A review of image features extraction techniques and their applications in image forensic

被引:0
|
作者
Kumar D. [1 ]
Pandey R.C. [1 ]
Mishra A.K. [1 ]
机构
[1] Rajkiya Engineering College (REC), Ambedkar Nagar, UP
关键词
Active forensic techniques; Image feature extraction; Image features; Image tampering attacks; Passive forensic techniques;
D O I
10.1007/s11042-023-17950-x
中图分类号
学科分类号
摘要
In these modern days, digital images become prominent information on the Internet and Social Media. The images can have a number of features with many secrets. To get these secrets, the information regarding the features of the images must be known. An image passes through the pre-processing stage before retrieving these features. For pre-processing, different operations such as normalization, thresholding, noise removal, etc. are applied to get the relevant features of the image. Feature extraction is the process of converting the input image into corresponding image features with the help of some algorithms such as the key point detector algorithm, edge detection algorithm, noise retrieval algorithm, etc. The objective of this survey article is to explore the latest methods for extracting image features and utilizing them in image forensics. These features are applied to detect the different types of image tampering attacks on the image with their detection techniques. Nowadays, the manipulation of an image is a very easy task with the help of different types of tools and software such as adobe photoshop, google picasa, and GNU’s Not Unix (GNU) Image Manipulation Program (GIMP), etc. To detect image tampering, features of the image play a very crucial role. A detailed review of different image features that are being utilized in image forensics has been done in the paper. The image features are colors, shape, texture, edges, noise, and key points. The different issues and challenges for detecting image tampering available with the existing techniques along with their performance have been presented in this paper. The future scope of the research work in the area of image processing has also been explored. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:87801 / 87902
页数:101
相关论文
共 50 条
  • [21] Extraction of line features in a noisy image
    Lee, JW
    Kweon, IS
    PATTERN RECOGNITION, 1997, 30 (10) : 1651 - 1660
  • [22] Extraction of line features in a noisy image
    Korea Advanced Inst of Science and, Technology, Seoul, Korea, Republic of
    Pattern Recognit, 10 (1651-1660):
  • [23] PYRAMID BASED EXTRACTION OF LOCAL IMAGE FEATURES WITH APPLICATIONS TO MOTION AND TEXTURE ANALYSIS
    BURT, PJ
    PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS, 1982, 360 : 114 - 124
  • [24] Image forgery techniques: a review
    Kaur, Gurpreet
    Singh, Navdeep
    Kumar, Munish
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (02) : 1577 - 1625
  • [25] Review on Image Synthesis Techniques
    Shirin, Fathima M.
    Meharban, M. S.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 13 - 17
  • [26] Review of image compression techniques
    Singh, Abhipriya
    Kirar, K. G.
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 172 - 174
  • [27] Image forgery techniques: a review
    Gurpreet Kaur
    Navdeep Singh
    Munish Kumar
    Artificial Intelligence Review, 2023, 56 : 1577 - 1625
  • [28] Image Sectionalization Techniques : A Review
    Yadav, Somya
    Singh, K. K.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 195 - 199
  • [29] A REVIEW ON IMAGE SEGMENTATION TECHNIQUES
    PAL, NR
    PAL, SK
    PATTERN RECOGNITION, 1993, 26 (09) : 1277 - 1294
  • [30] Image Encryption techniques:A Review
    Jasra, Bhat
    Moon, Ayaz Hassan
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 221 - 226