp. 2009. Forensic camera classification: Verification of sensor pattern noise approach. Forensic Science Communications 11, 1 (2009).
[173]
M. Kharrazi, H. T. Sencar, and N. Memon. 2004. Blind source camera identification. In Proceedings of the 2004 International Conference on Image Processing (ICIP ’04), Vol. 1. 709–712.
[174]
Matthias Kirchner. 2010. Efficient estimation of CFA pattern configuration in digital camera images. In Media Forensics and Security II, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III (Eds.), Vol. 7541. International Society for Optics and Photonics, SPIE, 754111.
[175]
Matthias Kirchner and Rainer Bohme. 2008. Hiding traces of resampling in digital images. IEEE Transactions on Information Forensics and Security 3, 4 (2008), 582–592.
[176]
Matthias Kirchner and Thomas Gloe. 2009. On resampling detection in re-compressed images. In Proceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security (WIFS ’09). IEEE, Los Alamitos, CA, 21–25.
[177]
Paweł Korus and Jiwu Huang. 2016. Multi-scale analysis strategies in PRNU-based tampering localization. IEEE Transactions on Information Forensics and Security 12, 4 (2016), 809–824.
[178]
A. Kuznetsov. 2019. Digital image forgery detection using deep learning approach. Journal of Physics: Conference Series 1368, 3 (Nov. 2019), 032028.
[179]
Myung-Joon Kwon, Seung-Hun Nam, In-Jae Yu, Heung-Kyu Lee, and Changick Kim. 2022. Learning JPEG compression artifacts for image manipulation detection and localization. International Journal of Computer Vision 130, 8 (2022), 1875–1895.
[180]
Aaron Langille and Minglun Gong. 2006. An efficient match-based duplication detection algorithm. In Proceedings of the 3rd Canadian Conference on Computer and Robot Vision (CRV ’06). IEEE, Los Alamitos, CA, 64–64.
[181]
Wei-Bin Lee and Tung-Her Chen. 2002. A public verifiable copy protection technique for still images. Journal of Systems and Software 62, 3 (2002), 195–204.
[182]
Stefan Leutenegger, Margarita Chli, and Roland Y. Siegwart. 2011. BRISK: Binary robust invariant scalable keypoints. In Proceedings of the 2011 International Conference on Computer Vision. 2548–2555.
[183]
Alex Leykin and Florin Cutzu. 2003. Differences of edge properties in photographs and paintings. In Proceedings of the 2003 International Conference on Image Processing, Vol. 3. IEEE, Los Alamitos, CA, 541–544.
[184]
Bin Li, Yun Q. Shi, and Jiwu Huang. 2008. Detecting doubly compressed JPEG images by using mode based first digit features. In Proceedings of the 2008 IEEE 10th Workshop on Multimedia Signal Processing. 730–735.
[185]
Chang-Tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security 5, 2 (2010), 280–287.
[186]
Chang-Tsun Li and Yue Li. 2010. Digital camera identification using colour-decoupled photo response non-uniformity noise pattern. In Proceedings of the 2010 IEEE International Symposium on Circuits and Systems. 3052–3055.
[187]
Guohui Li, Qiong Wu, Dan Tu, and Shaojie Sun. 2007. A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo. IEEE, Los Alamitos, CA, 1750–1753.
[188]
Leida Li, Shushang Li, Hancheng Zhu, Shu-Chuan Chu, John F Roddick, and Jeng-Shyang Pan. 2013. An efficient scheme for detecting copy-move forged images by local binary patterns. Journal of Information Hiding and Multimedia Signal Processing 4, 1 (2013), 46–56.
[189]
Weihai Li, Nenghai Yu, and Yuan Yuan. 2008. Doctored JPEG image detection. In Proceedings of the 2008 IEEE International Conference on Multimedia and Expo. 253–256.
[190]
Weihai Li, Yuan Yuan, and Nenghai Yu. 2009. Passive detection of doctored JPEG image via block artifact grid extraction. Signal Processing 89, 9 (2009), 1821–1829.
[191]
Yanshan Li, Weiming Liu, Xiaotang Li, Qinghua Huang, and Xuelong Li. 2014. GA-SIFT: A new scale invariant feature transform for multispectral image using geometric algebra. Information Sciences 281 (2014), 559–572.
[192]
Yuezun Li, Xin Yang, Pu Sun, Honggang Qi, and Siwei Lyu. 2020. Celeb-DF: A large-scale challenging dataset for deepfake forensics. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 3207–3216.
[193]
Zewen Li, Fan Liu, Wenjie Yang, Shouheng Peng, and Jun Zhou. 2022. A survey of convolutional neural networks: Analysis, applications, and prospects. IEEE Transactions on Neural Networks and Learning Systems 33, 12 (2022), 6999–7019.
[194]
Ching-Yung Lin and Shih-Fu Chang. 1997. Robust image authentication method surviving JPEG lossy compression. In Storage and Retrieval for Image and Video Databases VI, Vol. 3312. SPIE, 296–307.
[195]
Hwei-Jen Lin, Chun-Wei Wang, and Yang-Ta Kao. 2009. Fast copy-move forgery detection. WSEAS Transactions on Signal Processing 5, 5 (May 2009), 188–197.
[196]
W. Sabrina Lin, Steve Tjoa, H. Vicky Zhao, and K. J. Ray Liu. 2007. Image source coding forensics via intrinsic fingerprints. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo. IEEE, Los Alamitos, CA, 1127–1130.
