Skip to main content
Erschienen in: Artificial Intelligence Review 3/2022

23.07.2021

Passive image forensics using universal techniques: a review

verfasst von: Surbhi Gupta, Neeraj Mohan, Priyanka Kaushal

Erschienen in: Artificial Intelligence Review | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital tamper detection is a substantial research area of image analysis that identifies the manipulation in the image. This domain has matured with time and incredible accuracy in the last five years using machine learning and deep learning-based approaches. Now, it is time for the evolution of fusion and reinforcement-based learning techniques. Nevertheless, before commencing any experimentation, a researcher needs a comprehensive state of the art in that domain. Various directions, their outcome, and analysis form the basis for successful experiments and ensure better results. Universal image forensics approaches are a significant subset of image forensic techniques and must be explored thoroughly before experimentation. This motivated authors to write a review of these approaches. In contrast to the existing recent surveys that aim at image splicing or copy-move detection, our study aims to explore the universal type-independent techniques required to highlight image tampering. Several universal approaches based on resampling, compression, and inconsistency-based detection are compared and evaluated in the presented work. This review communicates the approach used for review, analysed literature, and lastly, the conclusive remarks. Various resources beneficial for the research community, i.e. journals and datasets, are explored and enumerated. Lastly, a futuristic reinforcement learning-based model is proposed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abrahim AR, Rahim MSM, Sulong GB (2019) Splicing image forgery identification based on artificial neural network approach and texture features. Clust Comput 22(1):647–660CrossRef Abrahim AR, Rahim MSM, Sulong GB (2019) Splicing image forgery identification based on artificial neural network approach and texture features. Clust Comput 22(1):647–660CrossRef
Zurück zum Zitat Al-Qershi OM, Khoo E (2013) Passive detection of copy-move forgery in digital images State-of-the-art. Forensic Sci Int. 231(1–3):284–295CrossRef Al-Qershi OM, Khoo E (2013) Passive detection of copy-move forgery in digital images State-of-the-art. Forensic Sci Int. 231(1–3):284–295CrossRef
Zurück zum Zitat Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099–1110CrossRef
Zurück zum Zitat Ansari MD, Ghrera SP, Tyagi V (2014) Pixel-based image forgery detection: a review. IETE J Education 55(1):40–46CrossRef Ansari MD, Ghrera SP, Tyagi V (2014) Pixel-based image forgery detection: a review. IETE J Education 55(1):40–46CrossRef
Zurück zum Zitat Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci 49(3):281–307CrossRef Asghar K, Habib Z, Hussain M (2017) Copy-move and splicing image forgery detection and localization techniques: a review. Aust J Forensic Sci 49(3):281–307CrossRef
Zurück zum Zitat Avcibas I, and Sankur B, (2000) Statistical analysis of image quality measures”, Proc. 10th European Signal Processing Conference on Circuits and Systems, pp. 1–4. Avcibas I, and Sankur B, (2000) Statistical analysis of image quality measures”, Proc. 10th European Signal Processing Conference on Circuits and Systems, pp. 1–4.
Zurück zum Zitat Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid lstm and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300MathSciNetMATHCrossRef Bappy JH, Simons C, Nataraj L, Manjunath BS, Roy-Chowdhury AK (2019) Hybrid lstm and encoder-decoder architecture for detection of image forgeries. IEEE Trans Image Process 28(7):3286–3300MathSciNetMATHCrossRef
Zurück zum Zitat Barni M, Bondi L, Bonettini N, Bestagini P, Costanzo A, Maggini M, Tondi B, Tubaro S (2017) Aligned and non-aligned double JPEG detection using convolutional neural networks. J vis Commun Image Represent 49:153–163CrossRef Barni M, Bondi L, Bonettini N, Bestagini P, Costanzo A, Maggini M, Tondi B, Tubaro S (2017) Aligned and non-aligned double JPEG detection using convolutional neural networks. J vis Commun Image Represent 49:153–163CrossRef
Zurück zum Zitat Bas P, Filler T and Pevný T (2011) Break our steganographic system”: the ins and outs of organizing BOSS. In International workshop on information hiding (pp. 59–70). Springer, Berlin, Heidelberg Bas P, Filler T and Pevný T (2011) Break our steganographic system”: the ins and outs of organizing BOSS. In International workshop on information hiding (pp. 59–70). Springer, Berlin, Heidelberg
Zurück zum Zitat Bayram, S., Avcıbaş, I., Sankur, B., and Memon, N., (2006), “Image manipulation detection”, Journal of Electronic Imaging, 15(4), pp. 041102:1–17. Bayram, S., Avcıbaş, I., Sankur, B., and Memon, N., (2006), “Image manipulation detection”, Journal of Electronic Imaging, 15(4), pp. 041102:1–17.
