Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 30067


Select areas to restrict search in scientific publication database:
10009703
Digital Image Forensics: Discovering the History of Digital Images
Abstract:
Digital multimedia contents such as image, video, and audio can be tampered easily due to the availability of powerful editing softwares. Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity. Digital image forensics is dedicated to investigate the reliability of digital images by analyzing the integrity of data and by reconstructing the historical information of an image related to its acquisition phase. In this paper, a survey is carried out on the forgery detection by considering the most recent and promising digital image forensic techniques.
Digital Object Identifier (DOI):

References:

[1] K. J. R. Liu, “Multimedia Forensics: Where Sherlock Holmes Meets Signal Processing,” Invited talk @ ICME 2006.
[2] K. S. Choi, E. Y. Lam, and K. K. Y. Wong, “Source camera identification using footprints from lens aberration,” in Proc. of SPIE conference on Digital Photography II, vol. 6069, 2006.
[3] L. T. Van and S. Emmanuel, “Identifying source cell phone using chromatic aberration,” in Proc. of IEEE International Conference on Multimedia and Expo, 2007.
[4] M. K. Johnson and H. Farid, “Exposing digital forgeries through chromatic aberration,” in Proc. of the 8th ACM workshop on Multimedia & Security, 2006.
[5] F. Devernay and O. Faugeras, “Automatic calibration and removal of distortion from scenes of structured environments,” in Proc. of SPIE conference on Investigative and Trial Image Processing, vol. 2567, pp. 62–67, 1995.
[6] S. Bayram, H. Sencar, N. Memon, and I. Avcibas, “Source camera identification based on CFA interpolation,” in Proc. of IEEE international conference on Image processing, 2005.
[7] M. A. Swaminathan and K. J. R. Liu, “Non-intrusive forensics analysis of visual sensors using output images,” in Proc. of IEEE international conference on Image processing, 2006.
[8] J. Lukas, J. Fridrich, and M. Goljan, “Digital camera identification from sensor pattern noise,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205 – 214, June 2006.
[9] A. Lawgaly, F. Khelifi, and A. Bouridane, “Image Sharpening for Efficient Source Camera Identification Based on Sensor Pattern Noise Estimation,” in Proc. of IEEE international conference on Emerging Security Technologies, pp. 113 - 116, September 2013.
[10] L. Debiasi and A. Uhl, “Blind biometric source sensor recognition using advanced PRNU fingerprints,” in Proc. of IEEE conference on Signal Processing, 2015.
[11] H. Farid, “Digital image ballistics from JPEG quantization,” Technical Report, Department of Computer Science, Dartmouth College, 2006.
[12] E. Kee, M. K. Johnson, and H. Farid, “Digital image authentication from JPEG headers,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 1066-1075, 2011.
[13] J. D. Kornblum, “Using JPEG quantization tables to identify imagery processed by software,” in Proc. of Digital Investigation 5, pp. S21-S25, 2008.
[14] W. Luo, J. Huang, and G. Qiu, “JPEG error analysis and its applications to digital image forensics,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 480-491, 2010.
[15] F. Galvan, G. Puglisi, A. R. Bruna, and S. Battiato, “First quantization matrix estimation from double compressed JPEG images,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 8, pp. 1299-1310, 2014.
[16] M. Moltisanti, A. Paratore, S. Battiato, and L. Saravo, “Image Manipulation on Facebook for Forensics Evidence,” in Proc. International Conference on Image Analysis and Processing, pp. 506-517, 2015.
[17] A. Castiglione, G. Cattaneo, and A. D. Santis, “A Forensic Analysis of Images on Online Social Networks,” in Proc. International Conference on Intelligent Networking and Collaborative Systems, pp. 679-684, 2011.
[18] CIPA DC-008, “Exchangeable image file format for digital still cameras: EXIF Version 2.3,” 2012.
[19] S. Battiato, M. Mancuso, and A. Bosco, “Psychovisual and statistical optimization of quantization tables for DCT compression engines,” in Proc. of IEEE international conference on Image Analysis and Processing, pp. 602-606, 2001.
[20] T. Gloe, M. Kirchner, A. Winkler, and R. Böhme, “Can we trust digital image forensics?,” in Proc. of the 15th ACM international conference on Multimedia, pp. 78-86, 2007.