[197]
Xufeng Lin, Chang-Tsun Li, and Yongjian Hu. 2013. Exposing image forgery through the detection of contrast enhancement. In Proceedings of the 2013 IEEE International Conference on Image Processing. 4467–4471.
[198]
Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, and Xiao-Sa Huang. 2018. Recent advances in passive digital image security forensics: A brief review. Engineering 4, 1 (2018), 29–39.
[199]
Zhouchen Lin, Junfeng He, Xiaoou Tang, and Chi-Keung Tang. 2009. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis. Pattern Recognition 42, 11 (2009), 2492–2501.
[200]
Zhouchen Lin, Rongrong Wang, Xiaoou Tang, and Heung-Yeung Shum. 2005. Detecting doctored images using camera response normality and consistency. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR ’05), Vol. 1. 1087–1092.
[201]
Bei-Bei Liu, Yongjian Hu, and Heung-Kyu Lee. 2010. Source camera identification from significant noise residual regions. In Proceedings of the 2010 IEEE International Conference on Image Processing. IEEE, Los Alamitos, CA, 1749–1752.
[202]
Qingzhong Liu and Andrew H. Sung. 2009. A new approach for JPEG resize and image splicing detection. In Proceedings of the 1st ACM Workshop on Multimedia in Forensics (MiFor ’09). 43–48.
[203]
Wei Lu, Wei Sun, Ji-Wu Huang, and Hong-Tao Lu. 2008. Digital image forensics using statistical features and neural network classifier. In Proceedings of the 2008 International Conference on Machine Learning and Cybernetics, Vol. 5. IEEE, Los Alamitos, CA, 2831–2834.
[204]
Jan Lukas, Jessica Fridrich, and Miroslav Goljan. 2006. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security 1, 2 (2006), 205–214.
[205]
Weiqi Luo, Jiwu Huang, and Guoping Qiu. 2006. Robust detection of region-duplication forgery in digital image. In Proceedings of the 18th International Conference on Pattern Recognition (ICPR ’06), Vol. 4. IEEE, Los Alamitos, CA, 746–749.
[206]
Weiqi Luo, Zhenhua Qu, Feng Pan, and Jiwu Huang. 2007. A survey of passive technology for digital image forensics. Frontiers of Computer Science in China 1 (2007), 166–179.
[207]
Yingda Lv, Xuanjing Shen, and Haipeng Chen. 2011. An improved image blind identification based on inconsistency in light source direction. Journal of Supercomputing 58 (2011), 50–67.
[208]
S. Lyu and H. Farid. 2005. How realistic is photorealistic? IEEE Transactions on Signal Processing 53, 2 (2005), 845–850.
[209]
Babak Mahdian and Stanislav Saic. 2007. Detection of copy–move forgery using a method based on blur moment invariants. Forensic Science International 171, 2-3 (2007), 180–189.
[210]
Babak Mahdian and Stanislav Saic. 2008. Blind authentication using periodic properties of interpolation. IEEE Transactions on Information Forensics and Security 3, 3 (2008), 529–538.
[211]
Babak Mahdian and Stanislav Saic. 2009. A cyclostationarity analysis applied to image forensics. In Proceedings of the 2009 Workshop on Applications of Computer Vision (WACV ’09). IEEE, Los Alamitos, CA, 1–6.
[212]
Babak Mahdian and Stanislav Saic. 2009. Detecting double compressed JPEG images. In Proceedings of the International Conference on Imaging for Crime Detection and Prevention.
[213]
Babak Mahdian and Stanislav Saic. 2010. A bibliography on blind methods for identifying image forgery. Signal Processing: Image Communication 25, 6 (2010), 389–399.
[214]
Babak Mahdian and Stanislav Saic. 2010. Blind methods for detecting image fakery. IEEE Aerospace and Electronic Systems Magazine 25, 4 (2010), 18–24.
[215]
Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Tanzila Saba. 2018. A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform. Journal of Visual Communication and Image Representation 53 (2018), 202–214.
[216]
Khaled Mahmoud and Arwa Husien. 2016. Copy-move forgery detection using Zernike and pseudo Zernike moments. International Arab Journal of Information Technology 13, 6A (2016), 930–937.
[217]
Nasrin M. Makbol, Bee Ee Khoo, and Taha H. Rassem. 2016. Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Processing 10, 1 (2016), 34–52.
[218]
Andrey Makrushin, Tom Neubert, and Jana Dittmann. 2017. Automatic generation and detection of visually faultless facial morphs. In Proceedings of the 12th International Joint Conference on Computer Vision, Imaging, and Computer Graphics Theory and Applications (VISIGRAPP ’17). 39–50.
[219]
Andrey Makrushin and Andreas Wolf. 2018. An overview of recent advances in assessing and mitigating the face morphing attack. In Proceedings of the 2018 26th European Signal Processing Conference (EUSIPCO ’18). IEEE, Los Alamitos, CA, 1017–1021.
[220]
Francesco Marra, Diego Gragnaniello, Luisa Verdoliva, and Giovanni Poggi. 2020. A full-image full-resolution end-to-end-trainable CNN framework for image forgery detection. IEEE Access 8 (2020), 133488–133502.
[221]
Sarah Mercer, Kyle Read Talbot, and Isobel Kai-Hui Wang. 2021. Fake or real engagement—Looks can be deceiving. In Student Engagement in the Language Classroom. Multilingual Matters, 143–162.