Zurück zum Zitat Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef Birajdar GK, Mankar VH (2013) Digital image forgery detection using passive techniques: a survey. Digit Investig 10(3):226–245CrossRef
Zurück zum Zitat Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK and Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning", In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (pp. 1881–1889). IEEE Bunk J, Bappy JH, Mohammed TM, Nataraj L, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK and Peterson L (2017) Detection and localization of image forgeries using resampling features and deep learning", In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (pp. 1881–1889). IEEE
Zurück zum Zitat Carvalho T, Faria FA, Pedrini H, Torres RDS, Rocha A (2016) Illuminant-based transformed spaces for image forensics. IEEE Trans Inf Forensics Secur 11(4):720–733CrossRef Carvalho T, Faria FA, Pedrini H, Torres RDS, Rocha A (2016) Illuminant-based transformed spaces for image forensics. IEEE Trans Inf Forensics Secur 11(4):720–733CrossRef
Zurück zum Zitat Chen Z, Zhao Y, Ni R (2017) Detection of operation chain: JPEG-resampling-JPEG. Signal Processing: Image Commun 57:8–20 Chen Z, Zhao Y, Ni R (2017) Detection of operation chain: JPEG-resampling-JPEG. Signal Processing: Image Commun 57:8–20
Zurück zum Zitat Chen Y, Wang Z, Wang ZJ, Kang X (2020) Automated design of neural network architectures with reinforcement learning for detection of global manipulations. IEEE J Selected Topics in Signal Processing 14(5):997–1011CrossRef Chen Y, Wang Z, Wang ZJ, Kang X (2020) Automated design of neural network architectures with reinforcement learning for detection of global manipulations. IEEE J Selected Topics in Signal Processing 14(5):997–1011CrossRef
Zurück zum Zitat Chen YL and Hsu CT (2008) Image tampering detection by blocking periodicity analysis in JPEG compressed images. Proc. 10th IEEE Workshop on Multimedia Signal Processing, Queensland, Australia, pp. 803–808 Chen YL and Hsu CT (2008) Image tampering detection by blocking periodicity analysis in JPEG compressed images. Proc. 10th IEEE Workshop on Multimedia Signal Processing, Queensland, Australia, pp. 803–808
Zurück zum Zitat Chen W, Shi YQ, and Su W (2007) Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. Proc.Security, Steganography, and Watermarking of Multimedia Contents, Electronic Imaging, San Jose, CA, United States, pp. 1–8 Chen W, Shi YQ, and Su W (2007) Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. Proc.Security, Steganography, and Watermarking of Multimedia Contents, Electronic Imaging, San Jose, CA, United States, pp. 1–8
Zurück zum Zitat Cozzolino D, Gargiulo F, Sansone C and Verdoliva L (2013) Multiple classifier systems for image forgery detection. Proc. International Conference on Image Analysis and Processing, Springer, Naples, Italy, pp. 259–268 Cozzolino D, Gargiulo F, Sansone C and Verdoliva L (2013) Multiple classifier systems for image forgery detection. Proc. International Conference on Image Analysis and Processing, Springer, Naples, Italy, pp. 259–268
Zurück zum Zitat Dang-Nguyen DT, Pasquini C, Conotter V and Boato G (2015) RAISE: a raw images dataset for digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp. 219–224) Dang-Nguyen DT, Pasquini C, Conotter V and Boato G (2015) RAISE: a raw images dataset for digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp. 219–224)
Zurück zum Zitat Dong W, Zhou N, Paul JC, Zhang X (2009) Optimized image resizing using seam carving and scaling. ACM Trans Graphics 28(5):125CrossRef Dong W, Zhou N, Paul JC, Zhang X (2009) Optimized image resizing using seam carving and scaling. ACM Trans Graphics 28(5):125CrossRef
Zurück zum Zitat Dong J, Wang W, Tan T and Shi YQ (2008) Run-length and edge statistics based approach for image splicing detection. Proc. International Workshop on Digital Forensics and Watermarking, Busan, South Korea, pp. 76–87 Dong J, Wang W, Tan T and Shi YQ (2008) Run-length and edge statistics based approach for image splicing detection. Proc. International Workshop on Digital Forensics and Watermarking, Busan, South Korea, pp. 76–87
Zurück zum Zitat Fan Z, De Queiroz RL (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235CrossRef Fan Z, De Queiroz RL (2003) Identification of bitmap compression history: JPEG detection and quantizer estimation. IEEE Trans Image Process 12(2):230–235CrossRef
Zurück zum Zitat Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Secur 4(1):154–160CrossRef Farid H (2009) Exposing digital forgeries from JPEG ghosts. IEEE Trans Inf Forensics Secur 4(1):154–160CrossRef
Zurück zum Zitat Ferreira WD, Ferreira CB, da Cruz Júnior G and Soares F (2020) A review of digital image forensics. Computers & Electrical Engineering, 85, p.106685. Ferreira WD, Ferreira CB, da Cruz Júnior G and Soares F (2020) A review of digital image forensics. Computers & Electrical Engineering, 85, p.106685.
