Passive Aproaches for Detecting Image Tampering: A Review

Authors

  • Fatma Salman Hashem UTM-IRDA Digital Media Centre (MaGIC-X), Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia
  • Ghazali Sulong UTM-IRDA Digital Media Centre (MaGIC-X), Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia

DOI:

https://doi.org/10.11113/jt.v73.4189

Keywords:

Detecting, image, forgery, passive, tampering, techniques, tools

Abstract

This paper defines the presently used methods and approaches in the domain of digital image forgery detection.  A survey of a recent study is explored including an examination of the current techniques and passive approaches in detecting image tampering. This area of research is relatively new and only a few sources exist that directly relate to the detection of image forgeries. Passive, or blind, approaches for detecting image tampering are regarded as a new direction of research. In recent years, there has been significant work performed in this highly active area of research. Passive approaches do not depend on hidden data to detect image forgeries, but only utilize the statistics and/or content of the image in question to verify its genuineness. The specific types of forgery detection techniques are discussed below. 

References

Lu, W., Sun, W., Huang, J.-W. and Lu, H.-T. 2008. Digital Image Forensics Using Statistical Features and Neural Network Classifier. In International Conference on Machine Learning and Cybernetics, IEEE. 5: 2831–2834.

Farid, H. 2009. Image Forgery Detection. Signal Processing Magazine. IEEE. 26(2): 16–25.

Mahdian, B. and Saic, S. 2008b. Blind Methods for Detecting Image Fakery. In 42nd Annual IEEE International Carnahan Conference on Security Technology (ICCST), IEEE. 280–286.

Mahdian, B. and Saic, S. 2010. A Bibliography on Blind Methods for Identifying Image Forgery. Signal Processing: Image Communication. 25(6): 389–399.

Sencar, H. and Memon, N. 2008. Overview of State-of-the-Art in Digital Image Forensics. Algorithms, Architectures and Information Systems Security. 3: 325–348.

Fridrich, A. J., Soukal, B. D. and Luk, A. J. 2003. Detection of Copy-move Forgery in Digital Images. In Proceedings of Digital Forensic Research Workshop.

Popescu, A. C. and Farid, H. 2004. Exposing Digital Forgeries by Detecting Duplicated Image Regions. Technical Report.

Mahdian, B. and Saic, S. 2007. Detection of Copy-move Forgery Using A Method Based on Blur Moment Invariants. Forensic Science International. 171(2-3): 180–189.

Pan, X. and Lyu, S. 2010. Region Duplication Detection Using Image Feature Matching. IEEE Transactions on Information Forensics and Security. 5(4): 857–867

Cao, G., Zhao, Y. and Ni, R. 2010a. Forensic Estimation of Gamma Correction in Digital Images. In 17th IEEE International Conference on Image Processing (ICIP), IEEE. 2097–2100.

Kirchner, M. 2010. Linear Row and Column Predictors for the Analysis of Resized Images. In Proceedings of the 12th ACM Workshop on Multimedia and Security. ACM. 13–18

Mahdian, B. and Saic, S. 2008a. Blind Authentication Using Periodic Properties of Interpolation. IEEE Transactions on Information Forensics and Security. 3(3): 529–538.

Popescu, A. C. and Farid, H. 2005. Exposing Digital Forgeries by Detecting Traces of Resampling. IEEE Transactions on Signal Processing. 53(2): 758–767.

Farid, H. and Lyu, S. 2003. Higher-order Wavelet Statistics and Their Application to Digital Forensics. In Conference on Computer Vision and Pattern Recognition Workshop (CVPRW’03), IEEE. 8: 94–94.

Farid, H. 1999. Detecting Digital Forgeries Using Bispectral Analysis.

Bayram, S., Avciba, I., Sankur, B. and Memon, N. 2006. Image Manipulation Detection. Journal of Electronic Imaging. 15(4): 41102–41102.

Lyu, S. and Farid, H. 2005. How Realistic is Photorealistic? IEEE Transactions on Signal Processing. 53(2): 845–850.

Sutthiwan, P., Ye, J. and Shi, Y. Q. 2009. An Enhanced Statistical Approach to Identifying Photorealistic Images. In Digital Watermarking. Springer. 323–335

Farid, H. 2008. Digital Image Ballistics from JPEG Quantization: A Followupstudy. Technical Report. Department of Computer Science, Dartmouth College.

Liu, M., Yu, N. and Li, W. 2010. Camera Model Identification for JPEG Images via Tensor Analysis. In Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), IEEE. 462–465.

Fan, Z. and de Queiroz, R. L. 2003. Identification of Bitmap Compression History: JPEG Detection and Quantizer Estimation. IEEE Transactions on Image Processing. 12(2): 230–235.