[222]
Hai Min, Wei Jia, Xiao-Feng Wang, Yang Zhao, Rong-Xiang Hu, Yue-Tong Luo, Feng Xue, and Jing-Ting Lu. 2015. An intensity-texture model based level set method for image segmentation. Pattern Recognition 48, 4 (2015), 1547–1562.
[223]
Saraju P. Mohanty. 1999. Digital Watermarking: A Tutorial Review. University of South Florida.
[224]
Ghulam Muhammad, Muhammad Hussain, and George Bebis. 2012. Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digital Investigation 9, 1 (2012), 49–57.
[225]
Saba Mushtaq and Ajaz Hussain Mir. 2014. Digital image forgeries and passive image authentication techniques: A survey. International Journal of Advanced Science and Technology 73 (2014), 15–32.
[226]
Gul Muzaffer and Guzin Ulutas. 2019. A new deep learning-based method to detection of copy-move forgery in digital images. In Proceedings of the 2019 Scientific Meeting on Electrical-Electronics and Biomedical Engineering and Computer Science (EBBT ’19). 1–4.
[227]
A. N. Myna, M. G. Venkateshmurthy, and C. G. Patil. 2007. Detection of region duplication forgery in digital images using wavelets and log-polar mapping. In Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA ’07), Vol. 3. IEEE, Los Alamitos, CA, 371–377.
[228]
Syed Tufael Nabi, Munish Kumar, Paramjeet Singh, Naveen Aggarwal, and Krishan Kumar. 2022. A comprehensive survey of image and video forgery techniques: Variants, challenges, and future directions. Multimedia Systems 28, 3 (2022), 939–992.
[229]
L. Nataraj, A. Sarkar, and B. S. Manjunath. 2009. Adding Gaussian noise to “denoise” JPEG for detecting image resizing. In Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP ’09). 1493–1496.
[230]
Lakshmanan Nataraj, Anindya Sarkar, and Bangalore S. Manjunath. 2010. Improving re-sampling detection by adding noise. In Media Forensics and Security II, Vol. 7541. SPIE, 177–187.
[231]
Ramesh Neelamani, Ricardo De Queiroz, Zhigang Fan, Sanjeeb Dash, and Richard G. Baraniuk. 2006. JPEG compression history estimation for color images. IEEE Transactions on Image Processing 15, 6 (2006), 1365–1378.
[232]
Tom Neubert. 2017. Face morphing detection: An approach based on image degradation analysis. In Digital Forensics and Watermarking. Lecture Notes in Computer Science, Vol. 10431. Springer, 93–106.
[233]
Tom Neubert, Christian Kraetzer, and Jana Dittmann. 2019. A face morphing detection concept with a frequency and a spatial domain feature space for images on EMRTD. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec ’19). ACM, New York, NY, 95–100.
[234]
Tian-Tsong Ng. 2009. Camera response function signature for digital forensics—Part II: Signature extraction. In Proceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security (WIFS ’09). 161–165.
[235]
T.-T. Ng and S.-F. Chang. 2004. A model for image splicing. In Proceedings of the 2004 International Conference on Image Processing (ICIP ’04), Vol. 2. IEEE, Los Alamitos, CA, 1169–1172.
[236]
Tian-Tsong Ng and Shih-Fu Chang. 2006. An online system for classifying computer graphics images from natural photographs. In Security, Steganography, and Watermarking of Multimedia Contents VIII, Vol. 6072. SPIE, 397–405.
[237]
Tian-Tsong Ng, Shih-Fu Chang, and Q. Sun. 2004. A Data Set of Authentic and Spliced Image Blocks. Technical Report DVMM. Columbia University.
[238]
Tian-Tsong Ng, Shih-Fu Chang, and Qibin Sun. 2004. Blind detection of photomontage using higher order statistics. In Proceedings of the 2004 IEEE International Symposium on Circuits and Systems (ISCAS ’04), Vol. 5.
[239]
Tian-Tsong Ng, Shih-Fu Chang, and Mao-Pei Tsui. 2007. Lessons learned from online classification of photo-realistic computer graphics and photographs. In Proceedings of the 2007 IEEE Workshop on Signal Processing Applications for Public Security and Forensics. IEEE, Los Alamitos, CA, 1–6.
[240]
Tian-Tsong Ng and Mao-Pei Tsui. 2009. Camera response function signature for digital forensics—Part I: Theory and data selection. In Proceedings of the 2009 1st IEEE International Workshop on Information Forensics and Security (WIFS ’09). 156–160.
[241]
Hieu Cuong Nguyen and Stefan Katzenbeisser. 2012. Detection of copy-move forgery in digital images using radon transformation and phase correlation. In Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, Los Alamitos, CA, 134–137.
[242]
Nitish Nirmalkar, Shailesh Kamble, and Sandeep Kakde. 2015. A review of image forgery techniques and their detection. In Proceedings of the 2015 International Conference on Innovations in Information, Embedded, and Communication Systems (ICIIECS ’15). IEEE, Los Alamitos, CA, 1–5.
[243]
Adam Novozamsky, Babak Mahdian, and Stanislav Saic. 2020. IMD2020: A large-scale annotated dataset tailored for detecting manipulated images. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops. 71–80.