Zurück zum Zitat Flenner A, Peterson L, Bunk J, Mohammed TM, Nataraj L, Manjunath BS (2018) Resampling forgery detection using deep learning and a-contrario analysis. Electron Imaging 7:212–221 Flenner A, Peterson L, Bunk J, Mohammed TM, Nataraj L, Manjunath BS (2018) Resampling forgery detection using deep learning and a-contrario analysis. Electron Imaging 7:212–221
Zurück zum Zitat Fontani M, Bianchi T, De Rosa A, Piva A, Barni M (2013) A framework for decision fusion in image forensics based on dempster-shafer theory of evidence. IEEE Trans Inf Forensics Secur 8(4):593–607CrossRef Fontani M, Bianchi T, De Rosa A, Piva A, Barni M (2013) A framework for decision fusion in image forensics based on dempster-shafer theory of evidence. IEEE Trans Inf Forensics Secur 8(4):593–607CrossRef
Zurück zum Zitat Fu D, Shi YQ, and Su W (2007) A generalized Benford's law for JPEG coefficients and its applications in image forensics. Proc. Security, Steganography and Watermarking of Multimedia Contents, Electronic Imaging, San Jose, CA, United States, pp. 65051–65062. Fu D, Shi YQ, and Su W (2007) A generalized Benford's law for JPEG coefficients and its applications in image forensics. Proc. Security, Steganography and Watermarking of Multimedia Contents, Electronic Imaging, San Jose, CA, United States, pp. 65051–65062.
Zurück zum Zitat Gallagher, AC (2005) Detection of linear and cubic interpolation in JPEG compressed images”, Proc. 2nd Canadian Conference on Computer and Robot Vision, Victoria, BC, Canada, pp. 65–72. Gallagher, AC (2005) Detection of linear and cubic interpolation in JPEG compressed images”, Proc. 2nd Canadian Conference on Computer and Robot Vision, Victoria, BC, Canada, pp. 65–72.
Zurück zum Zitat Gloe T, Böhme R (2010) The dresden image database for benchmarking digital image forensics. Journal of Digital Forensic Practice 3(2–4):150–159CrossRef Gloe T, Böhme R (2010) The dresden image database for benchmarking digital image forensics. Journal of Digital Forensic Practice 3(2–4):150–159CrossRef
Zurück zum Zitat Gonzalez W, Woods RE (2004) Eddins digital image processing using MATLAB. Prentice Hall, New Jersey Gonzalez W, Woods RE (2004) Eddins digital image processing using MATLAB. Prentice Hall, New Jersey
Zurück zum Zitat Gou H, Swaminathan A, Wu M (2007) Noise features for image tampering detection and steganalysis”, Proc. International Conference on Image Processing, San Antonio, TX, USA, pp. 97–100 Gou H, Swaminathan A, Wu M (2007) Noise features for image tampering detection and steganalysis”, Proc. International Conference on Image Processing, San Antonio, TX, USA, pp. 97–100
Zurück zum Zitat Guan H, Kozak M, Robertson E, Lee Y, Yates AN, Delgado A, Zhou D, Kheyrkhah T, Smith J and Fiscus J (2019) January. MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation. In 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) (pp. 63–72). IEEE Guan H, Kozak M, Robertson E, Lee Y, Yates AN, Delgado A, Zhou D, Kheyrkhah T, Smith J and Fiscus J (2019) January. MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation. In 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) (pp. 63–72). IEEE
Zurück zum Zitat Gupta S, Mohan N, Sandhu PS (2018) Energy deviation measure: a technique for digital image forensics. Int J Electron Secur Digit Forensics 10(4):401–416CrossRef Gupta S, Mohan N, Sandhu PS (2018) Energy deviation measure: a technique for digital image forensics. Int J Electron Secur Digit Forensics 10(4):401–416CrossRef
Zurück zum Zitat Gupta S, Mohan N, Kumar M (2021) A study on source device attribution using still images. Archiv Comput Methods in Eng 28:2209–2223CrossRef Gupta S, Mohan N, Kumar M (2021) A study on source device attribution using still images. Archiv Comput Methods in Eng 28:2209–2223CrossRef
Zurück zum Zitat Han JG, Park TH, Moon YH, Eom IK (2018) Quantization-based Markov feature extraction method for image splicing detection. Mach vis Appl 29(3):543–552CrossRef Han JG, Park TH, Moon YH, Eom IK (2018) Quantization-based Markov feature extraction method for image splicing detection. Mach vis Appl 29(3):543–552CrossRef
Zurück zum Zitat He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn 45(12):4292–4299CrossRef He Z, Lu W, Sun W, Huang J (2012) Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recogn 45(12):4292–4299CrossRef