[21] P. Bestagini, A. Allam, S. Milani, M. Tagliasacchi, and S. Tubaro, “Video codec identification,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2257-2260, 2012.
[22] P. Bestagini, S. Milani, M. Tagliasacchi, and S. Tubaro, “Local tampering detection in video sequences,” in Proc. of IEEE International Workshop on Multimedia Signal Processing, pp. 488-493, 2013.
[23] M. Goljan, J. Fridrich, and T. Filler, “Managing a large database of camera fingerprints,” in Proc. of SPIE conference on Media Forensics and Security II, pp. 754108-754108, 2010.
[24] D. Valsesia, G. Coluccia, T. Bianchi, and E. Magli, “Compressed fingerprint matching and camera identification via random projections,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1472-1485, 2015.
[25] M. Fontani, T. Bianchi, A. De Rosa, A. Piva, and M. Barni, “A framework for decision fusion in image forensics based on Dempster–Shafer theory of evidence,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 4, pp. 593-607, 2013.
[26] D. Cozzolino, D. Gragnaniello, and L. Verdoliva, “Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques,” in Proc. of IEEE International Conference on Image Processing, pp. 5302-5306, 2014.
[27] F. D. O. Costa, E. Silva, M. Eckmann, W. J. Scheirer, and A. Rocha, “Open set source camera attribution and device linking,” Pattern Recognition Letters, vol. 39, pp. 92-101, 2014.
[28] I. Amerini, R. Caldelli, P. Crescenzi, A. Del Mastio, and A. Marino, “Blind image clustering based on the normalized cuts criterion for camera identification,” Signal Processing: Image Communication, vol. 29, no. 8, pp. 831-843, 2014.
[29] Y. Huang, J. Zhang, and H. Huang, “Camera Model Identification With Unknown Models,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2692-2704, 2015.
[30] R. Böhme and M. Kirchner, “Counter-forensics: Attacking image forensics,” Digital Image Forensics, pp. 327-366, 2013.
[31] M. Barni and F. Pérez-González, “Coping with the enemy: Advances in adversary-aware signal processing,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8682-8686, 2013.
[32] A. Haouzia and R. Noumeir, “Methods for image authentication: a survey,” Multimedia tools and applications, vol. 39, no. 1, pp. 1-46, 2008.
[33] S. Walton, “Image Authentication for a Slippery New Age,” Dr. Dobb’s Journal, pp. 18-26, 1995.
[34] I. J. Cox and M. G. Linnartz, “Public watermarks and resistance to tampering,” in Proc. IEEE conference on image processing, 1997.
[35] S. Battiato, G. M. Farinella, E. Messina, and G. Puglisi, “Robust image alignment for tampering detection,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1105-1117, 2012
[36] S. B. Solorio and A. K. Nandi, “Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics,” Signal Processing, vol. 91, no. 8, pp. 1759-1770, 2011.
[37] X. Zhao, J. Li, S. Li, and S. Wang, “Detecting digital image splicing in chroma spaces,” in Proc. of International Workshop on Digital Watermarking, pp. 12-22, 2010.
[38] G. Muhammad, M. Hussain, K. Khawaji, and G. Bebis, “Blind copy move image forgery detection using dyadic undecimated wavelet transform,” in Proc. of International Conference on Digital Signal Processing, pp. 1-6, 2011.
[39] X. Pan, X. Zhang, and S. Lyu, “Exposing image forgery with blind noise estimation,” in Proc. of 13th ACM multimedia workshop on Multimedia and security, pp. 15-20, 2011.
[40] C. Riess and E. Angelopoulou, “Scene illumination as an indicator of image manipulation,” in Proc. of International Workshop on Information Hiding, pp. 66-80, 2010.
[41] G. Cao, Y. Zhao, and R. Ni, “Edge-based blur metric for tamper detection,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, no. 1, pp. 20-27, 2010.
[42] B. L. Shivakumar and L. D. S. S. Baboo, “Detection of region duplication forgery in digital images using SURF,” International Journal of Computer Science Issues, vol. 8, no. 4, pp. 199-205, 2011.