[244]
Junlin Ouyang, Yizhi Liu, and Miao Liao. 2017. Copy-move forgery detection based on deep learning. In Proceedings of the 2017 10th International Congress on Image and Signal Processing, Biomedical Engineering, and Informatics (CISP-BMEI ’17). IEEE, Los Alamitos, CA, 1–5.
[245]
Junlin Ouyang, Yizhi Liu, and Miao Liao. 2019. Robust copy-move forgery detection method using pyramid model and Zernike moments. Multimedia Tools and Applications 78 (2019), 10207–10225.
[246]
Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van Den Hengel. 2021. Deep learning for anomaly detection: A review. ACM Computing Surveys 54, 2 (2021), 1–38.
[247]
Cecilia Pasquini, Irene Amerini, and Giulia Boato. 2021. Media forensics on social media platforms: A survey. EURASIP Journal on Information Security 2021, 1 (2021), 1–19.
[248]
Anjie Peng, Yadong Wu, and Xiangui Kang. 2017. Revealing traces of image resampling and resampling antiforensics. Advances in Multimedia 2017 (2017), 7130491.
[249]
Fei Peng, Le-Bing Zhang, and Min Long. 2019. FD-GAN: Face de-morphing generative adversarial network for restoring accomplice’s facial image. IEEE Access 7 (2019), 75122–75131.
[250]
Jin Peng, Yinghao Li, Chengming Liu, and Xiaomeng Gao. 2023. The circular U-Net with attention gate for image splicing forgery detection. Electronics 12, 6 (2023), 1451.
[251]
Lin Peng, Xin Liao, and Mingliang Chen. 2021. Resampling parameter estimation via dual-filtering based convolutional neural network. Multimedia Systems 27 (2021), 363–370.
[252]
Tomas Pevny and Jessica Fridrich. 2008. Detection of double-compression in JPEG images for applications in steganography. IEEE Transactions on Information Forensics and Security 3, 2 (2008), 247–258.
[253]
Tomáš Pevný and Jessica Fridrich. 2008. Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Edward J. Delp III, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon (Eds.), Vol. 6819. International Society for Optics and Photonics, SPIE, 681911.
[254]
Alessandro Piva. 2013. An overview on image forensics. International Scholarly Research Notices 2013 (2013), 496701.
[255]
Mark Pollitt. 2010. A history of digital forensics. In Advances in Digital Forensics VI. IFIP Advances in Information and Communication Technology, Vol. 337. Springer, 3–15.
[256]
Alin C. Popescu and Hany Farid. 2004. Exposing Digital Forgeries by Detecting Duplicated Image Regions. Technical Report TR2004-515. Dartmouth College.
[257]
Alin C. Popescu and Hany Farid. 2004. Statistical tools for digital forensics. In Information Hiding. Lecture Notes in Computer Science, Vol. 3200. Springer, 128–147.
[258]
Alin C. Popescu and Hany Farid. 2005. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53, 2 (2005), 758–767.
[259]
Sabyasachi Pramanik, Samir Kumar Bandyopadhyay, and Ramkrishna Ghosh. 2020. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA ’20). IEEE, Los Alamitos, CA, 665–669.
[260]
Santasriya Prasad and K. R. Ramakrishnan. 2006. On resampling detection and its application to detect image tampering. In Proceedings of the 2006 IEEE International Conference on Multimedia and Expo. IEEE, Los Alamitos, CA, 1325–1328.
[261]
O. M. Prathibha, N. S. Swathikumari, and P. Sushma. 2012. Image forgery detection using dyadic wavelet transform. International Journal of Electronics Signals and Systems 2 (2012), 41–43.
[262]
Zhenhua Qu, Weiqi Luo, and Jiwu Huang. 2008. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication. In Proceedings of the 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing. 1661–1664.
[263]
Weize Quan, Kai Wang, Dong-Ming Yan, and Xiaopeng Zhang. 2018. Distinguishing between natural and computer-generated images using convolutional neural networks. IEEE Transactions on Information Forensics and Security 13, 11 (2018), 2772–2787.
[264]
Muhammad Ali Qureshi and Mohamed Deriche. 2015. A bibliography of pixel-based blind image forgery detection techniques. Signal Processing: Image Communication 39 (2015), 46–74.
[265]
R. Raghavendra, Kiran B. Raja, and Christoph Busch. 2016. Detecting morphed face images. In Proceedings of the 2016 IEEE 8th International Conference on Biometrics Theory, Applications, and Systems (BTAS ’16). 1–7.
[266]
R. Raghavendra, Kiran B. Raja, Sushma Venkatesh, and Christoph Busch. 2017. Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW ’17). 1822–1830.
[267]
Md. Shohel Rana, Mohammad Nur Nobi, Beddhu Murali, and Andrew H. Sung. 2022. Deepfake detection: A systematic literature review. IEEE Access 10 (2022), 25494–25513.
[268]
Yuan Rao and Jiangqun Ni. 2016. A deep learning approach to detection of splicing and copy-move forgeries in images. In Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS ’16). IEEE, Los Alamitos, CA, 1–6.
[269]
Karen Reid. 2011. A Practitioner’s Guide to the European Convention on Human Rights. Sweet & Maxwell.
[270]
K. Remya Revi, K. R. Vidya, and M. Wilscy. 2021. Detection of deepfake images created using generative adversarial networks: A review. In Second International Conference on Networks and Advances in Computational Technologies. Transactions on Computational Science and Computational Intelligence. Springer, 25–35.