Zurück zum Zitat Hou X, Zhang T, Xiong G, Zhang Y, Ping X (2014) Image resampling detection based on texture classification. Multimedia Tools Appl 72(2):1681–1708CrossRef Hou X, Zhang T, Xiong G, Zhang Y, Ping X (2014) Image resampling detection based on texture classification. Multimedia Tools Appl 72(2):1681–1708CrossRef
Zurück zum Zitat Huang F, Huang J, Shi YQ (2010) Detecting double JPEG compression with the same quantization matrix. IEEE Trans Inform Forensics Security 5(4):848–856CrossRef Huang F, Huang J, Shi YQ (2010) Detecting double JPEG compression with the same quantization matrix. IEEE Trans Inform Forensics Security 5(4):848–856CrossRef
Zurück zum Zitat Hussain M, Qasem S, Bebis G, Muhammad G, Aboalsamh H, Mathkour H (2015) Evaluation of image forgery detection using multi-scale weber local descriptors. Int J Artif Intell Tools 24(4):1540016–1540043CrossRef Hussain M, Qasem S, Bebis G, Muhammad G, Aboalsamh H, Mathkour H (2015) Evaluation of image forgery detection using multi-scale weber local descriptors. Int J Artif Intell Tools 24(4):1540016–1540043CrossRef
Zurück zum Zitat Jaiswal AK and Srivastava R (2020) A technique for image splicing detection using hybrid feature set. Multimedia Tools and Applications, pp.1–24. Jaiswal AK and Srivastava R (2020) A technique for image splicing detection using hybrid feature set. Multimedia Tools and Applications, pp.1–24.
Zurück zum Zitat Kanwal N, Girdhar A, Kaur L and Bhullar JS (2020) Digital image splicing detection technique using optimal threshold-based local ternary pattern. Multimedia Tools and Applications, pp.1–18 Kanwal N, Girdhar A, Kaur L and Bhullar JS (2020) Digital image splicing detection technique using optimal threshold-based local ternary pattern. Multimedia Tools and Applications, pp.1–18
Zurück zum Zitat Ke Y, Zhang Q, Min W, Zhang S (2014) Detecting image forgery based on noise estimation. Int J Multimedia and Ubiquitous Eng 9(1):325–336CrossRef Ke Y, Zhang Q, Min W, Zhang S (2014) Detecting image forgery based on noise estimation. Int J Multimedia and Ubiquitous Eng 9(1):325–336CrossRef
Zurück zum Zitat Kirchner M, Bohme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inf Forensics Secur 3(4):582–592CrossRef Kirchner M, Bohme R (2008) Hiding traces of resampling in digital images. IEEE Trans Inf Forensics Secur 3(4):582–592CrossRef
Zurück zum Zitat Korus P (2017) Digital image integrity–a survey of protection and verification techniques. Digital Signal Processing 71:1–26MathSciNetCrossRef Korus P (2017) Digital image integrity–a survey of protection and verification techniques. Digital Signal Processing 71:1–26MathSciNetCrossRef
Zurück zum Zitat Langille A, and Gong M (2006) An efficient match-based duplication detection algorithm. Proc. 3rd Canadian Conference on Computer and Robot Vision, Quebec City, Quebec, pp. 64–69 Langille A, and Gong M (2006) An efficient match-based duplication detection algorithm. Proc. 3rd Canadian Conference on Computer and Robot Vision, Quebec City, Quebec, pp. 64–69
Zurück zum Zitat Liu B, Pun CM (2015) Splicing forgery exposure in digital image by detecting noise discrepancies. Int J Comput Commun Eng 4(1):33–38CrossRef Liu B, Pun CM (2015) Splicing forgery exposure in digital image by detecting noise discrepancies. Int J Comput Commun Eng 4(1):33–38CrossRef
Zurück zum Zitat Luo W, Huang J, Qiu G (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Secur 5(3):480–491CrossRef Luo W, Huang J, Qiu G (2010) JPEG error analysis and its applications to digital image forensics. IEEE Trans Inf Forensics Secur 5(3):480–491CrossRef
Zurück zum Zitat Luo WQV, Qu ZH, Huang JW and Qiu GP (2007) A novel method for detecting cropped and recompressed image block”, Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, Honolulu, USA, pp. 217–220 Luo WQV, Qu ZH, Huang JW and Qiu GP (2007) A novel method for detecting cropped and recompressed image block”, Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, Honolulu, USA, pp. 217–220
Zurück zum Zitat Mahdian B, and Saic S (2009) Detecting double compressed JPEG images. Proc. 3rd International Conference on Imaging for Crime Detection and Prevention, London, UK, pp. 12–17. Mahdian B, and Saic S (2009) Detecting double compressed JPEG images. Proc. 3rd International Conference on Imaging for Crime Detection and Prevention, London, UK, pp. 12–17.