He, J., Lin, Z., Wang, L. and Tang, X. 2006. Detecting Doctored JPEG Images via DCT Coefficient Analysis. In Computer Vision–ECCV 2006. Springer. 423–435.

Huang, F., Huang, J. and Shi, Y. Q. 2010. Detecting Double JPEG Compression with the Same Quantization Matrix. IEEE Transactions on Information Forensics and Security. 848–856.

Luka´sˇ, J. and Fridrich, J. 2003. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images. In Proc. Digital Forensic Research Workshop. 5–8.

Bianchi, T. and Piva, A. 2011. Analysis of Non-aligned Double JPEG Artifacts for the Localization of Image Forgeries. In Information Forensics And Security (WIFS), 2011. IEEE International Workshop on. 1–6.

Luo, W., Qu, Z., Huang, J. and Qiu, G. 2007. A Novel Method for Detecting Cropped and Recompressed Image Block. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. 2: II–217.

Ye, S., Sun, Q. and Chang, E.-C. 2007. Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. In IEEE International Conference on Multimedia and Expo, IEEE. 12–15.

Dirik, A. E., Sencar, H. T. and Memon, N. 2008. Digital Single Lens Reflex Camera Identification from Traces of Sensor Dust. IEEE Transactions on Information Forensics and Security. 3(3): 539–552.

Johnson, M. K. and Farid, H. 2006a. Exposing Digital Forgeries Through Chromatic Aberration. In Proceedings of the 8th workshop on Multimedia and Security, ACM. 48–55.

Van, L. T., Emmanuel, S. and Kankanhalli, M. S. 2007. Identifying Source Cell Phone Using Chromatic Aberration. In IEEE International Conference on Multimedia and Expo, IEEE. 883–886.

Yerushalmy, I. and Hel-Or, H. 2011. Digital Image Forgery Detection Based on Lens and Sensor Aberration. International Journal of Computer Vision. 92(1): 71–91.

Lin, Z., Wang, R., Tang, X. and Shum, H.-Y. 2005. Detecting Doctored Images Using Camera Response Normality and Consistency. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), IEEE. 1: 1087–1092.

Bayram, S., Sencar, H. T., Memon, N. and Avcibas, I. 2007. Improvements on Source Camera-model Identification based on CFA Interpolation. Proc. of WG. 11(1): 24–27.

Cao, H. and Kot, A. C. 2009. Accurate Detection of Demosaicing Regularity for Digital Image Forensics. IEEE Transactions on Information Forensics and Security. 4(4): 899–910.

Hsu, Y.-F. and Chang, S.-F. 2007. Image Splicing Detection Using Camera Response Function Consistency and Automatic Segmentation. In IEEE International Conference on Multimedia and Expo, IEEE. 28–31.

Yerushalmy, I. and Hel-Or, H. 2011. Digital Image Forgery Detection Based on Lens and Sensor Aberration. International Journal of Computer Vision. 92(1): 71–91.

Swaminathan, A., Wu, M. and Liu, K. R. 2008. Digital Image Forensics Via Intrinsic Fingerprints. IEEE Transactions on Information Forensics and Security. 3(1): 101–117.

Lukas, J., Fridrich, J. and Goljan, M. 2006. Digital Camera Identification from Sensor Pattern Noise. IEEE Transactions on Information Forensics and Security. 1(2): 205–214

Johnson, M. K. and Farid, H. 2005. Exposing Digital Forgeries by Detecting Inconsistencies in Lighting. In Proceedings of the 7th workshop on Multimedia and Security. ACM. 1–10.

Johnson, M. K. and Farid, H. 2006b. Metric Measurements on a Plane From a Single Image. Technical report. Dept. Comput. Sci. Dartmouth College, Tech. Rep. TR2006-579.

Johnson, M. K. and Farid, H. 2007a. Exposing Digital Forgeries in Complex Lighting Environments. IEEE Transactions on Information Forensics and Security. 2(3): 450–461

Johnson, M. K. and Farid, H. 2007b. Exposing Digital Forgeries Through Specular Highlights on the Eye. In Information Hiding. Springer. 311–325.

Ng, T.-T., Chang, S.-F., Hsu, J., Xie, L. and Tsui, M.-P. 2005. Physics-Motivated Features for Distinguishing Photographic Images and Computer Graphics. In Proceedings of the 13th annual ACM international Conference on Multimedia, ACM. 239–248.

Farid, H. 2010. A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo.

Downloads

Published

2015-03-09

How to Cite

Passive Aproaches for Detecting Image Tampering: A Review. (2015). Jurnal Teknologi, 73(2). https://doi.org/10.11113/jt.v73.4189