[271]
Christian Rey and Jean-Luc Dugelay. 2002. A survey of watermarking algorithms for image authentication. EURASIP Journal on Advances in Signal Processing 2002, 6 (2002), 1–9.
[272]
Seung-Jin Ryu, Min-Jeong Lee, and Heung-Kyu Lee. 2010. Detection of copy-rotate-move forgery using Zernike moments. In Information Hiding. Lecture Notes in Computer Science, Vol. 6387. Springer, 51–65.
[273]
Akram Hatem Saber, Mohd Ayyub Khan, and Basim Galeb Mejbel. 2020. A survey on image forgery detection using different forensic approaches. Advances in Science, Technology and Engineering Systems Journal 5, 3 (2020), 361–370.
[274]
Somayeh Sadeghi, Sajjad Dadkhah, Hamid A. Jalab, Giuseppe Mazzola, and Diaa Uliyan. 2018. State of the art in passive digital image forgery detection: Copy-move image forgery. Pattern Analysis and Applications 21, 2 (2018), 291–306.
[275]
Ronald Salloum, Yuzhuo Ren, and C.-C. Jay Kuo. 2018. Image splicing localization using a multi-task fully convolutional network (MFCN). Journal of Visual Communication and Image Representation 51 (2018), 201–209.
[276]
Gopinath Sankar, Vicky Zhao, and Yee-Hong Yang. 2009. Feature based classification of computer graphics and real images. In Proceedings of the 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, Los Alamitos, CA, 1513–1516.
[277]
Anindya Sarkar, Lakshmanan Nataraj, and Bangalore S. Manjunath. 2009. Detection of seam carving and localization of seam insertions in digital images. In Proceedings of the 11th ACM Workshop on Multimedia and Security. 107–116.
[278]
Gerald Schaefer and Michal Stich. 2003. UCID: An uncompressed color image database. In Storage and Retrieval Methods and Applications for Multimedia 2004, Vol. 5307. SPIE, 472–480.
[279]
Ulrich Scherhag, Christian Rathgeb, and Christoph Busch. 2018. Towards detection of morphed face images in electronic travel documents. In Proceedings of the 2018 13th IAPR International Workshop on Document Analysis Systems (DAS ’18). 187–192.
[280]
Clemens Seibold, Wojciech Samek, Anna Hilsmann, and Peter Eisert. 2017. Detection of face morphing attacks by deep learning. In Digital Forensics and Watermarking, Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, and Hyoung Joong Kim (Eds.). Springer International Publishing, Cham, Switzerland, 107–120.
[281]
Clemens Seibold, Wojciech Samek, Anna Hilsmann, and Peter Eisert. 2020. Accurate and robust neural networks for face morphing attack detection. Journal of Information Security and Applications 53 (2020), 102526.
[282]
Hanieh Shabanian and Farshad Mashhadi. 2017. A new approach for detecting copy-move forgery in digital images. In Proceedings of the 2017 IEEE Western New York Image and Signal Processing Workshop (WNYISPW ’17). 1–6.
[283]
Wuyang Shan, Yaohua Yi, Ronggang Huang, and Yong Xie. 2019. Robust contrast enhancement forensics based on convolutional neural networks. Signal Processing: Image Communication 71 (2019), 138–146.
[284]
Rajni. 2012. Analysis of image watermarking using least significant bit algorithm. International Journal of Information Sciences and Techniques 2 (2012), 95–101.
[285]
Yun Q. Shi, Chunhua Chen, and Wen Chen. 2007. A natural image model approach to splicing detection. In Proceedings of the 9th Workshop on Multimedia and Security (MM&Sec ’07). ACM, New York, NY, 51–62.
[286]
B. L. Shivakumar and S. Santhosh Baboo. 2011. Detection of region duplication forgery in digital images using SURF. International Journal of Computer Science Issues 8, 4 (2011), 199.
[287]
Dasara Shullani, Marco Fontani, Massimo Iuliani, Omar Al Shaya, and Alessandro Piva. 2017. Vision: A video and image dataset for source identification. EURASIP Journal on Information Security 2017, 1 (2017), 1–16.
[288]
Ewerton Silva, Tiago Carvalho, Anselmo Ferreira, and Anderson Rocha. 2015. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes. Journal of Visual Communication and Image Representation 29 (2015), 16–32.
[289]
Badal Soni, Pradip K. Das, and Dalton Meitei Thounaojam. 2017. Blur invariant block based copy-move forgery detection technique using FWHT features. In Proceedings of the International Conference on Watermarking and Image Processing (ICWIP ’07). ACM, New York, NY, 22–26.
[290]
Matthew James Sorell. 2009. Conditions for effective detection and identification of primary quantisation of re-quantized JPEG images. International Journal of Digital Crime and Forensics 1, 2 (2009), 13–27.
[291]
Wei Wang, Jing Dong, and Tieniu Tan. 2011. Tampered region localization of digital color images based on JPEG compression noise. In Digital Watermarking. Lecture Notes in Computer Science, Vol. 6526. Springer, 120–133.
[292]
Matthew C. Stamm and K. J. Ray Liu. 2010. Forensic detection of image manipulation using statistical intrinsic fingerprints. IEEE Transactions on Information Forensics and Security 5, 3 (2010), 492–506.