Zurück zum Zitat Mahdian B, Saic S (2008) Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensics Secur 3(3):529–538CrossRef Mahdian B, Saic S (2008) Blind authentication using periodic properties of interpolation. IEEE Trans Inf Forensics Secur 3(3):529–538CrossRef
Zurück zum Zitat Mahfoudi G, Tajini B, Retraint F, Morain-Nicolier F, Dugelay JL and Marc PIC (2019) September. DEFACTO: Image and face manipulation dataset. In 2019 27th European Signal Processing Conference (EUSIPCO) (pp. 1–5). IEEE Mahfoudi G, Tajini B, Retraint F, Morain-Nicolier F, Dugelay JL and Marc PIC (2019) September. DEFACTO: Image and face manipulation dataset. In 2019 27th European Signal Processing Conference (EUSIPCO) (pp. 1–5). IEEE
Zurück zum Zitat Mazumdar A, Bora PK (2020) Siamese convolutional neural network-based approach towards universal image forensics. IET Image Proc 14(13):3105–3116CrossRef Mazumdar A, Bora PK (2020) Siamese convolutional neural network-based approach towards universal image forensics. IET Image Proc 14(13):3105–3116CrossRef
Zurück zum Zitat Moghaddasi Z, Jalab HA, Noor RM (2019) Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients. Neural Comput Appl 31(11):7867–7877CrossRef Moghaddasi Z, Jalab HA, Noor RM (2019) Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients. Neural Comput Appl 31(11):7867–7877CrossRef
Zurück zum Zitat Mohammed TM, Bunk J, Nataraj L, Bappy JH, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK, Peterson LA (2018) (2018), “Boosting image forgery detection using resampling features and copy-move analysis.” Electron Imaging 7:118–121 Mohammed TM, Bunk J, Nataraj L, Bappy JH, Flenner A, Manjunath BS, Chandrasekaran S, Roy-Chowdhury AK, Peterson LA (2018) (2018), “Boosting image forgery detection using resampling features and copy-move analysis.” Electron Imaging 7:118–121
Zurück zum Zitat Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach vis Appl 25(4):985–995CrossRef Muhammad G, Al-Hammadi MH, Hussain M, Bebis G (2014) Image forgery detection using steerable pyramid transform and local binary pattern. Mach vis Appl 25(4):985–995CrossRef
Zurück zum Zitat Muhammad G, Dewan MS, Moniruzzaman M, Hussain M and Huda MN (2014b) Image forgery detection using Gabor filters and DCT. Proc. IEEE International Conference on Electrical Engineering, Vellore, Tamilnadu, India, pp. 1–5. Muhammad G, Dewan MS, Moniruzzaman M, Hussain M and Huda MN (2014b) Image forgery detection using Gabor filters and DCT. Proc. IEEE International Conference on Electrical Engineering, Vellore, Tamilnadu, India, pp. 1–5.
Zurück zum Zitat Nataraj L, Sarkar A and Manjunath BS (2010) Improving re-sampling detection by adding noise. Media Forensics and Security, pp. 75410–75421. Nataraj L, Sarkar A and Manjunath BS (2010) Improving re-sampling detection by adding noise. Media Forensics and Security, pp. 75410–75421.
Zurück zum Zitat Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher-order statistics. Proc IEEE Int Symposium on Circuits and Syst 5:1–42 Ng TT, Chang SF, Sun Q (2004) Blind detection of photomontage using higher-order statistics. Proc IEEE Int Symposium on Circuits and Syst 5:1–42
Zurück zum Zitat Niu Y, Li X, Zhao Y, Ni R (2019) An enhanced approach for detecting double JPEG compression with the same quantization matrix. Signal Processing: Image Commun 76:89–96 Niu Y, Li X, Zhao Y, Ni R (2019) An enhanced approach for detecting double JPEG compression with the same quantization matrix. Signal Processing: Image Commun 76:89–96
Zurück zum Zitat Novozamsky, A., Mahdian, B. and Saic, S., 2020. IMD2020: A large-scale annotated dataset tailored for detecting manipulated images. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (pp. 71–80). Novozamsky, A., Mahdian, B. and Saic, S., 2020. IMD2020: A large-scale annotated dataset tailored for detecting manipulated images. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (pp. 71–80).
