Survey on blind image forgery detection

被引:80
作者
Qazi, Tanzeela [1 ]
Hayat, Khizar [1 ]
Khan, Samee U. [2 ]
Madani, Sajjad A. [1 ]
Khan, Imran A. [1 ]
Kolodziej, Joanna [3 ]
Li, Hongxiang [4 ]
Lin, Weiyao [5 ]
Yow, Kin Choong [6 ]
Xu, Cheng-Zhong [7 ]
机构
[1] COMSATS Inst Informat Technol, Dept Comp Sci, Abbottabad, Pakistan
[2] N Dakota State Univ, Fargo, ND 58105 USA
[3] Cracow Univ Technol, Inst Comp Sci, Krakow, Poland
[4] Univ Louisville, Dept Elect & Comp Engn, Louisville, KY 40292 USA
[5] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
[6] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen, Peoples R China
[7] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
关键词
message authentication; object detection; video signal processing; image forensics; blind image forgery detection; mushroom growth; digital image manipulations tools; digital video manipulations tools; multimedia content authenticity; digital image forensics; blind techniques; retouching forgery; splicing forgery; copy-move forgery; COPY-MOVE FORGERY; ALGORITHM; FORENSICS; SCHEME;
D O I
10.1049/iet-ipr.2012.0388
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the mushroom growth of state-of-the-art digital image and video manipulations tools, establishing the authenticity of multimedia content has become a challenging issue. Digital image forensics is an increasingly growing research field that symbolises a never ending struggle against forgery and tampering. This survey attempts to cover the blind techniques that have been proposed for exposing forgeries. This work dwells on the detection techniques for three of the most common forgery types, namely copy/move, splicing and retouching.
引用
收藏
页码:660 / 670
页数:11
相关论文
共 37 条
[1]   A SIFT-Based Forensic Method for Copy-Move Attack Detection and Transformation Recovery [J].
Amerini, Irene ;
Ballan, Lamberto ;
Caldelli, Roberto ;
Del Bimbo, Alberto ;
Serra, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :1099-1110
[2]  
[Anonymous], 2011, WORLD ACAD SCI ENG T
[3]  
[Anonymous], 2006, Multimedia Security Technologies for Digital Rights, chapter Passive-Blind Image Forensics
[4]  
[Anonymous], INT J DIGITAL CONTEN
[5]  
[Anonymous], 2009, DETECTING PHOTOGRAPH
[6]  
[Anonymous], 2010, International Journal on Computer Science and Engineering
[7]   A robust detection algorithm for copy-move forgery in digital images [J].
Cao, Yanjun ;
Gao, Tiegang ;
Fan, Li ;
Yang, Qunting .
FORENSIC SCIENCE INTERNATIONAL, 2012, 214 (1-3) :33-43
[8]  
Chennamma H.R., 2011, IJCSI Int. J. Comput. Sci. Issues, V7, P149
[9]  
Daubechies I., 1992, Ten lectures on wavelets, DOI DOI 10.1137/1.9781611970104
[10]  
Dong J, 2009, LECT NOTES COMPUT SC, V5450, P76, DOI 10.1007/978-3-642-04438-0_7