[293]
Matthew C. Stamm and K. J. Ray Liu. 2010. Forensic estimation and reconstruction of a contrast enhancement mapping. In Proceedings of the 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, Los Alamitos, CA, 1698–1701.
[294]
Dan-Cristian Stanciu and Bogdan Ionescu. 2023. Autoencoder-based data augmentation for deepfake detection. In Proceedings of the 2nd ACM International Workshop on Multimedia AI against Disinformation. 19–27.
[295]
Baina Su and Zhu Kaizhen. 2012. Detection of copy forgery in digital images based on LPP-SIFT. In Proceedings of the 2012 International Conference on Industrial Control and Electronics Engineering. 1773–1776.
[296]
Patchara Sutthiwan, Jingyu Ye, and Yun Q. Shi. 2009. An enhanced statistical approach to identifying photorealistic images. In Digital Watermarking. Lecture Notes in Computer Science, Vol. 5703. Springer, 323–335.
[297]
Ashwin Swaminathan, Min Wu, and K. J. Ray Liu. 2006. Image tampering identification using blind deconvolution. In Proceedings of the 2006 International Conference on Image Processing. IEEE, Los Alamitos, CA, 2309–2312.
[298]
Ashwin Swaminathan, Min Wu, and K. J. Ray Liu. 2007. Nonintrusive component forensics of visual sensors using output images. IEEE Transactions on Information Forensics and Security 2, 1 (2007), 91–106.
[299]
Jun Takamatsu, Yasuyuki Matsushita, Tsukasa Ogasawara, and Katsushi Ikeuchi. 2010. Estimating demosaicing algorithms using image noise variance. In Proceedings of the 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE, Los Alamitos, CA, 279–286.
[300]
Hideyuki Tamura, Shunji Mori, and Takashi Yamawaki. 1978. Textural features corresponding to visual perception. IEEE Transactions on Systems, Man, and Cybernetics 8, 6 (1978), 460–473.
[301]
Omar Tayan, Muhammad N. Kabir, and Yasser M. Alginahi. 2014. A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents. Scientific World Journal 2014 (2014), 514652.
[302]
Huawei Tian, Yanhui Xiao, Gang Cao, Yongsheng Zhang, Zhiyin Xu, and Yao Zhao. 2019. Daxing smartphone identification dataset. IEEE Access 7 (2019), 101046–101053.
[303]
Steven Tjoa, W. Sabrina Lin, H. Vicky Zhao, and K. J. Ray Liu. 2007. Block size forensic analysis in digital images. In Proceedings of the 2007 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’07), Vol. 1. IEEE, Los Alamitos, CA, 633–636.
[304]
Radhika V. Totla and K. S. Bapat. 2013. Comparative analysis of watermarking in digital images using DCT & DWT. International Journal of Scientific and Research Publications 3, 2 (2013), 1–4.
[305]
Dijana Tralic, Ivan Zupancic, Sonja Grgic, and Mislav Grgic. 2013. CoMoFoD—New database for copy-move forgery detection. In Proceedings of the 55th International Symposium (ELMAR ’13). IEEE, Los Alamitos, CA, 49–54.
[306]
Matthieu Urvoy, Dalila Goudia, and Florent Autrusseau. 2014. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Transactions on Information Forensics and Security 9, 7 (2014), 1108–1119.
[307]
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, and Christoph Busch. 2021. Face morphing attack generation and detection: A comprehensive survey. IEEE Transactions on Technology and Society 2, 3 (2021), 128–145.
[308]
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Luuk Spreeuwers, Raymond Veldhuis, and Christoph Busch. 2020. Detecting morphed face attacks using residual noise from deep multi-scale context aggregation network. In Proceedings of the 2020 IEEE Winter Conference on Applications of Computer Vision (WACV ’20). 269–278.
[309]
Sebastiano Verde, Cecilia Pasquini, Federica Lago, Alessandro Goller, Francesco De Natale, Alessandro Piva, and Giulia Boato. 2023. Multi-clue reconstruction of sharing chains for social media images. IEEE Transactions on Multimedia. Early Access, March 6, 2023.
[310]
Luisa Verdoliva. 2020. Media forensics and deepfakes: An overview. IEEE Journal of Selected Topics in Signal Processing 14, 5 (2020), 910–932.
[311]
David Vázquez-Padín and Fernando Pérez-González. 2011. Prefilter design for forensic resampling estimation. In Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security. 1–6.
[312]
Savita Walia and Krishan Kumar. 2019. Digital image forgery detection: A systematic scrutiny. Australian Journal of Forensic Sciences 51, 5 (2019), 488–526.
[313]
Lukasz Wandzik, Gerald Kaeding, and Raul Vicente Garcia. 2018. Morphing detection using a general-purpose face recognition system. In Proceedings of the 2018 26th European Signal Processing Conference (EUSIPCO ’18). 1012–1016.
[314]
Junwen Wang, Guangjie Liu, Hongyuan Li, Yuewei Dai, and Zhiquan Wang. 2009. Detection of image region duplication forgery using model with circle block. In Proceedings of the 2009 International Conference on Multimedia Information Networking and Security, Vol. 1. 25–29.
[315]
Wei Wang, Jing Dong, and Tieniu Tan. 2009. Effective image splicing detection based on image chroma. In Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP ’09). IEEE, Los Alamitos, CA, 1257–1260.