Zurück zum Zitat Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRef Pan X, Lyu S (2010) Region duplication detection using image feature matching. IEEE Trans Inf Forensics Secur 5(4):857–867CrossRef
Zurück zum Zitat Peng P, Sun T, Jiang X, Xu K, Li B and Shi Y (2018) Detection of double JPEG compression with the same quantization matrix based on convolutional neural networks", In 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (pp. 717–721). IEEE Peng P, Sun T, Jiang X, Xu K, Li B and Shi Y (2018) Detection of double JPEG compression with the same quantization matrix based on convolutional neural networks", In 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (pp. 717–721). IEEE
Zurück zum Zitat Piva A (2013) An overview on image forensics. ISRN Signal Processing, 2013, pp. 496701:1- 22. Piva A (2013) An overview on image forensics. ISRN Signal Processing, 2013, pp. 496701:1- 22.
Zurück zum Zitat Popescu AC, Farid H (2004) Statistical tools for digital forensics. Inform Hiding 3200:395–407 Popescu AC, Farid H (2004) Statistical tools for digital forensics. Inform Hiding 3200:395–407
Zurück zum Zitat Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767MathSciNetMATHCrossRef Popescu AC, Farid H (2005) Exposing digital forgeries by detecting traces of resampling. IEEE Trans Signal Process 53(2):758–767MathSciNetMATHCrossRef
Zurück zum Zitat Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kołodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. IET Image Proc 7(7):660–670CrossRef Qazi T, Hayat K, Khan SU, Madani SA, Khan IA, Kołodziej J, Li H, Lin W, Yow KC, Xu CZ (2013) Survey on blind image forgery detection. IET Image Proc 7(7):660–670CrossRef
Zurück zum Zitat Rabbani M (2002) JPEG2000 Image compression fundamentals, standards and practice. J Electron Imaging 11(2):286–292CrossRef Rabbani M (2002) JPEG2000 Image compression fundamentals, standards and practice. J Electron Imaging 11(2):286–292CrossRef
Zurück zum Zitat Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Appl 21(2):291–306MathSciNetCrossRef Sadeghi S, Dadkhah S, Jalab HA, Mazzola G, Uliyan D (2018) State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal Appl 21(2):291–306MathSciNetCrossRef
Zurück zum Zitat Saleh SQ, Hussain M, Muhammad G and Bebis, G (2013) Evaluation of image forgery detection using multi-scale weber local descriptors. Proc. International Symposium on Visual Computing, Springer, Berlin, Heidelberg, pp. 416–424. Saleh SQ, Hussain M, Muhammad G and Bebis, G (2013) Evaluation of image forgery detection using multi-scale weber local descriptors. Proc. International Symposium on Visual Computing, Springer, Berlin, Heidelberg, pp. 416–424.