[43] X. Bo, W. Junwen, L. Guangjie, and D. Yuewei, “Image copymove forgery detection based on SURF,” in Proc. of International Conference on Multimedia Information Networking and Security, pp. 889-892, 2010.
[44] I. Amerini, L. Ballan, R. Caldelli, A. Del Bimbo, and G. Serra, “Geometric tampering estimation by means of a SIFT-based forensic analysis,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1702-1705, 2010.
[45] X. Pan and S. Lyu, “Detecting image region duplication using SIFT features,” in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1706-1709, 2010.
[46] G. Cao, Y. Zhao, R. Ni, L. Yu, and H. Tian, “Forensic detection of median filtering in digital images,” in Proc. IEEE International Conference on Multimedia and Expo, pp. 89-94, 2010.
[47] F. Peng and X. L. Wang, “Digital image forgery forensics by using blur estimation and abnormal hue detection,” in Proc. of IEEE Symposium on Photonics and Optoelectronics, pp. 1-4, 2010.
[48] A. R. Bruna, G. Messina, and S. Battiato, “Crop detection through blocking artifacts analysis,” in Proc of International Conference on Image Analysis and Processing, pp. 650-659, 2011.
[49] W. Luo, Z. Qu, J. Huang, and G. Qiu, “A novel method for detecting cropped and recompressed image block,” in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, pp. II-217-220, 2007.
[50] E. Kee and H. Farid, “Digital image authentication from thumbnails,” in Proc. of SPIE conference on Media Forensics and Security II, pp. 75410E-75410E, 2010.
[51] T. Gloe, “Forensic analysis of ordered data structures on the example of JPEG files,” in Proc. of IEEE International Workshop on Information Forensics and Security, pp. 139-144, 2012.
[52] S. Battiato and M. Giuseppe, “Digital forgery estimation into DCT domain: a critical analysis,” in Proc. of ACM workshop on Multimedia in forensics, 2009.
[53] G. Singh and K. Singh, “Forensics for partially double compressed doctored JPEG images,” Multimedia tools and applications, vol. 75, no. 24, pp. 1-18, 2016.
[54] H. Lin, C. Wang, and Y. Kao, “An efficient method for copy-move forgery detection”, in Proc. of 8th International Conference on Applied Computer and Applied Computational Science, pp. 250-253, 2009.
[55] M. Bashar, K. Noda, N. Ohnishi, and K. Mori, “Exploring duplicated regions in natural images,” IEEE Transactions on Image Processing, pp. 1-40, 2010.
[56] P. Sutthiwan, Y. Q. Shi, S. Wei, and N. Tian-Tsong, “Rake transform and edge statistics for image forgery detection,” in Proc. IEEE International conference on multimedia and Expo, pp. 1463-1468, 2010.
[57] P. Xunyu and L. Siwei, “Region duplication detection using image feature matching,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 857-867, 2011.
[58] G. Muhammad, M. Hussain, and G. Bebis, “Passive copy move image forgery detection using undecimated dyadic wavelet transform,” Digital Investigation, vol. 9, pp. 49-57, 2012.
[59] J. Zhao and J. Guo, “Passive forensics for copy-move image forgery using a method based on DCT and SVD,” Forensic Science International, vol. 233, pp 158-166, 2013.
[60] D. Fu, Y. Shi, and W. Su, “Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition,” in Proc. of International workshop on digital watermarking, pp. 177-187, 2006.
[61] W. Chen, Y. Shi, and W. Su, “Image splicing detection using 2-d phase congruency and statistical moments of characteristic function,” in Proc. of SPIE electronic imaging: security, stegnography, and watermarking of multimedia contents, 2007.
[62] W. Zhang, X. Cao, Y. Qu, Y. Hou, H. Zhao, and C. Zhang, “Detecting and extracting the photo composites using planar homography and graph cut,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 3, pp. 544-555, 2010.
[63] Q. Zhenhua, Q. Guoping, and H. Jiwu, “Detect digital image splicing with visual cues,” in Proc. of International workshop on information hiding, pp. 247-261, 2009.
[64] Z. Fang, S. Wang, and X. Zhang, “Image splicing detection using color edge inconsistency,” in Proc. International Conference on Multimedia Information Networking and Security, pp. 923-926, 2010.
Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007