[316]
Xinyi Wang, He Wang, Shaozhang Niu, and Jiwei Zhang. 2019. Detection and localization of image forgeries using improved mask regional convolutional neural network. Mathematical Biosciences and Engineering 16, 5 (2019), 4581–4593.
[317]
Yuan Wang, Lihua Tian, and Chen Li. 2017. LBP-SVD based copy move forgery detection algorithm. In Proceedings of the 2017 IEEE International Symposium on Multimedia (ISM ’17). IEEE, Los Alamitos, CA, 553–556.
[318]
Kanoksak Wattanachote, Timothy K. Shih, Wen-Lung Chang, and Hon-Hang Chang. 2015. Tamper detection of JPEG image due to seam modifications. IEEE Transactions on Information Forensics and Security 10, 12 (2015), 2477–2491.
[319]
Weimin Wei, Shuozhong Wang, and Zhenjun Tang. 2008. Estimation of rescaling factor and detection of image splicing. In Proceedings of the 2008 11th IEEE International Conference on Communication Technology. IEEE, Los Alamitos, CA, 676–679.
[320]
Bihan Wen, Ye Zhu, Ramanathan Subramanian, Tian-Tsong Ng, Xuanjing Shen, and Stefan Winkler. 2016. COVERAGE—A novel database for copy-move forgery detection. In Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP ’16). IEEE, Los Alamitos, CA, 161–165.
[321]
P. Whig. 2022. More on convolution neural network CNN. International Journal of Sustainable Development in Computing Science 4, 1 (2022).
[322]
David Wicki-Birchler. 2020. The Budapest convention and the general data protection regulation: Acting in concert to curb cybercrime? International Cybersecurity Law Review 1 (2020), 63–72.
[323]
Raymond B. Wolfgang and Edward J. Delp III. 1999. Fragile watermarking using the VW2D watermark. In Security and Watermarking of Multimedia Contents, Vol. 3657. SPIE, 204–213.
[324]
Qiong Wu, Shao-Jie Sun, Wei Zhu, Guo-Hui Li, and Dan Tu. 2008. Detection of digital doctoring in exemplar-based inpainted images. In Proceedings of the 2008 International Conference on Machine Learning and Cybernetics, Vol. 3. IEEE, Los Alamitos, CA, 1222–1226.
[325]
Qiumin Wu, Shuozhong Wang, and Xinpeng Zhang. 2011. Log-polar based scheme for revealing duplicated regions in digital images. IEEE Signal Processing Letters 18, 10 (2011), 559–562.
[326]
Yue Wu, Wael Abd-Almageed, and Prem Natarajan. 2018. BusterNet: Detecting copy-move image forgery with source/target localization. In Proceedings of the European Conference on Computer Vision (ECCV ’18). 168–184.
[327]
Duorui Xie, Lingyu Liang, Lianwen Jin, Jie Xu, and Mengru Li. 2015. SCUT-FBP: A benchmark dataset for facial beauty perception. In Proceedings of the 2015 IEEE International Conference on Systems, Man, and Cybernetics. IEEE, Los Alamitos, CA, 1821–1826.
[328]
Liehua Xie and Gonzalo R. Arce. 1998. A blind wavelet based digital signature for image authentication. In Proceedings of the 9th European Signal Processing Conference (EUSIPCO ’98). IEEE, Los Alamitos, CA, 1–4.
[329]
Liehua Xie, Gonzalo R. Arce, Arianne Lewis, and E. B. Basch. 2000. Image enhancement towards soft image authentication. In Proceedings of the 2000 IEEE International Conference on Multimedia and Expo (ICME ’00), Vol. 1. IEEE, Los Alamitos, CA, 497–500.
[330]
Preeti Yadav and Yogesh Rathore. 2012. Detection of copy-move forgery of images using discrete wavelet transform. International Journal on Computer Science and Engineering 4, 4 (2012), 565.
[331]
Fan Yang, Jingwei Li, Wei Lu, and Jian Weng. 2017. Copy-move forgery detection based on hybrid features. Engineering Applications of Artificial Intelligence 59 (2017), 73–83.
[332]
Pengpeng Yang, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, and Alessandro Piva. 2020. A survey of deep learning-based source image forensics. Journal of Imaging 6, 3 (2020), 9.
[333]
Ziming Yang, Jian Liang, Yuting Xu, Xiao-Yu Zhang, and Ran He. 2023. Masked relation learning for deepfake detection. IEEE Transactions on Information Forensics and Security 18 (2023), 1696–1708.
[334]
Hongwei Yao, Tong Qiao, Ming Xu, and Ning Zheng. 2018. Robust multi-classifier for camera model identification based on convolution neural network. IEEE Access 6 (2018), 24973–24982.
[335]
Shuiming Ye, Qibin Sun, and Ee-Chien Chang. 2007. Detecting digital image forgeries by measuring inconsistencies of blocking artifact. In Proceedings of the 2007 IEEE International Conference on Multimedia and Expo. IEEE, Los Alamitos, CA, 12–15.
[336]
Minerva M. Yeung and Fred Mintzer. 1997. An invisible watermarking technique for image verification. In Proceedings of the International Conference on Image Processing, Vol. 2. IEEE, Los Alamitos, CA, 680–683.
[337]
Jun Yu, Scott Craver, and Enping Li. 2011. Toward the identification of DSLR lenses by chromatic aberration. In Media Watermarking, Security, and Forensics III, Vol. 7880. SPIE, 373–381.