Zurück zum Zitat Schaefer G, Stich M (2004) UCID: An uncompressed color image database. Storage and Retrieval Methods and Appl Multimedia, Int Soc Opt Photon 5307:472–481 Schaefer G, Stich M (2004) UCID: An uncompressed color image database. Storage and Retrieval Methods and Appl Multimedia, Int Soc Opt Photon 5307:472–481
Zurück zum Zitat Shen X, Shi Z, Chen H (2016) Splicing image forgery detection using textural features based on the grey level co-occurrence matrices. IET Image Proc 11(1):44–53CrossRef Shen X, Shi Z, Chen H (2016) Splicing image forgery detection using textural features based on the grey level co-occurrence matrices. IET Image Proc 11(1):44–53CrossRef
Zurück zum Zitat Shi YQ, Chen C and Chen W (2007) A natural image model approach to splicing detection”, Proc. 9th ACM Workshop on Multimedia & Security, Dallas, Texas, pp. 51–62 Shi YQ, Chen C and Chen W (2007) A natural image model approach to splicing detection”, Proc. 9th ACM Workshop on Multimedia & Security, Dallas, Texas, pp. 51–62
Zurück zum Zitat Shullani D, Fontani M, Iuliani M, Al Shaya O, Piva A (2017) VISION: a video and image dataset for source identification. EURASIP J Inf Secur 2017(1):1–16 Shullani D, Fontani M, Iuliani M, Al Shaya O, Piva A (2017) VISION: a video and image dataset for source identification. EURASIP J Inf Secur 2017(1):1–16
Zurück zum Zitat Soni B, Das PK, Thounaojam DM (2017) CMFD: a detailed review of block-based and key feature-based techniques in image copy-move forgery detection. IET Image Proc 12(2):167–178CrossRef Soni B, Das PK, Thounaojam DM (2017) CMFD: a detailed review of block-based and key feature-based techniques in image copy-move forgery detection. IET Image Proc 12(2):167–178CrossRef
Zurück zum Zitat Su Y, Jin X, Zhang C, Chen Y (2017) Hierarchical image resampling detection based on blind deconvolution. J vis Commun Image Represent 48:480–490CrossRef Su Y, Jin X, Zhang C, Chen Y (2017) Hierarchical image resampling detection based on blind deconvolution. J vis Commun Image Represent 48:480–490CrossRef
Zurück zum Zitat Teerakanok S, Uehara T (2019) Copy-move forgery detection: a state-of-the-art technical review and analysis. IEEE Access 7:40550–40568CrossRef Teerakanok S, Uehara T (2019) Copy-move forgery detection: a state-of-the-art technical review and analysis. IEEE Access 7:40550–40568CrossRef
Zurück zum Zitat Thakur R and Rohilla R (2020) Recent Advances in Digital Image Manipulation Detection Techniques: A Brief Review", Forensic Science International, p.110311. Thakur R and Rohilla R (2020) Recent Advances in Digital Image Manipulation Detection Techniques: A Brief Review", Forensic Science International, p.110311.
Zurück zum Zitat Thing VLL, Chen Y and Cheh C (2012) An improved double compression detection method for JPEG image forensics. Proc. IEEE International Symposium on Multimedia, Taichung, Taiwan, pp. 290–297. Thing VLL, Chen Y and Cheh C (2012) An improved double compression detection method for JPEG image forensics. Proc. IEEE International Symposium on Multimedia, Taichung, Taiwan, pp. 290–297.
Zurück zum Zitat Tralic D, Zupancic I, Grgic S and Grgic M (2013) CoMoFoD – New database for copy-move forgery detection”, Proc. 55th International Symposium ELMAR, Zadar, Croatia, pp. 49–54 Tralic D, Zupancic I, Grgic S and Grgic M (2013) CoMoFoD – New database for copy-move forgery detection”, Proc. 55th International Symposium ELMAR, Zadar, Croatia, pp. 49–54
Zurück zum Zitat Vazquez-Padin D and Perez-Gonzalez (2011) Exposing original and duplicated regions using SIFT features and resampling traces. Proc. International Workshop on Digital Watermarking, Atlantic City, NJ, USA, pp. 306–320 Vazquez-Padin D and Perez-Gonzalez (2011) Exposing original and duplicated regions using SIFT features and resampling traces. Proc. International Workshop on Digital Watermarking, Atlantic City, NJ, USA, pp. 306–320
Zurück zum Zitat Verma V, Agarwal N, Khanna N (2018) DCT-domain deep convolutional neural networks for multiple JPEG compression classification. Signal Processing: Image Commun. 67:22–33 Verma V, Agarwal N, Khanna N (2018) DCT-domain deep convolutional neural networks for multiple JPEG compression classification. Signal Processing: Image Commun. 67:22–33
Zurück zum Zitat Wang W, Dong J and Tan T (2009) Effective image splicing detection based on image chroma. Proc. 16th IEEE International Conference on Image Processing, Cairo, Egypt, pp. 1257–1260 Wang W, Dong J and Tan T (2009) Effective image splicing detection based on image chroma. Proc. 16th IEEE International Conference on Image Processing, Cairo, Egypt, pp. 1257–1260
Zurück zum Zitat Wang Q, Zhang R (2016) (2016), “Double JPEG compression forensics based on a convolutional neural network.” EURASIP J Inf Secur 1:23CrossRef Wang Q, Zhang R (2016) (2016), “Double JPEG compression forensics based on a convolutional neural network.” EURASIP J Inf Secur 1:23CrossRef
Zurück zum Zitat Warif NBA, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S and Choo KKR (2016) Copy-move forgery detection: survey, challenges and future directions. Journal of Network and Computer Applications, 75, pp.259–278.B12 Warif NBA, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S and Choo KKR (2016) Copy-move forgery detection: survey, challenges and future directions. Journal of Network and Computer Applications, 75, pp.259–278.B12
Zurück zum Zitat Wattanachote K, Shih TK, Chang WL, Chang HH (2015) Tamper detection of jpeg image due to seam modifications. IEEE Trans Inf Forensics Secur 10(12):2477–2491CrossRef Wattanachote K, Shih TK, Chang WL, Chang HH (2015) Tamper detection of jpeg image due to seam modifications. IEEE Trans Inf Forensics Secur 10(12):2477–2491CrossRef
Zurück zum Zitat Wei Y, Chen Y, Kang X, Wang ZJ and Xiao L (2020) July. Auto-Generating Neural Networks with Reinforcement Learning for Multi-Purpose Image Forensics. In 2020 IEEE International Conference on Multimedia and Expo (ICME) (pp. 1–6). IEEE Wei Y, Chen Y, Kang X, Wang ZJ and Xiao L (2020) July. Auto-Generating Neural Networks with Reinforcement Learning for Multi-Purpose Image Forensics. In 2020 IEEE International Conference on Multimedia and Expo (ICME) (pp. 1–6). IEEE
Zurück zum Zitat Yang B, Li Z, Zhang T (2020) A real-time image forensics scheme based on multi-domain learning. J Real-Time Image Proc 17(1):29–40CrossRef Yang B, Li Z, Zhang T (2020) A real-time image forensics scheme based on multi-domain learning. J Real-Time Image Proc 17(1):29–40CrossRef
Zurück zum Zitat Zeng X, Feng G, Zhang X (2019) Detection of double JPEG compression using modified DenseNet model. Multimedia Tools and Appl 78(7):8183–8196CrossRef Zeng X, Feng G, Zhang X (2019) Detection of double JPEG compression using modified DenseNet model. Multimedia Tools and Appl 78(7):8183–8196CrossRef
Zurück zum Zitat Zhan Y, Chen Y, Zhang Q and Kang X (2017) Image forensics based on transfer learning and convolutional neural network. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security (pp. 165–170). Zhan Y, Chen Y, Zhang Q and Kang X (2017) Image forensics based on transfer learning and convolutional neural network. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security (pp. 165–170).
Zurück zum Zitat Zhang Y, Thing VL (2018) A semi-feature learning approach for tampered region localization across multi-format images. Multimedia Tools and Appl 77(19):25027–25052CrossRef Zhang Y, Thing VL (2018) A semi-feature learning approach for tampered region localization across multi-format images. Multimedia Tools and Appl 77(19):25027–25052CrossRef
Zurück zum Zitat Zhang Z, Kang J, Ren Y (2008a) An effective algorithm of image splicing detection. Proc IEEE Int Conference on Comput Sci Softw Eng, Wuhan, China 1:1035–1039 Zhang Z, Kang J, Ren Y (2008a) An effective algorithm of image splicing detection. Proc IEEE Int Conference on Comput Sci Softw Eng, Wuhan, China 1:1035–1039
Zurück zum Zitat Zhang, J., Feng, Z., and Su, Y., (2008), “A new approach for detecting copy-move forgery in digital images”, Proc. 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, China, pp. 362–366. Zhang, J., Feng, Z., and Su, Y., (2008), “A new approach for detecting copy-move forgery in digital images”, Proc. 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, China, pp. 362–366.
Zurück zum Zitat Zhang Z, Zhang Y, Zhou Z and Luo J (2018) Boundary-based image forgery detection by fast shallow CNN", In 2018 24th International Conference on Pattern Recognition (ICPR) (pp. 2658–2663). IEEE Zhang Z, Zhang Y, Zhou Z and Luo J (2018) Boundary-based image forgery detection by fast shallow CNN", In 2018 24th International Conference on Pattern Recognition (ICPR) (pp. 2658–2663). IEEE
Zurück zum Zitat Zhang Q, Lu W, Huang T, Luo S, Xu Z and Mao Y (2020) On the robustness of JPEG post-compression to resampling factor estimation", Signal Processing, 168, p.107371 Zhang Q, Lu W, Huang T, Luo S, Xu Z and Mao Y (2020) On the robustness of JPEG post-compression to resampling factor estimation", Signal Processing, 168, p.107371
Metadaten
Titel
Passive image forensics using universal techniques: a review
verfasst von
Surbhi Gupta
Neeraj Mohan
Priyanka Kaushal
Publikationsdatum
23.07.2021
Verlag
Springer Netherlands
Erschienen in
Artificial Intelligence Review / Ausgabe 3/2022
Print ISSN: 0269-2821
Elektronische ISSN: 1573-7462
DOI
https://doi.org/10.1007/s10462-021-10046-8

Weitere Artikel der Ausgabe 3/2022

Artificial Intelligence Review 3/2022 Zur Ausgabe