[338]
Markos Zampoglou, Symeon Papadopoulos, and Yiannis Kompatsiaris. 2015. Detecting image splicing in the wild (web). In Proceedings of the 2015 IEEE International Conference on Multimedia and Expo Workshops (ICMEW ’15). IEEE, Los Alamitos, CA, 1–6.
[339]
Marcello Zanardelli, Fabrizio Guerrini, Riccardo Leonardi, and Nicola Adami. 2023. Image forgery detection: A survey of recent deep-learning approaches. Multimedia Tools and Applications 82 (2023), 17521–17566.
[340]
Jishen Zeng, Shunquan Tan, Bin Li, and Jiwu Huang. 2018. Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Transactions on Information Forensics and Security 13, 5 (2018), 1200–1214.
[341]
Chenshuang Zhang, Chaoning Zhang, Sheng Zheng, Mengchun Zhang, Maryam Qamar, Sung-Ho Bae, and In So Kweon. 2023. A survey on audio diffusion models: Text to speech synthesis and enhancement in generative AI. arXiv preprint arXiv:2303.13336 2 (2023).
[342]
Jing Zhang, Zhanlei Feng, and Yuting Su. 2008. A new approach for detecting copy-move forgery in digital images. In Proceedings of the 2008 11th IEEE Singapore International Conference on Communication Systems. 362–366.
[343]
Jing Zhang, Haiying Wang, and Yuting Su. 2008. Detection of double-compression in JPEG2000 images. In Proceedings of the 2008 2nd International Symposium on Intelligent Information Technology Application, Vol. 1. 418–421.
[344]
Le-Bing Zhang, Fei Peng, and Min Long. 2018. Face morphing detection using Fourier spectrum of sensor pattern noise. In Proceedings of the 2018 IEEE International Conference on Multimedia and Expo (ICME ’18). IEEE, Los Alamitos, CA, 1–6.
[345]
Wei Zhang, Xiaochun Cao, Yanling Qu, Yuexian Hou, Handong Zhao, and Chenyang Zhang. 2010. Detecting and extracting the photo composites using planar homography and graph cut. IEEE Transactions on Information Forensics and Security 5, 3 (2010), 544–555.
[346]
Ying Zhang, Jonathan Goh, Lei Lei Win, and Vrizlynn L. L. Thing. 2016. Image region forgery detection: A deep learning approach. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC ’16). 1–11.
[347]
Zhen Zhang, Jiquan Kang, and Yuan Ren. 2008. An effective algorithm of image splicing detection. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Vol. 1. IEEE, Los Alamitos, CA, 1035–1039.
[348]
Zhen Zhang, GuangHua Wang, Yukun Bian, and Zhou Yu. 2010. A novel model for splicing detection. In Proceedings of the 2010 IEEE 5th International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA ’10). IEEE, Los Alamitos, CA, 962–965.
[349]
Xudong Zhao, Jianhua Li, Shenghong Li, and Shilin Wang. 2011. Detecting digital image splicing in chroma spaces. In Digital Watermarking, Hyoung-Joong Kim, Yun Qing Shi, and Mauro Barni (Eds.). Springer, Berlin, Germany, 12–22.
[350]
Lilei Zheng, Ying Zhang, and Vrizlynn L. L. Thing. 2019. A survey on image tampering and its detection in real-world photos. Journal of Visual Communication and Image Representation 58 (2019), 380–399.
[351]
Nan Zhu, Cheng Deng, and Xinbo Gao. 2017. Image sharpening detection based on multiresolution overshoot artifact analysis. Multimedia Tools and Applications 76 (2017), 16563–16580.

Cited By

View all
  • (2024)CFDMI-SEC: An optimal model for copy-move forgery detection of medical image using SIFT, EOM and CHMPLOS ONE10.1371/journal.pone.030333219:7(e0303332)Online publication date: 23-Jul-2024
  • (2024)Introduction to Special Issue on “Recent Trends in Multimedia Forensics”ACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367847320:11(1-7)Online publication date: 2-Aug-2024
  • (2024)Cascaded Adaptive Graph Representation Learning for Image Copy-Move Forgery DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3669905Online publication date: 29-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 11
November 2024
702 pages
EISSN:1551-6865
DOI:10.1145/3613730
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 September 2024
Online AM: 16 November 2023
Accepted: 08 November 2023
Revised: 27 September 2023
Received: 31 March 2023
Published in TOMM Volume 20, Issue 11

Check for updates

Author Tags

  1. Digital forensics
  2. image forensics
  3. image forgery detection
  4. active methods
  5. passive methods
  6. dependent and independent techniques
  7. pixel non-uniformity noise
  8. photo response non-uniformity

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,687
  • Downloads (Last 6 weeks)374
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)CFDMI-SEC: An optimal model for copy-move forgery detection of medical image using SIFT, EOM and CHMPLOS ONE10.1371/journal.pone.030333219:7(e0303332)Online publication date: 23-Jul-2024
  • (2024)Introduction to Special Issue on “Recent Trends in Multimedia Forensics”ACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367847320:11(1-7)Online publication date: 2-Aug-2024
  • (2024)Cascaded Adaptive Graph Representation Learning for Image Copy-Move Forgery DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3669905Online publication date: 29-May-2024
  • (2024)Contour-assistance-based video matting localizationMultimedia Systems10.1007/s00530-024-01456-z30:5Online publication date: 30-Aug-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media